Zyxel P-2602HW Manual
Zyxel P-2602HW, size: 12.8 MB
Zyxel P-2602HW Brochure
Zyxel P-2602HWL-c Quick Guide
Zyxel P-2602HWL-dxa Brochure
Here you can find all about Zyxel P-2602HW like manual and other informations. For example: review.
Zyxel P-2602HW manual (user guide) is ready to download for free.
On the bottom of page users can write a review. If you own a Zyxel P-2602HW please write about it to help other people. [ Report abuse or wrong photo | Share your Zyxel P-2602HW photo ]
User reviews and opinions
No opinions have been provided. Be the first and add a new opinion/review.
Verkrijgbaar bij: Grafi-Call Computers BV. Leiden
VoIP Products Prestige 2602HW/HWL Series Prestige 2002 Series P-2302R/RL Series P-2000W_v2 (Nieuw) P-2602R (Nieuw) ZyXEL's P-2602HW series is a powerful, all-in-one ADSL VoIP IAD (Integrated Access Device) for SOHO and SMB applications. The IAD integrates high-speed ADSL access, 4-port Ethernet switch, IEEE 802.11g high-speed wireless connectivity, and 2 POTS ports for Voice over IP functionalities. Base on industry open standard- SIP signaling and sophisticated voice compression technology, the P2602HW series offers smooth IP-based voice communication with superb sound quality. It allows customers to take advantage of many new and existing IP Telephony features. Not only does ZyXEL's P-2602HW series feature Firewall and VPN as an ADSL security gateway, but also provides high-speed wireless connectivity with IEEE 802.11g wireless standard compliance. Scalable, cost-effective and easy-to-use, ZyXEL's P-2602HW is the ideal data and voice communication solution to meet the business needs of today and the future. Benefits Higher-speed Internet Access and Maximum Freedom of Mobility ZyXEL's P-2602HW is a high performance ADSL/ADSL2/ADSL2+ gateway that allows small and medium offices to have higher-speed Internet access, offering higher data transfer rates and better bandwidth than traditional ADSL enabled gateways. Furthermore, with an IEEE 802.11g wireless AP built-in, the P-2602HW offers maximum freedom of mobility with 54Mbps transmission speeds, higher than the current IEEE 802.11b wireless standard. Supports Open Standard ZyXEL's P-2602HW series supports standard SIP (RFC 3261), which is suitable for IP telephony service deployment and addresses the needs of users who are connecting to emerging SIP-based communication networks. Robust Firewall Security and Enhanced VPN Performance Based on Stateful Packet Inspection and Denial of Service (DoS), ZyXEL's P-2602HW series provides state-of-the-art Firewall performance and robust security to defend against hackers, network intruders, and other hazardous threats. Furthermore an ASIC DES accelerator enhances VPN performance to levels higher than ever before. Multiple SIP and Voice Channels Based on ZyXEL's flexible VoIP technology platform, one or more SIP phone number may be configured with the P-2602HW. Each SIP phone number can be freely assigned to either phone port individually, or to both ports at the same time. By using ZyXEL's P-2602HW ADSL VoIP IAD to deploy VoIP service, service providers need only provide a minimum of one SIP number to each subscriber. Billing and service deployment are simplified by allowing subscribers to use two phones with the same SIP number. If one telephone is in use, users may use a secondary telephone to place a call while using the same SIP number. Additionally, users may also receive incoming calls even when the SIP number is in use. The advantages of the P-2602HW include increased traffic and service revenue. Lifeline Support (P-2602HWL) "PSTN Lifeline" feature allows users to switch to the standard phone line in case of power or Internet outage. Thanks to the friendly design of P-2602HWL, VoIP service subscribers can place calls just like using a PSTN phone. Models - P-2602HW-61 802.11g Wireless ADSL 2+ VoIP IAD over POTS - P-2602HW-63 802.11g Wireless ADSL 2+ VoIP IAD over ISDN - P-2602HWL-61 802.11g Wireless ADSL 2+ VoIP IAD over POTS with Lifeline Support - P-2602HWL-63 802.11g Wireless ADSL 2+ VoIP IAD over ISDN with Lifeline Support Product >> VoIP Products >> Prestige 2602HW/HWL Series
Prestige 2602HW/HWL Series
802.11g Wireless ADSL VoIP IAD
Quick Link NL support docs Datasheet User's Guide Quick Start Guide Quick Start Guide US Support Notes Where to buy
http://zylamp.zyxel.nl/product/model.php?indexcate=1092966538&indexFlagvalue=1075687935 (1 van 2)15-3-2006 15:39:23
ZyXEL P-2602H/HW/HWL - ADSL2+ VoIP IAD
(C) Copyright 1995-2004 by ZyXEL Communications Co.
http://zylamp.zyxel.nl/product/model.php?indexcate=1092966538&indexFlagvalue=1075687935 (2 van 2)15-3-2006 15:39:23
ADSL 2+ VoIP IAD
8 PVCs Support RFC 1483/2684 Multiple Protocol over AAL5 RFC 2364 PPP over AAL5 RFC 2516 PPP over Ethernet VC and LLC Multiplexing Traffic Shaping UBR, CBR, VBR ATM Forum UNI 3.1/ 4.0 PVC I.610 OAM F4/F5 loop-back, AIS, and RDI OAM cells TR-048
Virtual Private Network
20 IPSec VPN Tunnels IKE and Manual Key Management AH and ESP Protocol DES ,3DES and AES Encryption SHA-1 and MD5 Authentication Tunnel and Transport Mode Encapsulation
SIP (RFC 3261) version 2 SDP (RFC 2327) RTP/RTCP (RFC1889, 1890) Echo Cancellation: G.168 VAD (Voice Activity Detection) Silence Suppression CNG (Comfort Noise Generation) Dynamic Jitter Buffer (Adaptive) DTMF Detection and Generation DTMF: In-Band and Out-of-Band (RFC2833),
Web based Configuration Command-line Interpreter (CLI) Telnet Remote Management SNMP Support FTP/TFTP firmware upgrade and configuration backup/restore Built-in diagnostic tool
All-in-one ADSL 2+ VoIP IAD for SOHO
ADSL, ADSL2/2+ support SIP (RFC3261) support with 2 phone ports for VoIP Advanced security features: SPI Firewall, IPSec VPN Support QoS to prioritize voice and data traffics Auto Provisioning for easy deployment
IEEE 802.1d Transparent Bridging IP Routing: TCP, UDP, ICMP, ARP RIP1v1 and RIPv2 IP Multicast IGMP v1/v2
(SIP INFO) Fax Tone Detection and Pass-through Modem Tone Detection and Pass-through T.38 FAX Relay* CLID Call Waiting* Call Forward* Three way conference* MWI*
PSTN Lifeline Support (Optional)
Send Emergency Call to PSTN Make a PSTN Call by Dialing Pre-fix Number PSTN Relay when Device Power Down PSTN Relay when VoIP Service is Not Available Receive Incoming PSTN Phone Call
SUA/Multi-NAT Internet Sharing Multimedia Support DHCP Server/Relay/Client DNS Proxy Dynamic DNS UPnP Support
ADSL: RJ-11 for P2602HW over POTS RJ-45 for P2602HW over ISDN/UR2 RJ-45 for P-2602HWL over POT/ISDN/UR2 LAN: Four Ports 10M/100M Auto MDI/MDIX Ethernet Switch Phone: Two RJ-11 Ports for Analog Service Connection Reset Button Status LEDs Indicator Power: 18V DC 1A Switching Power Supply
All-in-one ADSL VoIP IAD
ZyXEL P-2602H/HW/HWL Gateway Series is an integrated Internet access device supporting high-speed ADSL, ADSL2 and ADSL2+ standard over existing copper lines. Combining convenient Wireless AP (optional), Ethernet switch, Firewall and VoIP gateway features, it is indispensable for homes and small offices with limited space and technical expertise.
Flash Hook Timer* Multiple SIP Accounts Freely assignable to Each Phone Port
Wireless LAN (P-2602HW/HWL)
IEEE 802.11g/11b Compliance Data Rates up to 54Mbps, Auto Fallback 64/128/256bits WEP Encryption MAC Address Filtering IEEE 802.1x Port-based Authentication One non-detachable Antenna
Diffserv Voice priority always guaranteed. Media Bandwidth Management (MBM)* E to E QoS mechanism (depends on service providers network)
Flexible Phone Features
With two built-in phone ports and flexible calling features, ZyXEL P2602H/HW/HWL not only empowers ITSP to enjoy better profitability from flexible phone number assignment, but also offers unprecedented flexibility for users to talk unlimitedly through high-speed broadband connection.
Stateful Packet Inspection Prevent DoS Attack Access Control of Service Content Filtering IP & Generic Packet Filtering Real-time Attack Alert and Logs
Support Multi Mode Standard (ANSI T1.413 Issue 2, G.dmt, G.lite) ADSL2 G.dmt.bis (G.992.3)* ADSL2 G.lite.bis (G.992.4)* ADSL2+ (G.992.5)* Reach Extended ADSL (RE ADSL)*
Advanced Security Features
Based on Stateful Packet Inspection and Denial of Service (DoS) technologies, the P-2602H/HW/HWL provides state-of-the-art firewall performance and robust protection against hackers, network intruders and other malign threats. Furthermore, the standard-based IPSec VPN ensures secured data transmission for site-to-site and remote access deployment. Since data sent by P-2602H/HW/HWL over the Internet can be encrypted, users is free to use the ADSL2/2+ line to replace private leased lines or frame relay networks, allowing global interconnectivity at minimal expense.
Dimensions : 248mm(L)x 168mm(D)x 37mm (H) Weight: 642g
Temperature: 0C ~ 40C Humidity: 20% ~ 85 % ( non-condensing)
802.11g Wireless ADSL 2+ VoIP IAD over U-R2
P-2602H-61C P-2602H-63C P-2602H-67C P-2602HW-61C P-2602HW-63C
ADSL 2+ VoIP IAD over POTS ADSL 2+ VoIP IAD over ISDN ADSL 2+ VoIP IAD over U-R2 802.11g Wireless ADSL 2+VoIP IAD over POTS 802.11g Wireless ADSL 2+ VoIP IAD over ISDN
Lifeline Support (P-2602HWL)
PSTN Lifeline feature allows users to switch to the standard phone line in case of power or Internet outage. Thanks to the friendly design of P2602HWL, VoIP service subscribers can place calls just like using a PSTN phone.
P-2602HWL-61C 802.11g Wireless ADSL 2+ VoIP IAD over POTS with Lifeline Support P-2602HWL-63C 802.11g Wireless ADSL 2+ VoIP IAD over ISDN with Lifeline Support P-2602HWL-67C 802.11g Wireless ADSL 2+ VoIP IAD over U-R2 with Lifeline Support
* Firmware upgradeable for future enhancement
For more product
Corporate Headquarters ZyXEL Communications Corp.
Tel: +886-3-578-3942 Fax: +886-3-578-2439 Email: firstname.lastname@example.org http://www.zyxel.com http://www.zyxel.com.tw
information, visit us on the web www.ZyXEL.com
ZyXEL France SARL
Tel: +33 (0)97 Fax: +33 (0)20 Email: email@example.com http://www.zyxel.fr
ZyXEL Denmark A/S
Tel: +00 Fax: +07 Email: firstname.lastname@example.org http://www.zyxel.dk
Tel: +36-1-336-1646 Fax: +36-1-325-9100 Email: email@example.com http://www.zyxel.hu
ZyXEL North America
Tel: +1-714-632-0882 Fax: +1-714-632-0858 Email: firstname.lastname@example.org http://www.us.zyxel.com
Tel: +7 (095) 542-8920 Fax: +7 (095) 542-8925 Email: email@example.com http://www.zyxel.ru
ZyXEL Sweden A/S
Tel: +46 (0) Fax: +46 (0) Email: firstname.lastname@example.org http://www.zyxel.se
Tel: +31 Fax: +32 Email: email@example.com http://www.ua.zyxel.com
ADSL 2+ VoIP IAD p-2602h /hw/hwl
ZyXEL Czech s.r.o.
ZyXEL Finland Oy
Tel: +358-9-Fax: +358-9-Email: firstname.lastname@example.org http://www.zyxel.fi
ZyXEL Germany GmbH.
Tel: +49 (0) 2405-Fax: +49 (0) 2405-Email: email@example.com http://www.zyxel.de
Tel: +7-327-2-590-699 Fax: +7-327-2-590-689 Email: firstname.lastname@example.org http://www.zyxel.kz
ZyXEL Norway A/S
Tel: +80 Fax: +81 Email: email@example.com http://www.zyxel.no
Tel: +Fax: +Email: firstname.lastname@example.org http://www.zyxel.es
ZyXEL UK Ltd.
Tel: +44 (0) Fax: +44 (0) Email: email@example.com http://www.zyxel.co.uk
Tel: +Fax: +Email: firstname.lastname@example.org http://cz.zyxel.com
Copyright 2005 ZyXEL Communications Corp. All rights reserved. ZyXEL, ZyXEL logo and ZyNOS are registered trademarks of ZyXEL Communications Corp. All other brands, product names, or trademarks mentioned are the property of their respective owners. All specifications are subject to change without notice.
Table of Contents 25.9.3 TFTP File Upload.... 327 25.9.4 TFTP Upload Command Example... 328
Chapter 26 Diagnostic..... 329
26.1 General Diagnostic.... 329 26.2 DSL Line Diagnostic.... 330
Chapter 27 Troubleshooting.... 333
27.1 Power, Hardware Connections, and LEDs... 333 27.2 ZyXEL Device Access and Login... 334 27.3 Internet Access.... 335 27.4 Phone Calls and VoIP.... 336
Chapter 28 Product Specifications.... 339
Part V: Appendices and Index.. 349
List of Figures
Figure 1 ZyXEL Devices Router Features... 39 Figure 2 ZyXEL Devices VoIP Features... 39 Figure 3 LEDs on the Top of the Device.... 40 Figure 4 AP: Wireless LAN > AP.... 44 Figure 5 AP: Wireless LAN > AP > Advanced Setup.... 44 Figure 6 AP: Status.... 45 Figure 7 AP: Status: WLAN Station Status... 45 Figure 8 ZyXEL Utility: Site Survey... 46 Figure 9 ZyXEL Utility: Security Settings.... 47 Figure 10 ZyXEL Utility: Confirm Save.... 47 Figure 11 ZyXEL Utility: Link Info.... 47 Figure 12 ZyXEL Utility: Profile.... 48 Figure 13 ZyXEL Utility: Add New Profile.... 48 Figure 14 ZyXEL Utility: Profile Security.... 49 Figure 15 ZyXEL Utility: Profile Encryption... 49 Figure 16 Profile: Wireless Protocol Settings... 49 Figure 17 Profile: Confirm Save.... 50 Figure 18 Profile: Activate..... 50 Figure 19 Tutorial Example: Using NAT with Static Public IP Addresses.. 51 Figure 20 Tutorial Example: WAN Connection with a Static Public IP Address.. 52 Figure 21 Tutorial Example: WAN Screen... 53 Figure 22 Tutorial Example: Status.... 54 Figure 23 Tutorial Example: Mapping Multiple Public IP Addresses to Inside Servers. 55 Figure 24 Tutorial Example: NAT > NAT Overview... 55 Figure 25 Tutorial Example: NAT > Address Mapping... 56 Figure 26 Tutorial Example: NAT Address Mapping Edit: One-to-One (1).. 56 Figure 27 Tutorial Example: NAT Address Mapping Edit: One-to-One (2).. 57 Figure 28 Tutorial Example: NAT Address Mapping Edit: Many-to-One.. 57 Figure 29 Tutorial Example: NAT Address Mapping Done.. 58 Figure 30 Tutorial Example: Forwarding Incoming FTP Traffic to a Local Computer.. 58 Figure 31 Tutorial Example: NAT Address Mapping Edit: Server.. 59 Figure 32 Tutorial Example: NAT Port Forwarding... 59 Figure 33 Tutorial Example: Allow WAN-to-LAN Traffic... 60 Figure 34 Tutorial Example: Firewall > General... 60 Figure 35 Tutorial Example: Firewall Rules: WAN to LAN... 61 Figure 36 Tutorial Example: Firewall Rule: WAN to LAN Address Edit for Web Server. 61 Figure 37 Tutorial Example: Firewall Rule: WAN to LAN Service Edit for Web Server.. 62 Figure 38 Tutorial Example: Firewall Rule: WAN to LAN Address Edit for Mail Server.. 63
List of Figures Figure 39 Tutorial Example: Firewall Rule: WAN to LAN Service Edit for Mail Server. 63 Figure 40 Tutorial Example: Firewall Rule: WAN to LAN Address Edit for FTP Server.. 64 Figure 41 Tutorial Example: Firewall Rule: WAN to LAN Service Edit for FTP Server. 65 Figure 42 Tutorial Example: Firewall Rules Done.... 65 Figure 43 Tutorial Example: NAT Address Mapping Done: Game Playing.. 66 Figure 44 Tutorial Example: Status.... 67 Figure 45 Tutorial Example: Analog Phone.... 68 Figure 46 Password Screen.... 70 Figure 47 Main Screen..... 70 Figure 48 Wizard Welcome.... 78 Figure 49 Auto Detection: No DSL Connection... 78 Figure 50 Auto-Detection: PPPoE.... 79 Figure 51 Auto Detection: Failed... 79 Figure 52 Internet Access Wizard Setup: ISP Parameters... 80 Figure 53 Internet Connection with PPPoE.... 81 Figure 54 Internet Connection with DHCP (ENET ENCAP)... 82 Figure 55 Connection Test Failed-1.... 83 Figure 56 Connection Test Failed-2... 83 Figure 57 Connection Test Successful.... 84 Figure 58 Wireless LAN Setup Wizard 1... 84 Figure 59 Wireless LAN.... 85 Figure 60 Manually Assign a WPA-PSK key... 86 Figure 61 Manually Assign a WEP key... 86 Figure 62 Wireless LAN Setup 3... 87 Figure 63 Internet Access and WLAN Wizard Setup Complete... 88 Figure 64 Status Screen (ADSL WAN mode).... 92 Figure 65 Status Screen (Ethernet WAN mode)... 93 Figure 66 Any IP Table..... 96 Figure 67 WLAN Status.... 97 Figure 68 Packet Statistics.... 98 Figure 69 VoIP Statistics.... 99 Figure 70 Example of Traffic Shaping... 106 Figure 71 Internet Access Setup (ADSL WAN: PPPoE)... 108 Figure 72 Advanced Internet Access Setup...111 Figure 73 LAN and WAN IP Addresses....113 Figure 74 Any IP Example....117 Figure 75 LAN IP.....118 Figure 76 Advanced LAN Setup...119 Figure 77 DHCP Setup.... 120 Figure 78 LAN Client List..... 121 Figure 79 Physical Network & Partitioned Logical Networks... 123 Figure 80 LAN IP Alias.... 123 Figure 81 Example of a Wireless Network... 125
List of Figures Figure 82 Wireless LAN: AP.... 129 Figure 83 Wireless LAN: No Security.... 130 Figure 84 Wireless: Static WEP Encryption... 131 Figure 85 Wireless LAN: WPA(2)-PSK.... 132 Figure 86 Wireless: WPA(2)..... 133 Figure 87 Wireless LAN Advanced Setup... 135 Figure 88 Wireless LAN: More AP.... 136 Figure 89 More AP Edit.... 137 Figure 90 MAC Address Filter.... 138 Figure 91 Wireless LAN: QoS.... 139 Figure 92 Wireless LAN: WPS.... 140 Figure 93 Wireless LAN: WPS Station.... 141 Figure 94 How NAT Works.... 144 Figure 95 NAT Application With IP Alias.... 145 Figure 96 NAT General.... 147 Figure 97 Multiple Servers Behind NAT Example... 149 Figure 98 Port Forwarding.... 149 Figure 99 Port Forwarding Rule Setup.... 150 Figure 100 Address Mapping Rules.... 152 Figure 101 Edit Address Mapping Rule.... 153 Figure 102 Network > NAT > ALG.... 154 Figure 103 Phone Book > Speed Dial... 157 Figure 104 Phone Book > Incoming Call Policy... 158 Figure 105 Phone Book > SIP Prefix.... 160 Figure 106 Default Firewall Action.... 170 Figure 107 Ideal Firewall Setup... 172 Figure 108 Triangle Route Problem.... 173 Figure 109 IP Alias.... 174 Figure 110 Firewall: General.... 174 Figure 111 Firewall Rules.... 176 Figure 112 Firewall: Edit Rule.... 178 Figure 113 Firewall: Customized Services... 180 Figure 114 Firewall: Configure Customized Services... 181 Figure 115 Firewall Example: Rules.... 182 Figure 116 Edit Custom Port Example.... 182 Figure 117 Firewall Example: Edit Rule: Destination Address.. 183 Figure 118 Firewall Example: Edit Rule: Select Customized Services.. 184 Figure 119 Firewall Example: Rules: MyService... 185 Figure 120 Three-Way Handshake... 185 Figure 121 Firewall: Threshold.... 186 Figure 122 Content Filter: Keyword.... 189 Figure 123 Content Filter: Schedule.... 190 Figure 124 Content Filter: Trusted.... 191
List of Tables
Table 1 LED Descriptions..... 40 Table 2 Web Configurator Icons in the Title Bar... 71 Table 3 Navigation Panel Summary.... 71 Table 4 Internet Access Wizard Setup: ISP Parameters... 80 Table 5 Internet Connection with PPPoE.... 81 Table 6 Internet Connection with DHCP (ENET ENCAP)... 82 Table 7 Wireless LAN Setup Wizard 1.... 84 Table 8 Wireless LAN Setup Wizard 2.... 85 Table 9 Manually Assign a WPA key.... 86 Table 10 Manually Assign a WEP key.... 87 Table 11 Status Screen.... 93 Table 12 Any IP Table.... 96 Table 13 WLAN Status..... 97 Table 14 Packet Statistics..... 98 Table 15 VoIP Statistics.... 99 Table 16 Internet Access Setup.... 108 Table 17 Advanced Internet Access Setup...111 Table 18 LAN IP....118 Table 19 Advanced LAN Setup....119 Table 20 DHCP Setup.... 120 Table 21 LAN Client List..... 122 Table 22 LAN IP Alias.... 123 Table 23 Types of Encryption for Each Type of Authentication... 127 Table 24 Additional Wireless Terms.... 128 Table 25 Wireless LAN: AP..... 129 Table 26 Wireless LAN: No Security.... 130 Table 27 Wireless: Static WEP Encryption... 131 Table 28 Wireless LAN: WPA(2)-PSK.... 132 Table 29 Wireless: WPA(2).... 133 Table 30 Wireless LAN Advanced Setup... 135 Table 31 Wireless LAN: More AP.... 136 Table 32 More AP Edit.... 137 Table 33 MAC Address Filter.... 138 Table 34 Wireless LAN: QoS.... 139 Table 35 Wireless LAN: WPS.... 140 Table 36 Wireless LAN: WPS Station... 141 Table 37 NAT Definitions.... 143 Table 38 NAT Mapping Types.... 146
List of Tables Table 39 NAT General.... 147 Table 40 Port Forwarding.... 150 Table 41 Port Forwarding Rule Setup... 151 Table 42 Address Mapping Rules.... 152 Table 43 Edit Address Mapping Rule... 153 Table 44 Network > NAT > ALG.... 154 Table 45 Phone Book > Speed Dial.... 157 Table 46 Phone Book > Incoming Call Policy... 159 Table 47 Phone Book > SIP Prefix.... 160 Table 48 European Flash Key Commands... 165 Table 49 USA Flash Key Commands... 166 Table 50 Phone Functions Summary.... 167 Table 51 Firewall: General.... 175 Table 52 Firewall Rules.... 176 Table 53 Firewall: Edit Rule..... 178 Table 54 Customized Services... 180 Table 55 Firewall: Configure Customized Services.... 181 Table 56 Firewall: Threshold.... 187 Table 57 Content Filter: Keyword.... 190 Table 58 Content Filter: Schedule... 191 Table 59 Content Filter: Trusted.... 191 Table 60 VPN and NAT.... 197 Table 61 AH and ESP.... 200 Table 62 VPN Setup.... 202 Table 63 VPN and NAT.... 204 Table 64 Local ID Type and Content Fields.... 206 Table 65 Peer ID Type and Content Fields... 206 Table 66 Matching ID Type and Content Configuration Example... 206 Table 67 Mismatching ID Type and Content Configuration Example.. 207 Table 68 VPN Setup; Edit.... 208 Table 69 Advanced VPN IKE.... 214 Table 70 VPN Setup: Manual Key... 217 Table 71 VPN: SA Monitor.... 220 Table 72 VPN: Global Setting.... 221 Table 73 Telecommuters Sharing One VPN Rule Example... 222 Table 74 Telecommuters Using Unique VPN Rules Example... 223 Table 75 My Certificates..... 227 Table 76 My Certificate Import.... 229 Table 77 My Certificate Create... 230 Table 78 My Certificate Details... 233 Table 79 Trusted CAs.... 236 Table 80 Trusted CA Import..... 237 Table 81 Trusted CA Details.... 238
3.1.1 Accessing the Web Configurator
1 Make sure your ZyXEL Device hardware is properly connected (refer to the Quick Start Guide). 2 Launch your web browser. 3 Type "10.0.0.138" as the URL. 4 A password screen displays. Type admin (default) as the username and leave the password field blank, and click Login. Click Cancel to revert to the default password in the password field. If you have changed the password, enter your password and click Login.
Chapter 3 Introducing the Web Configurator Figure 46 Password Screen
For security reasons, the ZyXEL Device automatically logs you out if you do not use the web configurator for five minutes (default). If this happens, log in again.
3.2 Web Configurator Main Screen
Figure 47 Main Screen
Chapter 3 Introducing the Web Configurator
As illustrated above, the main screen is divided into these parts: A - title bar B - navigation panel C - main window D - status bar
3.2.1 Title Bar
The title bar allows you to change the language and provides some icons in the upper right corner.
The icons provide the following functions.
Table 2 Web Configurator Icons in the Title Bar
ICON DESCRIPTION Wizards: Click this icon to go to the configuration wizards. See Chapter 4 on page 77 for more information. Logout: Click this icon to log out of the web configurator.
3.2.2 Navigation Panel
Use the menu items on the navigation panel to open screens to configure ZyXEL Device features. The following tables describe each menu item.
Table 3 Navigation Panel Summary
LINK Status Network WAN LAN Internet Access Setup IP DHCP Setup Client List Use this screen to configure ISP parameters, WAN IP address assignment, DNS servers and other advanced properties. Use this screen to configure LAN TCP/IP settings, enable Any IP and other advanced properties. Use this screen to configure LAN DHCP settings. Use this screen to view current DHCP client information and to always assign specific IP addresses to individual MAC addresses (and host names). Use this screen to partition your LAN interface into subnets. TAB FUNCTION This screen shows the ZyXEL Devices general device and network status information. Use this screen to access the statistics and client list.
7.3 LAN TCP/IP
The ZyXEL Device has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability.
7.3.1 IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number. Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. If this is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0 and you must enable the Network Address Translation (NAT) feature of the ZyXEL Device. The Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private use; please do not use any other number unless you are told otherwise. Let's say you select 192.168.1.0 as the network number; which covers 254 individual addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other words, the first three numbers specify the network number while the last number identifies an individual computer on that network. Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 10.0.0.138, for your ZyXEL Device, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address. Your ZyXEL Device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the ZyXEL Device unless you are instructed to do otherwise. 22.214.171.124 Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet, for example, only between your two branch offices, you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks: 10.0.0.0 10.255.255.255 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 You can obtain your IP address from the IANA, from an ISP or it can be assigned from a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses.
This chapter discusses how to configure the wireless network settings in your ZyXEL Device. See the appendices for more detailed information about wireless networks.
8.1 Wireless Network Overview
The following figure provides an example of a wireless network.
Figure 81 Example of a Wireless Network
The wireless network is the part in the blue circle. In this wireless network, devices A and B use the access point (AP) to interact with the other devices (such as the printer) or with the Internet. Your ZyXEL Device is the AP. Every wireless network must follow these basic guidelines. Every device in the same wireless network must use the same SSID. The SSID is the name of the wireless network. It stands for Service Set IDentity.
Chapter 8 Wireless LAN
If two wireless networks overlap, they should use a different channel. Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information. Every device in the same wireless network must use security compatible with the AP. Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network.
8.2 Wireless Security Overview
The following sections introduce different types of wireless security you can set up in the wireless network.
Normally, the ZyXEL Device acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the ZyXEL Device does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess. This type of security is fairly weak, however, because there are ways for unauthorized wireless devices to get the SSID. In addition, unauthorized wireless devices can still see the information that is sent in the wireless network.
8.2.2 MAC Address Filter
Every device that can use a wireless network has a unique identification number, called a MAC address.1 A MAC address is usually written using twelve hexadecimal characters2; for example, 00A0C5000002 or 00:A0:C5:00:00:02. To get the MAC address for each device in the wireless network, see the devices Users Guide or other documentation. You can use the MAC address filter to tell the ZyXEL Device which devices are allowed or not allowed to use the wireless network. If a device is allowed to use the wireless network, it still has to have the correct information (SSID, channel, and security). If a device is not allowed to use the wireless network, it does not matter if it has the correct information. This type of security does not protect the information that is sent in the wireless network. Furthermore, there are ways for unauthorized wireless devices to get the MAC address of an authorized device. Then, they can use that MAC address to use the wireless network.
12.2 General Firewall Policy Overview
Firewall rules are grouped based on the direction of travel of packets to which they apply: LAN to LAN/ Router LAN to WAN WAN to LAN WAN to WAN/ Router
The LAN includes both the LAN port and the WLAN.
By default, the ZyXEL Devices stateful packet inspection allows packets traveling in the following directions: LAN to LAN/ Router These rules specify which computers on the LAN can manage the ZyXEL Device (remote management) and communicate between networks or subnets connected to the LAN interface (IP alias).
You can also configure the remote management settings to allow only a specific computer to manage the ZyXEL Device.
LAN to WAN These rules specify which computers on the LAN can access which computers or services on the WAN. By default, the ZyXEL Devices stateful packet inspection drops packets traveling in the following directions: WAN to LAN These rules specify which computers on the WAN can access which computers or services on the LAN.
You also need to configure NAT port forwarding (or full featured NAT address mapping rules) to allow computers on the WAN to access devices on the LAN.
WAN to WAN/ Router By default the ZyXEL Device stops computers on the WAN from managing the ZyXEL Device or using the ZyXEL Device as a gateway to communicate with other computers on the WAN. You could configure one of these rules to allow a WAN computer to manage the ZyXEL Device.
You also need to configure the remote management settings to allow a WAN computer to manage the ZyXEL Device.
You may define additional rules and sets or modify existing ones but please exercise extreme caution in doing so. For example, you may create rules to: Block certain types of traffic, such as IRC (Internet Relay Chat), from the LAN to the Internet.
Allow certain types of traffic, such as Lotus Notes database synchronization, from specific hosts on the Internet to specific hosts on the LAN. Allow everyone except your competitors to access a web server. Restrict use of certain protocols, such as Telnet, to authorized users on the LAN. These custom rules work by comparing the source IP address, destination IP address and IP protocol type of network traffic to rules set by the administrator. Your customized rules take precedence and override the ZyXEL Devices default rules.
12.3 Security Considerations
Incorrectly configuring the firewall may block valid access or introduce security risks to the ZyXEL Device and your protected network. Use caution when creating or deleting firewall rules and test your rules after you configure them.
Consider these security ramifications before creating a rule: 1 Does this rule stop LAN users from accessing critical resources on the Internet? For example, if IRC is blocked, are there users that require this service? 2 Is it possible to modify the rule to be more specific? For example, if IRC is blocked for all users, will a rule that blocks just certain users be more effective? 3 Does a rule that allows Internet users access to resources on the LAN create a security vulnerability? For example, if FTP ports (TCP 20, 21) are allowed from the Internet to the LAN, Internet users may be able to connect to computers with running FTP servers. 4 Does this rule conflict with any existing rules? Once these questions have been answered, adding rules is simply a matter of entering the information into the correct fields in the web configurator screens.
14.4 IPSec and NAT
Read this section if you are running IPSec on a host computer behind the ZyXEL Device. NAT is incompatible with the AH protocol in both Transport and Tunnel mode. An IPSec VPN using the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash value appended to the packet. When using AH protocol, packet contents (the data payload) are not encrypted.
Chapter 14 Introduction to IPSec
A NAT device in between the IPSec endpoints will rewrite either the source or destination address with one of its own choosing. The VPN device at the receiving end will verify the integrity of the incoming packet by computing its own hash value, and complain that the hash value appended to the received packet doesn't match. The VPN device at the receiving end doesn't know about the NAT in the middle, so it assumes that the data has been maliciously altered. IPSec using ESP in Tunnel mode encapsulates the entire original packet (including headers) in a new IP packet. The new IP packet's source address is the outbound address of the sending VPN gateway, and its destination address is the inbound address of the VPN device at the receiving end. When using ESP protocol with authentication, the packet contents (in this case, the entire original packet) are encrypted. The encrypted contents, but not the new headers, are signed with a hash value appended to the packet. Tunnel mode ESP with authentication is compatible with NAT because integrity checks are performed over the combination of the "original header plus original payload," which is unchanged by a NAT device. Transport mode ESP with authentication is not compatible with NAT.
Table 60 VPN and NAT
SECURITY PROTOCOL AH AH ESP ESP MODE Transport Tunnel Transport Tunnel NAT N N N Y
This chapter introduces the VPN screens. See Chapter 23 on page 297 for information on viewing logs and the appendix for IPSec log descriptions.
15.1 VPN/IPSec Overview
Use the screens documented in this chapter to configure rules for VPN connections and manage VPN connections.
15.2 IPSec Algorithms
The ESP and AH protocols are necessary to create a Security Association (SA), the foundation of an IPSec VPN. An SA is built from the authentication provided by the AH and ESP protocols. The primary function of key management is to establish and maintain the SA between systems. Once the SA is established, the transport of data may commence.
15.2.1 AH (Authentication Header) Protocol
AH protocol (RFC 2402) was designed for integrity, authentication, sequence integrity (replay resistance), and non-repudiation but not for confidentiality, for which the ESP was designed. In applications where confidentiality is not required or not sanctioned by government encryption restrictions, an AH can be employed to ensure integrity. This type of implementation does not protect the information from dissemination but will allow for verification of the integrity of the information and authentication of the originator.
21.2.1 Configuring UPnP
Click Advanced > UPnP to display the screen shown next. See Section 21.1 on page 279 for more information.
Figure 176 Configuring UPnP
Table 103 Configuring UPnP
LABEL Active the Universal Plug and Play (UPnP) Feature DESCRIPTION Select this check box to activate UPnP. Be aware that anyone could use a UPnP application to open the web configurator's login screen without entering the ZyXEL Device's IP address (although you must still enter the password to access the web configurator). Select this check box to allow UPnP-enabled applications to automatically configure the ZyXEL Device so that they can communicate through the ZyXEL Device, for example by using NAT traversal, UPnP applications automatically reserve a NAT forwarding port in order to communicate with another UPnP enabled device; this eliminates the need to manually configure port forwarding for the UPnP enabled application.
Allow users to make configuration changes through UPnP
Chapter 21 Universal Plug-and-Play (UPnP) Table 103 Configuring UPnP
LABEL Apply Cancel DESCRIPTION Click Apply to save the setting to the ZyXEL Device. Click Cancel to return to the previously saved settings.
21.3 Installing UPnP in Windows Example
This section shows how to install UPnP in Windows Me and Windows XP. Installing UPnP in Windows Me Follow the steps below to install the UPnP in Windows Me. 1 Click Start and Control Panel. Double-click Add/Remove Programs. 2 Click on the Windows Setup tab and select Communication in the Components selection box. Click Details.
Figure 177 Add/Remove Programs: Windows Setup: Communication
3 In the Communications window, select the Universal Plug and Play check box in the Components selection box.
Chapter 21 Universal Plug-and-Play (UPnP) Figure 178 Add/Remove Programs: Windows Setup: Communication: Components
4 Click OK to go back to the Add/Remove Programs Properties window and click Next. 5 Restart the computer when prompted. Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 1 Click Start and Control Panel. 2 Double-click Network Connections. 3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components.
Figure 179 Network Connections
4 The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details.
Chapter 21 Universal Plug-and-Play (UPnP) Figure 180 Windows Optional Networking Components Wizard
EAP-MD5 Mutual Authentication Certificate Client Certificate Server Dynamic Key Exchange Credential Integrity Deployment Difficulty Client Identity Protection No No No No None Easy No EAP-TLS Yes Yes Yes Yes Strong Hard No EAP-TTLS Yes Optional Yes Yes Strong Moderate Yes PEAP Yes Optional Yes Yes Strong Moderate Yes LEAP Yes No No Yes Moderate Moderate No
WPA and WPA2
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA or WPA2 and WEP are improved data encryption and user authentication. If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical) password entered into each access point, wireless gateway and wireless client. As long as the passwords match, a wireless client will be granted access to a WLAN. If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2.
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA and WPA2 use Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server. AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit mathematical algorithm called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. This all happens in the background automatically. The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped. By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi network than WEP and difficult for an intruder to break into the network. The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but its still an improvement over WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP)
Types of Antennas for WLAN
There are two types of antennas used for wireless LAN applications. Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points. Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light from its bulb. The angle of the beam determines the width of the coverage pattern. Angles typically range from 20 degrees (very directional) to 120 degrees (less directional). Directional antennas are ideal for hallways and outdoor point-to-point applications.
In general, antennas should be mounted as high as practically possible and free of obstructions. In point-topoint application, position both antennas at the same height and in a direct line of sight to each other to attain the best performance. For omni-directional antennas mounted on a table, desk, and so on, point the antenna up. For omni-directional antennas mounted on a wall or ceiling, point the antenna down. For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. For directional antennas, point the antenna in the direction of the desired coverage area.
WiFi Protected Setup
Your ZyXEL Device supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Each WPS connection works between two devices. Both devices must support WPS (check each devices documentation to make sure). Depending on the devices you have, you can either press a button (on the device itself, or in its configuration utility) or enter a PIN (a unique Personal Identification Number that allows one device to authenticate the other) in each of the two devices. When WPS is activated on a device, it has two minutes to find another device that also has WPS activated. Then, the two devices connect and set up a secure network by themselves.
= 0 = 0.0.0.0 = 80
<0(all)|1(none)|2( Lan) |3(Wan)>
= 0 = 0.0.0.0
Table 169 Menu 23 System Menus
*/ Menu 23.1 System Password Setup FIN FN PVA INPUT
Appendix F Internal SPTGEN Table 169 Menu 23 System Menus (continued)
230000000 = FIN 230200001 = 230200002 = 230200003 = 230200004 = 230200005 = System Password FN Authentication Server Configured Authentication Server Active Authentication Server IP Address Authentication Server Port Authentication Server Shared Secret PVA <0(No) | 1(Yes)> <0(No) | 1(Yes)> = 1234 INPUT = 1 = 1 = 192.168.1.32 = 1822 = <0(No) | 1(Yes)> <0(No) | 1(Yes)> = 1 = 1 = 192.168.1.44 = 1823 = 1234 PVA <0(Authentication Required) |1(No Access Allowed) |2(No Authentication Required)> INPUT = 2
*/ Menu 23.2 System security: radius server
230200006 = 230200007 = 230200008 = 230200009 = 230200010 = FIN 230400001 =
Accounting Server Configured Accounting Server Active Accounting Server IP Address Accounting Server Port Accounting Server Shared Secret FN Wireless Port Control
*/ Menu 23.4 System security: IEEE802.1x
230400002 = 230400003 = 230400004 =
ReAuthentication Timer (in second) Idle Timeout (in second) Authentication Databases <0(Local User Database Only) |1(RADIUS Only) |2(Local,RADIUS) |3(RADIUS,Local)> <0(8021x) |1(WPA) |2(WPAPSK)> <0(Disable) |1(64bit WEP) |2(128-bit WEP)> <0(Disable) |1(Enable)> <0(TKIP) |1(WEP)>
= 555 = 999 = 1
230400005 = 230400006 =
Key Management Protocol Dynamic WEP Key Exchange
= 0 = 0
230400007 = 230400008 = 230400009 = 230400010 =
= = 0 = 0 = 0
WPA Mixed Mode Data Privacy for Broadcast/ Multicast packets WPA Broadcast/Multicast Key Update Timer
Table 170 Menu 24.11 Remote Management Control
/ Menu 24.11 Remote Management Control FIN 241100001 = 241100002 = 241100003 = 241100004 = 241100005 = 241100006 = 241100007 = 241100008 = 241100009 = FN TELNET Server Port TELNET Server Access TELNET Server Secured IP address FTP Server Port FTP Server Access FTP Server Secured IP address WEB Server Port WEB Server Access WEB Server Secured IP address <0(all)|1(none)|2( Lan) |3(Wan)> <0(all)|1(none)|2( Lan)|3(Wan)> <0(all)|1(none)|2( Lan)|3(Wan)> PVA INPUT = 23 = 0 = 0.0.0.0 = 21 = 0 = 0.0.0.0 = 80 = 0 = 0.0.0.0
FCC Radiation Exposure Statement This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11. To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons.
Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numrique de la classe B est conforme la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page.
3 Select the certification you wish to view from this page.
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http://www.zyxel.com/web/ support_warranty_info.php. Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products.
In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional offices are listed below (see also http:// www.zyxel.com/web/contact_us.php). Please have the following information ready when you contact an office. Required Information Product model and serial number. Warranty Information. Date that you received your device. Brief description of the problem and the steps you took to solve it.
Lexmark 730 Dslr-A230 Medieval-total WAR Silver Evo4 29PT8509 12 AVG 12 E-800 Cube-20X Astra 4700 M187DN Desktop F20 9309 TS UVW-1800 AV9000 Yamaha PB1 RZ-HV100K MPK-THJ Acer N300 Inspiron 300M Shiver 750 El52400 MRF280 35 880 EL-2901RH NW-E403 Expert M5285 AVR-3805 Motion IP5200R ML-3051 WD-1256RD 240-2 SD-206 AUS Bonneville 1997 SPP-A973 RX-V2600 PMR 510 IDP-3550 Server VGN-SZ640 Dell 1710 JG200 Motorokr Z6W SC4340 RL44wcps Samba Multi Esrt81 Fino 80 Receiver RL34egps SLV-675HF KX-T7630NE Axis 2400 DVD-E235 ESF43010 Super C8 GR-399SQ YP-S2QG DHC-MD5 Calligraphy 2 R-408JW Gzmg70AG-GZ-mg70 Touch 530 LE32A557 567 Singer 15 MHC-W555 KDC-W4537UY TH-42E 2700n G Watch A414 Brisbane SD48 C20SX Review 251-22 3000CP WD-1021WF Slide EW1080F SGH-X200 GSS-18 SUB Ethernet TH-50PH9 BH 200 EDC503M GTO936 KXF90 KDC-5021 KCA-420I-i-pod-space-interface I810E SCH-W550 RAK25NH4 Builder PRO 410 Kodak M550 Windoo P4P800S Mf550 MP160 RC-CD500
manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101