User manual ZYXEL FSG1100HN

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ZYXEL FSG1100HN. We hope that this ZYXEL FSG1100HN user guide will be useful to you.


ZYXEL FSG1100HN : Download the complete user guide (5151 Ko)

You may also download the following manuals related to this product:

   ZYXEL FSG1100HN BROCHURE (359 ko)
   ZYXEL FSG1100HN QUICK START GUIDE (1220 ko)

Manual abstract: user guide ZYXEL FSG1100HN

Detailed instructions for use are in the User's Guide.

[. . . ] FSG1100HN Wireless Active Fiber Router IP Address User Name Password http://192. 168. 1. 1 admin 1234 Firmware Version: 1. 0 Edition1, 3/2010 www. zyxel. com About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the FSG1100HN using the Web Configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Tips for Reading User's Guides On-Screen When reading a ZyXEL User's Guide On-Screen, keep the following in mind: · If you don't already have the latest version of Adobe Reader, you can download it from http://www. adobe. com. · Use the PDF's bookmarks to quickly navigate to the areas that interest you. Adobe Reader's bookmarks pane opens by default in all ZyXEL User's Guide PDFs. [. . . ] Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your device's IP address. Disable pop-up Blockers 1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 106 FSG1100HN User's Guide Appendix A Pop-up Windows, JavaScripts, and Java Permissions 2 In Internet Explorer, select Tools, Internet Options, Privacy. 3 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Internet Options: Privacy 4 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. FSG1100HN User's Guide 107 Appendix A Pop-up Windows, JavaScripts, and Java Permissions 2 Select Settings. . . to open the Pop-up Blocker Settings screen. Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix "http://". For example, http://192. 168. 167. 1. 108 FSG1100HN User's Guide Appendix A Pop-up Windows, JavaScripts, and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. FSG1100HN User's Guide 109 Appendix A Pop-up Windows, JavaScripts, and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Internet Options: Security 2 Click the Custom Level. . . 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 110 FSG1100HN User's Guide Appendix A Pop-up Windows, JavaScripts, and Java Permissions 6 Click OK to close the window. Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 4 Under Java permissions make sure that a safety level is selected. FSG1100HN User's Guide 111 Appendix A Pop-up Windows, JavaScripts, and Java Permissions 5 Click OK to close the window. Security Settings ­ Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected. 112 FSG1100HN User's Guide Appendix A Pop-up Windows, JavaScripts, and Java Permissions 3 Click OK to close the window. Java (Sun) FSG1100HN User's Guide 113 Appendix B IP Addresses and Subnetting B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. Every networking device (including computers, servers, routers, printers, etc. ) needs an IP address to communicate across the network. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple subnetworks. Introduction to IP Addresses One part of the IP address is the network number, and the other part is the host ID. In the same way that houses on a street share a common street name, the hosts on a network share a common network number. Similarly, as each house has its own house number, each host on the network has its own unique identifying number - the host ID. Routers use the network number to send packets to the correct network, while the host ID determines to which host on the network the packets are delivered. Structure An IP address is made up of four parts, written in dotted decimal notation (for example, 192. 168. 1. 1). An octet is an eight-digit binary number (for example 11000000, which is 192 in decimal notation). Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal. 114 FSG1100HN User's Guide Appendix B IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192. 168. 1) are the network number, and the fourth octet (16) is the host ID. Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation). If a bit in the subnet mask is a "1" then the corresponding bit in the IP address is part of the network number. If a bit in the subnet mask is "0" then the corresponding bit in the IP address is part of the host ID. The following example shows a subnet mask identifying the network number (in bold text) and host ID of an IP address (192. 168. 1. 2 in decimal). Subnet Mask - Identifying Network Number 1ST OCTET: (192) 11000000 11111111 2ND OCTET: (168) 10101000 11111111 3RD OCTET: (1) 00000001 11111111 4TH OCTET: (2) 00000010 00000000 IP Address (Binary) Subnet Mask (Binary) FSG1100HN User's Guide 115 Appendix B IP Addresses and Subnetting Subnet Mask - Identifying Network Number 1ST OCTET: (192) 11000000 2ND OCTET: (168) 10101000 3RD OCTET: (1) 00000001 4TH OCTET: (2) 00000010 Network Number Host ID By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a "1" value). [. . . ] Should the Original Code or the Documentation prove defective, You (and not GoAhead or its distributors, licensors or dealers) assume the entire cost of all necessary servicing or repair. GoAhead does not warrant that the functions contained in the Original Code will meet your requirements or operate in the combination that You may select for use, that the operation of the Original Code will be uninterrupted or error free, or that defects in the Original Code will be corrected. No oral or written statement by GoAhead or by a representative of GoAhead shall create a warranty or increase the scope of this warranty. GOAHEAD DOES NOT WARRANT THE ORIGINAL CODE AGAINST INFRINGEMENT OR THE LIKE WITH RESPECT TO ANY COPYRIGHT, PATENT, TRADE SECRET, TRADEMARK OR OTHER PROPRIETARY RIGHT OF ANY THIRD PARTY AND DOES NOT WARRANT THAT THE ORIGINAL CODE DOES NOT INCLUDE ANY VIRUS, SOFTWARE ROUTINE OR OTHER SOFTWARE DESIGNED TO PERMIT UNAUTHORIZED ACCESS, TO DISABLE, ERASE OR OTHERWISE HARM SOFTWARE, HARDWARE OR DATA, OR TO PERFORM ANY OTHER SUCH ACTIONS. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ZYXEL FSG1100HN




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ZYXEL FSG1100HN will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.