Product FAQ
General FAQ
Advanced FAQ
1. What is the G-4100 V2 Internet Access Sharing Router?
The G-4100 V2 hot Spot Gateway combines an
2. What is the coverage range of G-4100 V2?
The coverage range typically is
3. What is the range coverage of G-120/G-220/G-320?
The coverage range typically is
4. What can I do if I lost the password for my G-4100 V2 and can't access it's configuration any more?
If you have lost the password there is no way to gain access to the device except to reset the device by pressing the reset button located beside the power jack.
5. How do I used the reset button? Moreover what field of parameter will be reset by reset button?
You can used a sharp pointed object insert it into the little reset hole beside the power connector.
The procedures to reset the unit is as follow
Note: When the reset button is pressed all parameters will be reset back to factory default including ESSID, password, IP address, WEP Keys.
The basic default configuration after reset is as follow.
6. Why can't I configure G-120/G-220/G-320 with the supplied utility in Windows XP?
This is because XP uses it's default configuration for wireless adapter. You can disable it by entering Control Panel->Network and Dialup Connections->Wireless network connection->Advance and uncheck the use Windows to configure wireless configuration check box and click OK. Now you need to exit the supplied configuration utility in the Windows task bar and restart it again. Now you can use the supplied utility to configure your wireless client card.
7. What is the default user name and password to login the G-4100 V2 via the browser?
To restrict only the administrator can configure the router, there is a login procedure prompted for asking User Name and Password. The default User Name is 'admin' and the default password is the default SMT password, '1234'.
8. What do I need to use the G-4100 V2?
You need a ADSL modem or cable modem with an Ethernet port to use the G-4100 V2. The G-4100 V2 has two types of Ethernet ports: LAN port and WAN port. You should connect the computer to the any of the 4 port LAN switch and connect the external modem to the WAN port. If the ISP uses PPPoE Authentication you need the user account to enter in the G-4100 V2.
9. What is PPPoE?
PPPoE stands for Point-to-Point
Protocol Over Ethernet that
is an IETF draft standard specifying how a computer interacts with a broadband
modem (i.e. xDSL, cable, wireless, etc.) to achieve access to the high-speed
data networks via a familiar PPP dialer such as 'Dial-Up Networking' user
interface. PPPoE supports a broad range of existing applications and service
including authentication, accounting, secure access and configuration
management. There are some service providers running of PPPoE today. Before
configuring PPPoE in the G-4100 V2, please make sure your ISP supports PPPoE.
10. Does the G-4100 V2 support PPPoE?
Yes. The G-4100 V2 supports PPPoE.
11. How do I know I am using PPPoE?
PPPoE requires a user account to login to the provider's server. If you need to configure a user name and password on your computer to connect to the ISP you are probably using PPPoE. If you are simply connected to the Internet when you turn on your computer, you probably are not. You can also check your ISP or the information sheet given by the ISP. Please choose PPPoE as the encapsulation type in the G-4100 V2 if the ISP uses PPPoE.
12. Why does my provider use PPPoE?
PPPoE emulates a familiar Dial-Up connection. It allows your ISP to provide services using their existing network configuration over the broadband connections. Besides, PPPoE supports a broad range of existing applications and service including authentication, accounting, secure access and configuration management.
13. How can I manage the G-4100 V2 ?
14. What network interface does the G-4100 V2 support?
The G-4100 V2 supports 4 port auto MDX/MDIX 10/
15. What can we do with G-4100 V2 ?
Browse the World Wide Web (WWW), send and receive
individual e-mail, and download software. These are just a few of many benef
16. Does G-4100 V2 support dynamic IP addressing?
The G-4100 V2 supports either a static or dynamic IP address from ISP.
BOOTP stands for Bootstrap Protocol. DHCP stands for Dynamic Host Configuration Protocol. Both are mechanisms to dynamically assign an IP address for a TCP/IP client by the server. In this case, the G-4100 V2 Internet Access Sharing Router is a BOOTP/DHCP server. Windows base clients use DHCP to request an internal IP address, while WFW and WinSock clients use BOOTP. TCP/IP clients may specify their own IP or utilize BOOTP/DHCP to request an IP address.
18. What is the difference between the internal IP and the real IP from my ISP?
Internal IPs are sometimes referred to as virtual IPs. They are a group of up to 255 IPs that are used and recognized internally on the local area network. They are not intended to be recognized on the Internet. The real IP from ISP, instead, can be recognized or pinged by another real IP. The G-4100 V2 Internet Access Sharing Router works like an intelligent router that routes between the virtual IP and the real IP.
19. What DHCP capability does the G-4100 V2 support?
The G-4100 V2 supports DHCP client on the WAN port and DHCP server on the LAN port. The G-4100 V2's DHCP client allows it to get the Internet IP address from ISP automatically. The G-4100 V2's DHCP server allows it to automatically assign IP and DNS addresses to the clients on the local LAN.
20. What is the maximum number of wireless client can associated with G-4100 V2 simultaneously?
We did not limit the number of wireless client can associated with G-4100 V2 simultaneously, the suggest number are no more than 32, a good number is under 10 to ensure the performance of each wireless client.
Advanced FAQ
1. What is the default antenna type and gain on G-4100 V2?
The G-4100 V2 are equip with 2 diversity omni directional antenna with 2 dBi Gains.
2. Can I change the antenna on G-4100 V2?
Yes, you can change the antenna on G-4100 V2 to fit your implementation needs. To change antenna you must remove it first. You can remove the antenna by holding the outer ring of the antenna and turn it counter clock wise, and firmly remove the antenna from the G-4100 V2. To install it simply reverse the removing procedure.
3. What are the connector type required on the replacement antenna?
ZyAIR G-4100 V2 are equip with Reverse Polarity SMA jack, so it will work with any 2.4Ghz wireless antenna with Reverse Polarity SMA Plug.
4. What is the RF power output of G-4100 V2?
The output of G-4100 V2 is 18.1dBm or 65mW from the RF module.
5. What wireless security mechanism are supported by G-4100 V2?
ZyAIR G-4100 V2 supports below security mechanisms.
6. What is the Open System and Shared Key Authentication?
Open System:
The default authentication
service that simply announces the desire to associate with another station or
access point. A station can authenticate with any other station or access point
using open system authentication if the receiving station designates open
system authentication.
Share Key:
The optional authentication that involves a more rigorous exchange of
frames, ensuring that the requesting station is authentic. For a station to use
shared key authentication, it must implement WEP.
7. What Authentication Type does G-4100 V2 support?
ZyAIR G-4100 V2 support null authentication when WEP is disabled as specified by IEEE 802.11b standard, and when WEP is enabled it is using shared key authentication and data are encrypted at the same time.
8. Why is the supplied utility for G-120/G-220/G-320 keep on prompting "Invalid WEP key length" when I try to save my WEP configuration and I am sure the configuration is correct?
Please make sure all 4 set of keys are with correct and WEP key length are also correct. Do not leave any key field blank.
Note: Please make sure all 4 set of keys are consistent with the 4 set of keys configured in AP.
9. How does the G-4100 V2 support TFTP and FTP?
In addition to up load the firmware or configure via web GUI, you can also use TFTP or FTP to do so.
The speed of the cable modem is only one part of the equation. There are a combination of factors starting with how fast your PC can handle IP traffic, then how fast your PC to cable modem interface is, then how fast the cable modem system runs and how much congestion there is on the cable network, then how big a pipe there is at the head end to the rest of the Internet.
Different models of PCs and Macs are able to handle IP traffic at varying speeds. Very few can handle it at 30 Mbps.
Ethernet (10baseT) is the most popular cable modem
interface standard for the PC. This automatically lim
Cable modems on the same node share bandwidth, which means that congestion is created when too many people are on simultaneously. One user downloading large graphic or video files can use a significant portion of shared bandwidth, slowing down access for other users in the same neighborhood.
Most independent Internet Service Providers today connect to the Internet using a single 1.5 Mbps "T1" telephone line. All of their subscribers share that 1.5 Mbps pipeline. Cable head-ends connecting to the Internet backbone using a T1 limit their subscribers to an absolute maximum of 1.5 Mbps.
To create the appearance of faster network access, service companies plan to store or "cache" frequently requested web sites and Usenet newsgroups on a server at their head-end. Storing data locally will remove some of the bottleneck at the backbone connection.
How fast can they go? In a perfect world (or lab) they can receive data at speeds up to 30 Mbps. In the real world, with cost conscious cable companies running the systems, the speed will probably fall to about 1.5 Mbps.
11. My G-4100 V2 can not get an IP address from the ISP to connect to the Internet, what can I do?
Currently, there are various ways that ISPs control their users. That is, the WAN IP is provided only when the user is checked as an authorized user. The ISPs currently use three ways:
1. Check if the 'MAC address' is valid
2. Check if the 'Host Name' is valid, e.g., @home
3. Check if the 'User ID' is valid.
If you are not able to get the Internet IP from the ISP, check which authentication method your ISP.
12. How do I make VPN client x work through my G-4100 V2 ?
The only VPN known for certain to work through the G-4100
V2 is Microsoft PPTP, IPSec.
13. What is DDNS?
The Dynamic DNS service allows you to alias a dynamic IP address to a static hostname, allowing your computer to be more easily accessed from various locations on the Internet. To use the service, you must first apply an account from several free Web servers such as WWW.DYNDNS.ORG.
Without DDNS, we always tell the users to use the WAN IP of the G-4100 V2 to reach our internal server. It is inconvenient for the users if this IP is dynamic. With DDNS supported by the G-4100 V2, you apply a DNS name (e.g., www.zyxel.com.tw) for your server (e.g., Web server) from a DDNS server. The outside users can always access the web server using the www.zyxel.com.tw regardless of the WAN IP of the G-4100 V2.
When the ISP assigns the G-4100 V
14. When do I need DDNS service?
When you want your internal server to be accessed by using
DNS name rather than using the dynamic IP address we can use the DDNS service.
The DDNS server allows to alias a dynamic IP address to a static hostname.
Whenever the ISP assigns you a new IP, the G-4100 V2 sends this IP to the DDNS
server for
15. What DDNS servers does the G-4100 V2 support?
The DDNS servers the G-4100 V2 supports currently is www.dydns.com and www.changeip.com where you apply the DNS from and update the WAN IP to.
16. Can the G-4100 V2's SUA handle IPsec packets sent by the IPsec gateway?
Yes, the G-4100 V2's SUA can handle IPsec ESP Tunneling mode. We know when packets go through SUA, SUA will change the source IP address and source port for the host. To pass IPsec packets, SUA must understand the ESP packet with protocol number 50, replace the source IP address of the IPsec gateway to the router's WAN IP address. However, SUA should not change the source port of the UDP packets which are used for key managements. Because the remote gateway checks this source port during connections, the port thus is not allowed to be changed.
All contents copyright © 2006 ZyXEL Communications Corporation.