background image

 Chapter 10 Maintenance

NWA1000 Series User’s Guide

111

10.5  Password Screen

Use this screen to control access to your NWA by assigning a password to it. Click 

Maintenance > 

Password

. The following screen displays. 

Figure 58   

Maintenance > Password

The following table describes the labels in this screen.

Table 35   

Maintenance > Password

LABEL

DESCRIPTIONS

Current Password

Type in your existing system password.

New Password

Type your new system password. Note that as you type a password, the screen 
displays a dot (.) for each character you type.

Retype to Confirm

Retype your new system password for confirmation.

Apply

Click 

Apply

 to save your changes.

Cancel

Click 

Cancel 

to reload the previous configuration for this screen.

Summary of Contents for 100-NH

Page 1: ...eries NWA 1100 NH 1121 NI 1123 NI 1123 AC WLAN PoE Access Points Version 2 00 Edition 1 06 2014 Copyright 2014 ZyXEL Communications Corporation User s Guide Default Login Details LAN IP Address http 1...

Page 2: ...firmware features Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system Every effort has been made t...

Page 3: ...3 Contents Overview User s Guide 8 Introducing the NWA 9 Introducing the Web Configurator 18 Dashboard 24 Tutorial 28 Technical Reference 45 Monitor 46 Wireless LAN 51 LAN and VLAN 87 System 92 Log Se...

Page 4: ...WA 14 1 4 Configuring Your NWA s Security Features 15 1 4 1 Control Access to Your Device 15 1 4 2 Wireless Security 15 1 5 Good Habits for Managing the NWA 15 1 6 Hardware Connections 16 1 7 LED 16 C...

Page 5: ...7 4 3 1 Scenario 37 4 3 2 Configuring the NWA in MBSSID or Root AP Mode 38 4 3 3 Configuring the NWA in Wireless Client Mode 41 4 3 4 MAC Filter Setup 43 4 3 5 Testing the Connection and Troubleshooti...

Page 6: ...2 What You Can Do in the LAN IP Screen 87 7 3 What You Need to Know 87 7 4 VLAN Overview 89 7 5 What You Need to Know 89 7 6 LAN IP Screen 90 Chapter 8 System 92 8 1 Overview 92 8 2 What You Can Do in...

Page 7: ...10 8 1 Backup Configuration 115 10 8 2 Restore Configuration 115 10 8 3 Back to Factory Defaults 116 10 9 Restart Screen 116 Chapter 11 Troubleshooting 117 11 1 Power Hardware Connections and LEDs 11...

Page 8: ...8 PART I User s Guide...

Page 9: ...NWA is easy to install configure and use The embedded Web based configurator enables simple straightforward management and maintenance See the Quick Start Guide for instructions on how to make hardwa...

Page 10: ...and one or more wireless clients The Service Set IDentifier SSID is the name of a BSS In Multiple BSS MBSSID mode the NWA provides multiple virtual APs each forming its own BSS and using its own indi...

Page 11: ...ollowing figure VoIP_SSID users have QoS priority SSID01 is the wireless network for standard users and Guest_SSID is the wireless network for guest users In this example the guest user is forbidden a...

Page 12: ...e NWA NWA1000 Series User s Guide 12 In the figure below the printer can receive requests from the wired computer clients A and B via the NWA in Client mode Z using only the 2 4 GHz band Figure 3 Wire...

Page 13: ...security between the wireless clients and the AP or repeater If you do not enable repeater security traffic between APs is not encrypted When repeater security is enabled both APs and repeaters must u...

Page 14: ...both APs and repeaters must use the same pre shared key See Section 6 6 on page 72 for more details Once the security settings of peer sides match one another the connection between devices is made A...

Page 15: ...nt ensure you have enabled remote management only on the IP addresses services or interfaces you intended and that other remote management settings are disabled 1 4 2 Wireless Security Wireless device...

Page 16: ...u would not have to totally re configure the NWA You could simply restore your last configuration 1 6 Hardware Connections See your Quick Start Guide for information on making hardware connections 1 7...

Page 17: ...he WLAN is active Blinking The WLAN is transmitting or receiving data Off The WLAN is not active UPLINK Green On The port is connected Blinking The NWA is sending receiving data through the port Off T...

Page 18: ...orer 7 0 and later versions Mozilla Firefox 9 0 and later versions Safari 4 0 and later versions or Google Chrome 10 0 and later versions Allow pop up windows Enable JavaScript enabled by default Enab...

Page 19: ...ssword Click Login 5 You should see a screen asking you to change your password highly recommended as shown next Type a new password and retype it to confirm then click Apply Alternatively click Ignor...

Page 20: ...ou will lose all the settings you previously configured The password will be reset to 1234 Figure 9 The RESET Button 2 3 1 Methods of Restoring Factory Defaults You can erase the current configuration...

Page 21: ...NH screens as an example The screens may vary slightly for different models Figure 10 Status Screen of the Web Configurator As illustrated above the Web Configurator screen is divided into these parts...

Page 22: ...Use this screen to configure wireless security profiles on the NWA RADIUS Use this screen to configure up to four RADIUS profiles Layer 2 Isolation Use this screen to configure the MAC addresses of t...

Page 23: ...n and configuration fields It is discussed in the rest of this document Configuration File Use this screen to backup and restore your device s configuration settings or reset the factory default setti...

Page 24: ...nu Use the Dashboard screen to look at the current status of the device system resources and interfaces The Dashboard screens also provide detailed information about system statistics associated wirel...

Page 25: ...Chapter 3 Dashboard NWA1000 Series User s Guide 25 Click Dashboard The following screen displays Figure 11 The Dashboard Screen NWA1100 NH Figure 12 The Dashboard Screen NWA1123 NI or NWA1123 AC...

Page 26: ...his displays the MAC Media Access Control address of the NWA on the LAN Every network device has a unique MAC address which identifies it across the network IPv4 Address This field displays the curren...

Page 27: ...ys each interface of the NWA Status This field indicates whether or not the NWA is using the interface For each interface this field displays Up when the NWA is using the interface and Down when the N...

Page 28: ...access a wireless network See Section 1 2 2 on page 11 for details Use Root AP operating mode if you want to allow wireless clients to access your wired network through the NWA and also have repeaters...

Page 29: ...profiles 2 Change the operating mode from Root AP to MBSSID and reactivate the standard network 3 Configure different security modes for the networks 4 Configure a wireless network for standard office...

Page 30: ...is example 4 2 1 Configure the SSID Profiles 1 Log in to the NWA see Section 2 2 on page 18 Click Wireless LAN SSID The SSID screen appears 2 Click the Edit icon next to the Profile1 3 Rename the Prof...

Page 31: ...m the Operation Mode drop down list box 2 SSID01 is the standard network so select SSID01 as the first profile It is always active 3 Select VoIP_SSID as the second profile and Guest_SSID as the third...

Page 32: ...1 as SSID01 s security profile Select the Hidden SSID checkbox as you want only authorized company employees to use this network so there is no need to broadcast the SSID to wireless clients scanning...

Page 33: ...ore secure security mode Select WPA2 PSK MIX as the Security Mode and enter the Pre Shared Key In this example use ThisisSSID01PreSharedKey Click Apply 5 You have finished configuring the standard net...

Page 34: ...ial NWA1000 Series User s Guide 34 3 Select WMM_VOICE in the QoS field to give VoIP the highest priority in the wireless network Click Apply 4 Next click Wireless LAN Security Click the Edit icon next...

Page 35: ...e your primary concern is to keep your network secure while allowing access to certain resources such as a network printer or the Internet For this reason the pre configured Guest_SSID profile has int...

Page 36: ...ect WPA2 PSK in the Security Mode field WPA2 PSK provides strong security that is supported by most wireless clients Even though your Guest_SSID clients do not have access to sensitive information on...

Page 37: ...network using the correct security settings and then using incorrect security settings such as the WPA2 PSK for another active network If the behavior is different from expected for example if you can...

Page 38: ...evices X must not be able to connect to the FTP server Figure 13 FTP Server Connected to a Wireless Client 4 3 2 Configuring the NWA in MBSSID or Root AP Mode Before setting up the NWA as a wireless c...

Page 39: ...Configurator on NWA A and go to the Wireless LAN Wireless Settings screen 1 Set the Operation Mode to Root AP 2 Select the Wireless Mode In this example select 802 11b g n 3 Select Profile1 as the SSI...

Page 40: ...s LAN SSID Click the Edit icon next to Profile1 7 Change the SSID to AP A 8 Select SecProfile1 in the Security field 9 Select the check box for Intra BSS Traffic blocking Enabled so the client cannot...

Page 41: ...dKey in the Pre Shared Key field 13 Click Apply to finish configuration for NWA A 4 3 3 Configuring the NWA in Wireless Client Mode The NWA B should have a wired connection before it can be set to wir...

Page 42: ...ient as Operation Mode Click Apply Site Survey button appears next to the drop down list 2 Click on the Site Survey button A window should pop up which contains a list of all available wireless device...

Page 43: ...nly specified wireless clients can access the FTP server is by enabling MAC filtering on NWA B See Section 6 9 on page 82 for more information on MAC Filter 1 Go to Wireless LAN MAC Filter Click the E...

Page 44: ...e a file If you cannot establish a connection with the FTP server do the following steps 1 Make sure W Y and Z use the same wireless security settings as A and can access A 2 Make sure B uses the same...

Page 45: ...45 PART II Technical Reference The appendices provide general information Some details may not apply to your NWA...

Page 46: ...ies are all used the log will wrap around and the old logs will be deleted use the Statistics screen to view 802 11 mode channel number wireless packet specific statistics and so on see Section 5 4 on...

Page 47: ...ogs from all of the log categories that you selected in the Configuration Log Settings screen E Mail Log Now Click E Mail Log Now to send the log screen to the e mail address specified in the Log Sett...

Page 48: ...Statistics LABEL DESCRIPTION Description This is the wireless interface on the NWA 802 11 Mode This field shows which 802 11 mode the NWA is using Channel ID This shows the channel number which the N...

Page 49: ...tely avoid overlap Click Monitor Channel Usage to display the screen shown next Table 8 Association List LABEL DESCRIPTION This is the index number of an associated wireless device MAC Address This fi...

Page 50: ...SS and extended service sets ESS Channel This is the index number of the channel currently used by the associated AP in an Infrastructure wireless network or wireless station in an Ad Hoc wireless net...

Page 51: ...WA 6 2 What You Can Do in this Chapter Use the Wireless Settings screen to configure the NWA s operation mode see Section 6 4 on page 56 Use the SSID screen to configure up to eight SSID profiles for...

Page 52: ...and increase a root AP s wireless coverage area Client The NWA acts as a wireless client to access a wireless network MBSSID The Multiple Basic Service Set Identifier MBSSID mode allows you to use on...

Page 53: ...access point to provide several BSSs simultaneously You can then assign varying levels of privilege to different SSIDs Wireless stations can use different BSSIDs to associate with the same AP The foll...

Page 54: ...can use that user name and password to use the wireless network The following table shows the relative effectiveness of wireless security methods The available security modes in your NWA are as follo...

Page 55: ...ed key making the information readable only to him The NWA when used as a wireless client employs Temporal Key Integrity Protocol TKIP data encryption EAP Extensible Authentication Protocol EAP is a p...

Page 56: ...ey are connected to the network Accounting which keeps track of the client s network activity RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client a...

Page 57: ...llowing screen displays Figure 22 Wireless LAN Wireless Settings Root AP The following table describes the general wireless LAN labels in this screen Table 11 Wireless LAN Wireless Settings Root AP LA...

Page 58: ...channel uses two standard channels and offers speeds of up to 300Mbps However not all devices support 40MHz channels Select the channel bandwidth you want to use for your wireless network It is recomm...

Page 59: ...provide more reliable communications in busy wireless networks RTS CTS Threshold Request To Send The threshold number of bytes for enabling RTS CTS handshake Data with its frame size larger than this...

Page 60: ...the wireless network performance in terms of throughput For each MCS Rate 0 15 select either Enabled to have the NWA use the data rate Clear the Enabled check box if you do not want the NWA to use th...

Page 61: ...ce which also must be in Repeater or Root AP mode Figure 23 Wireless LAN Wireless Settings Repeater The following table describes the bridge labels in this screen Table 12 Wireless LAN Wireless Settin...

Page 62: ...andard channels and offers speeds of up to 300Mbps However not all devices support 40MHz channels Select the channel bandwidth you want to use for your wireless network It is recommended that you sele...

Page 63: ...e may decrease your wireless performance A MPDU Aggregation This field is available only when 802 11n 802 11b g n 802 11a n or 802 11a n ac is selected as the Wireless Mode Select to enable A MPDU agg...

Page 64: ...less LAN labels in this screen Table 13 Wireless LAN Wireless Settings Wireless Client LABEL DESCRIPTION Basic Settings Wireless LAN Interface Select the check box to turn on the wireless LAN on the N...

Page 65: ...support channel bonding Advanced Settings Output Power Set the output power of the NWA in this field If there is a high density of APs in an area decrease the output power of the NWA to reduce interfe...

Page 66: ...ed between data transmission from users in order to reduce interference Reducing the GI increases data transfer rates but also increases interference Increasing the GI reduces data transfer rates but...

Page 67: ...on Mode The following screen diplays Figure 25 Wireless LAN Wireless Settings MBSSID The following table describes the labels in this screen Table 14 Wireless LAN Wireless Settings MBSSID LABEL DESCRI...

Page 68: ...ther wireless devices in your neighborhood or the wireless clients do not support channel bonding Select SSID Profile The SSID Service Set IDentifier identifies the Service Set with which a wireless s...

Page 69: ...their 802 11n headers and wraps them in a 802 11n MAC header This method is useful for increasing bandwidth throughput in environments that are prone to high error rates Short GI This field is availab...

Page 70: ...ent can connect When a wireless client scans for an AP to associate with this is the name that is broadcast and seen in the wireless client utility Security This field indicates which security profile...

Page 71: ...ans for an AP to associate with this is the name that is broadcast and seen in the wireless client utility Security Select a security profile to use with this SSID profile See Section 6 6 on page 72 f...

Page 72: ...h the VLAN ID number by the NWA Number of Wireless Stations Allowed to Associate Use this field to set a maximum number of wireless stations that may connect to the device Hidden SSID If you do not se...

Page 73: ...ding upon the security mode you select Figure 29 Security None Note that some screens display differently depending on the operating mode selected in the Wireless LAN Wireless Settings Network Wireles...

Page 74: ...screen Table 17 Security WEP LABEL DESCRIPTION Profile Name This is the name that identifying this profile Security Mode Choose WEP in this field Authentication Type Select Open or Shared from the dr...

Page 75: ...a Both the NWA and the wireless stations must use the same WEP key for data transmission If you chose 64 bit WEP then enter any 5 ASCII characters or 10 hexadecimal characters 0 9 A F If you chose 128...

Page 76: ...urn reauthentication off Note If wireless station authentication is done using a RADIUS server the reauthentication timer on the RADIUS server has priority Enable Group Key Update Group Key Timer is t...

Page 77: ...ing a RADIUS server the reauthentication timer on the RADIUS server has priority Enter how often the external authentication server requires a connected wireless client to reauthenticate itself to the...

Page 78: ...erver settings Click Wireless LAN RADIUS The screen appears as shown Figure 34 Wireless LAN RADIUS Back Click Back to return to the previous screen Apply Click Apply to save your changes Cancel Click...

Page 79: ...he check box to enable user authentication through an external authentication server Primary Server IP Address Enter the IP address of the RADIUS server to be used for authentication Primary Server Po...

Page 80: ...The key must be the same on the external authentication server and your NWA The key is not sent over the network Primary Accounting Server Select the check box to enable user accounting through an ext...

Page 81: ...in the layer 2 isolation table are blocked from communicating with the NWA s wireless clients except for broadcast packets Layer 2 isolation does not check the traffic between wireless clients that ar...

Page 82: ...haracters for example 00 A0 C5 00 00 02 You need to know the MAC address of each device to configure MAC filtering on the NWA Table 22 Wireless LAN Layer 2 Isolation LABEL DESCRIPTION Index This is th...

Page 83: ...Internet because its MAC address is in the allowed association list specified in the NWA The MAC address of client A is either denied association or is not in the list of allowed wireless clients spec...

Page 84: ...be allowed or denied access to the NWA Back Click Back to return to the previous screen Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh TERM DESCRIP...

Page 85: ...other wireless access points on your wireless network you can enable this option so that wireless devices can change locations without having to log in again This is useful for devices such as noteboo...

Page 86: ...ients but no RADIUS server Use WPA2 security if you have WPA2 aware wireless clients and a RADIUS server WPA2 has user authentication and improved data encryption over WEP If you don t have WPA2 aware...

Page 87: ...ure 41 IPv4 Setup The figure above illustrates one possible setup of your NWA The gateway IPv4 address is 192 168 1 1 and the IPv4 address of the NWA is 192 168 1 2 default The gateway and the device...

Page 88: ...0 1a2f 0015 2001 db8 1a2f 0 0 15 or 2001 db8 0 0 1a2f 15 Prefix and Prefix Length Similar to an IPv4 subnet mask IPv6 uses an address prefix to represent the network address An IPv6 prefix length spec...

Page 89: ...Unit MTU applications VLAN is vital in providing isolation and security among the subscribers When properly configured VLAN prevents one subscriber from accessing the network resources of another on t...

Page 90: ...y the DHCP server to access the NWA again Use Fixed IP Address Select this option if your NWA is using a static IPv4 address When you select this option fill in the fields below IP Address Enter the I...

Page 91: ...ble VLAN tagging on the NWA Management VLAN ID Enter a number from 1 to 4094 to define the NWA s management VLAN group As Native VLAN Click this check box to enable As Native VLAN If enabled only unta...

Page 92: ...the NWA A is being managed by a desktop computer B connected via LAN Land Area Network It is also being accessed by a notebook C connected via WLAN Wireless LAN 8 2 What You Can Do in this Chapter Us...

Page 93: ...iew text files usually referred to as pages using your web browser via HyperText Transfer Protocol HTTP Telnet Telnet is short for Telecommunications Network which is a client side protocol that enabl...

Page 94: ...NMP management SNMP managers can be required to authenticate with agents before conducting SNMP management sessions Security can be further enhanced by encrypting the SNMP messages sent from the manag...

Page 95: ...NWA should be in PFX PKCS 12 file format This format referred to as the Personal Information Exchange Syntax Standard is comprised of a private key public certificate pair that is further encrypted w...

Page 96: ...dress 8443 as the URL Secure Access Control Select the interface s through which a computer may access the NWA using WWW and to which the IP and MAC filtering rules you specified below are applied Oth...

Page 97: ...stem Telnet Table 29 System Certificates LABEL DESCRIPTION Import Certificate Import Certificate Enter the location of a previously saved certificate to upload to the NWA Alternatively click the Brows...

Page 98: ...to allow any computer to access the NWA through any interface using Telnet Secured Client IP Address A secured client is a trusted computer that is allowed to communicate with the NWA using this servi...

Page 99: ...screen to have a manager station administrate your NWA over the network and configure SNMP accounts on the SNMP v3 manager A SNMP administrator user is a SNMP manager To change your NWA s SNMP settin...

Page 100: ...ess the NWA The SNMP version on the NWA must match the version on the SNMP manager Get Community Enter the Get Community which is the password for the incoming Get and GetNext requests from the manage...

Page 101: ...ss Type Specify the SNMP user s access rights to MIBs Read Only The SNMP user has read rights only meaning the user can collect information from the NWA Read Write The SNMP user has read and write rig...

Page 102: ...t Secure Access Control Select the interface s through which a computer may access the NWA using this service and to which the IP and MAC filtering rules you specified below are applied Otherwise sele...

Page 103: ...are often referred to as digital signatures Only you can write your signature exactly as it should look When people know what your signature looks like they can verify whether something was signed by...

Page 104: ...rint to verify that you have the actual certificate 1 Browse to where you have the certificate saved on your computer 2 Make sure that the certificate has a cer or crt file name extension Figure 52 Ce...

Page 105: ...origin can be traced Logs are also essential for auditing and keeping track of changes made by users Figure 54 Accessing Logs in the Network The figure above illustrates three ways to access logs The...

Page 106: ...re displayed in black Receiving Logs via E mail If you want to receive logs in your e mail account you need to have the necessary details ready such as the Server Name or Simple Mail Transfer Protocol...

Page 107: ...IPTION E mail Log Settings Mail Server Enter the server name or the IP address of the mail server for the e mail addresses specified below If this field is left blank logs and alert messages will not...

Page 108: ...Log Schedule This drop down menu is used to configure the frequency of log messages being sent as E mail When Log is Full Hourly Daily Weekly None If the Weekly or the Daily option is selected specify...

Page 109: ...vice 10 2 What You Can Do in this Chapter Use the General screen to specify the system name see Section 10 4 on page 110 Use the Password screen to manage the password for your NWA see Section 10 5 on...

Page 110: ...General Screen Use the General screen to identify your NWA over the network Click Maintenance General The following screen displays Figure 57 Maintenance General The following table describes the lab...

Page 111: ...table describes the labels in this screen Table 35 Maintenance Password LABEL DESCRIPTIONS Current Password Type in your existing system password New Password Type your new system password Note that a...

Page 112: ...Update you can manually enter the new time in this field and then click Apply Current Date This field displays the last updated date from the time server When you disable NTP Client Update you can man...

Page 113: ...Union on the last Sunday of March All of the time zones in the European Union start using Daylight Saving at the same time 1 A M GMT or UTC Therefore you should select Last Sunday March The time you t...

Page 114: ...ected After the upload was finished log in again and check your new firmware version in the Dashboard screen 10 8 Configuration File Screen Use this screen to backup restore and reset the configuratio...

Page 115: ...eturn to your previous settings Click Backup to save the NWA s current configuration to your computer 10 8 2 Restore Configuration Restore configuration allows you to upload a new or previously saved...

Page 116: ...to set up your computer s IP address 10 8 3 Back to Factory Defaults Pressing the Reset button in this section clears all user entered configuration information and returns the NWA to its factory def...

Page 117: ...the NWA 2 Make sure the power adaptor or cord is connected to the NWA and plugged in to an appropriate power source Make sure the power source is turned on 3 Disconnect and re connect the power adapt...

Page 118: ...u changed the IP address Section 7 6 on page 90 use the new IP address If you changed the IP address and have forgotten it see the troubleshooting suggestions for I forgot the IP address for the NWA 2...

Page 119: ...e Section 2 3 on page 20 I cannot use FTP to upload new firmware See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator Ignore the suggestions about yo...

Page 120: ...trength If the signal is weak try moving the NWA in wireless client mode closer to the AP if possible and look around to see if there are any devices that might be interfering with the wireless networ...

Page 121: ...Chapter 11 Troubleshooting NWA1000 Series User s Guide 121 5 Check that both the NWA and your wireless client are using the same wireless and wireless security settings...

Page 122: ...nd all versions of UNIX LINUX include the software components you need to use TCP IP on your computer If you manually assign IP information instead of using a dynamic IP make sure that your network s...

Page 123: ...ing Up Your Computer s IP Address NWA1000 Series User s Guide 123 1 Click Start Control Panel 2 In the Control Panel click the Network Connections icon 3 Right click Local Area Connection and then sel...

Page 124: ...Appendix A Setting Up Your Computer s IP Address NWA1000 Series User s Guide 124 4 On the General tab select Internet Protocol TCP IP and then click Properties...

Page 125: ...you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided 7 Click OK to close the Internet Protocol TCP IP...

Page 126: ...ddress NWA1000 Series User s Guide 126 Windows Vista This section shows screens from Windows Vista Professional 1 Click Start Control Panel 2 In the Control Panel click the Network and Internet icon 3...

Page 127: ...1000 Series User s Guide 127 4 Click Manage network connections 5 Right click Local Area Connection and then select Properties Note During this procedure click Continue whenever Windows displays a scr...

Page 128: ...Appendix A Setting Up Your Computer s IP Address NWA1000 Series User s Guide 128 6 Select Internet Protocol Version 4 TCP IPv4 and then select Properties...

Page 129: ...u by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided Click Advanced 9 Click OK to close the Internet Pr...

Page 130: ...A1000 Series User s Guide 130 Windows 7 This section shows screens from Windows 7 Enterprise 1 Click Start Control Panel 2 In the Control Panel click View network status and tasks under the Network an...

Page 131: ...s IP Address NWA1000 Series User s Guide 131 4 Double click Local Area Connection and then select Properties Note During this procedure click Continue whenever Windows displays a screen saying that i...

Page 132: ...Appendix A Setting Up Your Computer s IP Address NWA1000 Series User s Guide 132 5 Select Internet Protocol Version 4 TCP IPv4 and then select Properties...

Page 133: ...fields if you have a static IP address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information w...

Page 134: ...mputer s IP Address NWA1000 Series User s Guide 134 3 The IP settings are displayed as follows Mac OS X 10 3 and 10 4 The screens in this section are from Mac OS X 10 4 but can also apply to 10 3 1 Cl...

Page 135: ...r s IP Address NWA1000 Series User s Guide 135 2 In the System Preferences window click the Network icon 3 When the Network preferences pane opens select Built in Ethernet from the network connection...

Page 136: ...CP from the Configure IPv4 list in the TCP IP tab 5 For statically assigned settings do the following From the Configure IPv4 list select Manually In the IP Address field type your IP address In the S...

Page 137: ...P IP properties by clicking Applications Utilities Network Utilities and then selecting the appropriate Network Interface from the Info tab Figure 67 Mac OS X 10 4 Network Utility Mac OS X 10 5 and 10...

Page 138: ...2 In System Preferences click the Network icon 3 When the Network preferences pane opens select Ethernet from the list of available connection types 4 From the Configure list select Using DHCP for dy...

Page 139: ...A1000 Series User s Guide 139 From the Configure list select Manually In the IP Address field enter your IP address In the Subnet Mask field enter your subnet mask In the Router field enter the IP add...

Page 140: ...This section shows you how to configure your computer s TCP IP settings in the GNU Object Model Environment GNOME using the Ubuntu 8 Linux distribution The procedure screens and file locations may var...

Page 141: ...indow opens click Unlock to open the Authenticate window By default the Unlock button is greyed out until clicked You cannot make changes to your configuration unless you first enter your admin passwo...

Page 142: ...5 The Properties dialog box opens In the Configuration list select Automatic Configuration DHCP if you have a dynamic IP address In the Configuration list select Static IP address if you have a stati...

Page 143: ...ddress NWA1000 Series User s Guide 143 7 If you know your DNS server IP address es click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided 8 C...

Page 144: ...ure 69 Ubuntu 8 Network Tools Linux openSUSE 10 3 KDE This section shows you how to configure your computer s TCP IP settings in the K Desktop Environment KDE using the openSUSE 10 3 Linux distributio...

Page 145: ...x A Setting Up Your Computer s IP Address NWA1000 Series User s Guide 145 1 Click K Menu Computer Administrator Settings YaST 2 When the Run as Root KDE su dialog opens enter the admin password and cl...

Page 146: ...s Guide 146 3 When the YaST Control Center window opens select Network Devices and then click the Network Card icon 4 When the Network Settings window opens click the Overview tab select the appropria...

Page 147: ...lick the Address tab Figure 70 openSUSE 10 3 Network Card Setup 6 Select Dynamic Address DHCP if you have a dynamic IP address Select Statically assigned IP Address if you have a static IP address Fil...

Page 148: ...tab in Network Settings and then enter the DNS server information in the fields provided 9 Click Finish to save your settings and close the window Verifying Settings Click the KNetwork Manager icon on...

Page 149: ...uter s IP Address NWA1000 Series User s Guide 149 When the Connection Status KNetwork Manager window opens click the Statistics tab to see if your connection is working properly Figure 72 openSUSE Con...

Page 150: ...ons may vary Internet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allo...

Page 151: ...of the screen This disables any web pop up blockers you may have enabled Figure 74 Internet Options Privacy 3 Click Apply to save this setting Enable Pop up Blockers with Exceptions Alternatively if y...

Page 152: ...000 Series User s Guide 152 2 Select Settings to open the Pop up Blocker Settings screen Figure 75 Internet Options Privacy 3 Type the IP address of your device the web page that you do not want to ha...

Page 153: ...k Add to move the IP address to the list of Allowed sites Figure 76 Pop up Blocker Settings 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting JavaScript If pages of the...

Page 154: ...lorer click Tools Internet Options and then the Security tab Figure 77 Internet Options Security 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that Enab...

Page 155: ...ck OK to close the window Figure 78 Security Settings Java Scripting Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button 3...

Page 156: ...ons NWA1000 Series User s Guide 156 5 Click OK to close the window Figure 79 Security Settings Java JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sure...

Page 157: ...re 80 Java Sun Mozilla Firefox Mozilla Firefox 2 0 screens are used here Screens for other versions may vary slightly The steps below apply to Mozilla Firefox 3 0 as well You can enable Java Javascrip...

Page 158: ...ns NWA1000 Series User s Guide 158 Click Content to show the screen below Select the check boxes as shown in the following screen Figure 82 Mozilla Firefox Content Security Opera Opera 10 screens are...

Page 159: ...references In the General tab go to Choose how you prefer to handle pop ups and select Open all pop ups Figure 83 Opera Allowing Pop Ups Enabling Java From Opera click Tools then Preferences In the Ad...

Page 160: ...aScript and Java Permissions NWA1000 Series User s Guide 160 To customize JavaScript behavior in the Opera browser click JavaScript Options Figure 85 Opera JavaScript Options Select the items you want...

Page 161: ...er and the other part is the host ID In the same way that houses on a street share a common street name the hosts on a network share a common network number Similarly as each house has its own house n...

Page 162: ...32 bits If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network number If a bit in the subnet mask is 0 then the corresponding bit in the IP address is...

Page 163: ...le As these two IP addresses cannot be used for individual hosts calculate the maximum number of possible hosts in a network as follows Notation Since the mask is always a continuous number of ones be...

Page 164: ...g a maximum of 28 2 or 254 possible hosts The following figure shows the company network before subnetting Figure 87 Subnetting Example Before Subnetting You can borrow one of the host ID bits to divi...

Page 165: ...2 168 1 1 and the highest is 192 168 1 126 Similarly the host ID range for subnet B is 192 168 1 129 to 192 168 1 254 Example Four Subnets The previous example illustrated using a 25 bit subnet mask t...

Page 166: ...192 168 1 127 Highest Host ID 192 168 1 126 Table 45 Subnet 3 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet...

Page 167: ...225 254 255 Table 48 24 bit Network Number Subnet Planning NO BORROWED HOST BITS SUBNET MASK NO SUBNETS NO HOSTS PER SUBNET 1 255 255 255 128 25 2 126 2 255 255 255 192 26 4 62 3 255 255 255 224 27 8...

Page 168: ...d to change the subnet mask computed by the NWA unless you are instructed to do otherwise Private IP Addresses Every machine on the Internet must have a unique address If your networks are isolated fr...

Page 169: ...f 0000 0000 0015 can be written as 2001 0db8 1a2f 0000 0000 0015 2001 0db8 0000 0000 1a2f 0015 2001 db8 1a2f 0 0 15 or 2001 db8 0 0 1a2f 15 Prefix and Prefix Length Similar to an IPv4 subnet mask IPv6...

Page 170: ...group Multicast scope allows you to determine the size of the multicast group A multicast address has a predefined prefix of ff00 8 The following table describes some of the predefined multicast addr...

Page 171: ...of the first byte of the MAC address See the following example Stateless Autoconfiguration With stateless autoconfiguration in IPv6 addresses can be uniquely and automatically generated Unlike DHCPv6...

Page 172: ...ach IA holds one type of address IA_NA means an identity association for non temporary addresses and IA_TA is an identity association for temporary addresses An IA_NA option contains the T1 and T2 fie...

Page 173: ...ages types Neighbor solicitation A request from a host to determine a neighbor s link layer address MAC address and detect if the neighbor is still reachable A neighbor being reachable means it respon...

Page 174: ...sion 2 IGMPv2 MLD uses ICMPv6 message types rather than IGMP message types MLDv1 is equivalent to IGMPv2 and MLDv2 is equivalent to IGMPv3 MLD allows an IPv6 switch or router to discover the presence...

Page 175: ...HCPv6 for IP address assignment you have to additionally install a DHCPv6 client software on your Windows XP Note If you use static IP addresses or Router Advertisement for IPv6 address assignment in...

Page 176: ...Example Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer To enable IPv6 in Windows 7 1 Select Control Panel Network an...

Page 177: ...r dynamic IPv6 address This example shows a global address 2001 b021 2d 1000 obtained from a DHCP server C ipconfig Windows IP Configuration Ethernet adapter Local Area Connection Connection specific...

Page 178: ...ch is commonly referred to as an ad hoc network or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an ad hoc wireless LA...

Page 179: ...ESS consists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution Sy...

Page 180: ...uce interference Interference occurs when radio signals from different access points overlap causing interference and degrading performance Adjacent channels partially overlap however To avoid interfe...

Page 181: ...fy them to defer their transmission It also reserves and confirms with the requesting station the time frame for the requested transmission Stations can send frames smaller than the specified RTS CTS...

Page 182: ...a has a data rate of up to 54 Mbps using the 5 GHz band IEEE 802 11a is not interoperable with IEEE 802 11b or IEEE 802 11g IEEE 802 11n can operate both in the 2 4 GHz and 5 GHz bands and is backward...

Page 183: ...rver Support for EAP Extensible Authentication Protocol RFC 2486 that allows additional authentication methods to be deployed with no changes to the access point or the wireless clients RADIUS RADIUS...

Page 184: ...ey password information exchanged is also encrypted to protect the network from unauthorized access Types of EAP Authentication This section discusses some popular authentication types EAP MD5 EAP TLS...

Page 185: ...overhead EAP TTLS Tunneled Transport Layer Service EAP TTLS is an extension of the EAP TLS authentication that uses certificates for only the server side authentications to establish a secure connect...

Page 186: ...encryption than TKIP with Advanced Encryption Standard AES in the Counter mode with Cipher block chaining Message authentication code Protocol CCMP TKIP uses 128 bit keys that are dynamically generat...

Page 187: ...handshake and shortens the time required to connect to a network These two features are optional and may not be supported in all wireless devices Key caching allows a wireless client to store the PMK...

Page 188: ...h RADIUS Application Example WPA2 PSK Application Example A WPA2 PSK application looks as follows 1 First enter identical passwords into the AP and all wireless clients The Pre Shared Key PSK must con...

Page 189: ...n how you configure these security features Antenna Overview An antenna couples RF signals onto air A transmitter within a wireless device sends an RF signal to the antenna which propagates the signal...

Page 190: ...rue gain that the antenna provides Types of Antennas for WLAN There are two types of antennas used for wireless LAN applications Omni directional antennas send the RF signal out in all directions on a...

Page 191: ...Appendix E Wireless LANs NWA1000 Series User s Guide 191 For directional antennas point the antenna in the direction of the desired coverage area...

Page 192: ...se have the following information ready when you contact an office Required Information Product model and serial number Warranty Information Date that you received your device Brief description of the...

Page 193: ...el com pk Philipines ZyXEL Philippines http www zyxel com ph Singapore ZyXEL Singapore Pte Ltd http www zyxel com sg Taiwan ZyXEL Communications Corporation http www zyxel com Thailand ZyXEL Thailand...

Page 194: ...nications Czech s r o http www zyxel cz Denmark ZyXEL Communications A S http www zyxel dk Estonia ZyXEL Estonia http www zyxel com ee et Finland ZyXEL Communications http www zyxel fi France ZyXEL Fr...

Page 195: ...yXEL Communications http www zyxel no Poland ZyXEL Communications Poland http www zyxel pl Romania ZyXEL Romania http www zyxel com ro ro Russia ZyXEL Russia http www zyxel ru Slovakia ZyXEL Communica...

Page 196: ...Latin America Argentina ZyXEL Communication Corporation http www zyxel com ec es Ecuador ZyXEL Communication Corporation http www zyxel com ec es Middle East Egypt ZyXEL Communication Corporation htt...

Page 197: ...Appendix F Customer Support NWA1000 Series User s Guide 197 Oceania Australia ZyXEL Communications Corporation http www zyxel com au en Africa South Africa Nology Pty Ltd http www zyxel co za...

Page 198: ...communications However there is no guarantee that interference will not occur in a particular installation If this device does cause harmful interference to radio television reception which can be det...

Page 199: ...standby or off mode or another condition which does not exceed the applicable power consumption requirements for off mode and or standby mode In particular if applicable the technical justification s...

Page 200: ...disposiciones aplicables o exigibles de la Directiva 1999 5 CE Greek ZyXEL 1999 5 C French Par la pr sente ZyXEL d clare que l appareil quipements est conforme aux exigences essentielles et aux autres...

Page 201: ...ce sup rieure 300 m tres doivent tre notifi es l Institut Belge des services Postaux et des T l communications IBPT Visitez http www ibpt be pour de plus amples d tails Denmark In Denmark the band 515...

Page 202: ...r local vendor to order a new one Do not use the device outside and make sure all the connections are indoors There is a remote risk of electric shock from lightning Do NOT obstruct the device ventila...

Page 203: ...Appendix G Legal Information NWA1000 Series User s Guide 203 Environmental Product Declaration...

Page 204: ...ee BSS 178 beacon 52 Beacon Interval 59 62 68 BSS 10 52 178 C CA 185 Certificate authentication 95 file format 95 Certificate Authority See CA Certificates Fingerprint 104 MD5 104 public key 95 SHA1 1...

Page 205: ...Certificate 97 Independent Basic Service Set See IBSS 178 initialization vector IV 186 Internet Assigned Numbers Authority See IANA Internet Explorer 18 Internet Protocol version 6 see IPv6 Internet...

Page 206: ...ke Authentication Protocol Version 2 55 MSCHAPv2 55 MSDU 59 63 69 N NAT 168 Netscape Navigator 18 Network Time Protocol NTP 109 NTP 109 O Operating Mode 52 other documentation 2 Output Power Managemen...

Page 207: ...MIBs 103 Spanning Tree Protocol 84 SSID 10 52 SSID profile pre configured 11 SSID profiles 10 Status Screens 24 802 11 Mode 47 Channel ID 47 Ethernet 24 FCS Error Count 47 Firmware Version 26 Interfa...

Page 208: ...ty 11 182 Wireless Security Screen WEP 74 WPA2 PSK WPA2 PSK MIX 77 Wireless Settings Screen 51 Access Point Mode 57 Antenna 85 AP Bridge Mode 64 Bridge Mode 61 BSS 52 Channel 53 ESS 52 Intra BSS Traff...

Reviews: