background image

If you use WEP shared key to authenticate the wireless clients, you should check whether 
following configuration parameters on both AP and wireless clients match:

●     

WEP key values, WEP key sizes, WEP activation, and WEP transmit key parameters

 

Authentication with 802.1X:

If 802.1X security is used in your network, you can troubleshoot the authentication 
through SMT Menu 24.3.1 

- System Maintenance - Log and Trace. Here is the format of the log 

message: 

[user] [mac of user`s STA] [type] [message] 

 

802.1X with built-in user account:

[test] [0:a:8a:a2:ae:4e] [login success] [accepted by profiles]

[test] [0:a:8a:a2:ae:4e] [login fail] [user password error related to profiles]

[mars] [0:a:8a:a2:ae:4e] [login fail] [user not found in profiles]

  

802.1X with RADIUS server:

Summary of Contents for ZyAIR G-5100

Page 1: ...V 0 2005 6 30 FAQ ZyNOS FAQ Product FAQ Wireless FAQ Application Notes Infrastructure Mode Wireless MAC Address Filtering WEP Configurations Roaming Site Survey Repeater mode AP Bridge mode 802 1x WPA...

Page 2: ...figurator 8 How do I backup restore configurations by using TFTP client program via LAN 9 How do I backup restore configurations by using FTP client program via LAN 1 What is ZyNOS ZyNOS is ZyXEL s pr...

Page 3: ...o confirm than press Apply button to save the change 4 How do I upload the ZyNOS firmware code via embeded web configurator The procedure for uploading ZyNOS via embeded web configurator is as follows...

Page 4: ...upgrade firmware use FTP client program to put firmware in file ras in the ZyAIR G 5100 After data transfer is finished the Prestige will program the upgraded firmware into FLASH ROM and reboot itsel...

Page 5: ...G 5100 b Enter CI command sys stdio 0 in menu 24 8 to disable console idle timeout c To backup the configurations use TFTP client program to get file rom 0 from the Prestige d To restore the configura...

Page 6: ...XP 8 What is the default user name and password to login the ZyAIR G 5100 via the browser 9 How can I manage the ZyAIR G 5100 10 What network interface does the ZyAIR G 5100 support 11 What is the max...

Page 7: ...ZyAIR G 5100 is equipped with one auto MDI MDIX Ethernet LAN port and two 802 11g Wireless LAN interfaces It is the simplest and affordable solution for adding wireless mobile capability to your exist...

Page 8: ...lly is 50m 80m indoor 150m 300m outdoor The actual range may very depends on environment as to obstacles and walls RF interference etc in the environment 5 What can I do if I lost the password for my...

Page 9: ...use Windows to configure wireless configuration check box and click OK Now you need to exit the supplied configuration utility in the Windows task bar and restart it again Now you can use the supplied...

Page 10: ...on ZyAIR G 5100 The ZyAIR G 5100 are equip with omni directional antenna with 2 dBi Gains 2 Can I change the antenna on ZyAIR G 5100 Yes you can change the antenna on ZyAIR G 5100 to fit your impleme...

Page 11: ...involves a more rigorous exchange of frames ensuring that the requesting station is authentic For a station to use shared key authentication it must implement WEP 7 What authentication type does ZyAIR...

Page 12: ...ation 10 What are 802 1x authentication type and which authentication type does ZyAIR G 5100 802 1x embedded server support 802 1x specify the following authentication type and the ZyAIR G 5100 s embe...

Page 13: ...Windows XP embedded 802 1x client 2 Funk Software Odyssey client For external TTLS authentication server Odyssey server 1 Funk Software Odyssey client Note 1 XP only support MD5 CHAP and TLS before S...

Page 14: ...11g 11 Is it possible to use products from a variety of vendors 12 What is Wi Fi 13 What types of devices use the 2 4GHz Band 14 Does Bluetooth interfer with wireless 802 11 LAN 15 Can radio signals...

Page 15: ...the SSID be encrypted 7 By turning off the broadcast of SSID can someone still sniff the SSID 8 What are Insertion Attacks 9 What is Wireless Sniffer 10 What is the difference between Open System and...

Page 16: ...hile the initial investment required for wireless LAN hardware can be higher than the cost of wired LAN hardware overall installation expenses and life cycle costs can be significantly lower Long term...

Page 17: ...es 6 What is IEEE 802 11 The IEEE 802 11 is a wireless LAN industry standard and the objective of IEEE 802 11 is to make sure that different manufactures wireless LAN devices can communicate to each o...

Page 18: ...1 Mbps or lower depending on range The range at 54 Mbps is less than for 802 11b operating at 11 Mbps 11 Is it possible to use products from a variety of vendors Yes As long as the products comply to...

Page 19: ...nces with a high water content do not allow radio waves to pass through Metals reflect radio waves and concrete attenuates radio waves The amount of attenuation suffered in passing through concrete wi...

Page 20: ...ired in a given area This depends on the surrounding terrain the diameter of the client population and the number of clients If an area is large with dispersed pockets of populations then extension po...

Page 21: ...otocol and system that allows for unlicensed use of radios within a prescribed power level The ISM band is populated by Industrial Scientific and Medical devices that are all low power devices but can...

Page 22: ...40 bit 10 Hex character as secret key set by user and a 24 bit Initialization Vector not under user control 40 24 64 Some vendors refer to this level of WEP as 40 bit others as 64 bit 4 What is a WEP...

Page 23: ...attack principle on the wireless 10 What is the difference between Open System and Shared Key of Authentication Type Open System The default authentication service that simply announces the desire to...

Page 24: ...frame is received The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server Each client attempting to access the netw...

Page 25: ...in infrastructure mode through that access point Configuration Wireless Access Point to Infrastructure mode using SMT To configure Infrastructure mode of your ZyAIR G 5100 wireless AP please follow th...

Page 26: ...om the web configurator main menu click advanced wireless to display Wireless LAN 3 Configure the desired configuation on ZyAIR G 5100 4 Finished Configuration Wireless Station to Infrastructure mode...

Page 27: ...l down menu fill in an SSID or leave it as any if you wish to connect to any AP than press Apply Change to take effect 4 Click on Site Survey tab and press search all the available AP will be listed 5...

Page 28: ...associated with the selected AP The linked AP s channel current linkup rate SSID link quality and signal strength will show on the Link Info page You now successfully associate with the selected AP w...

Page 29: ...ed in menu 3 5 1 WLAN MAC Address Filter Configuration Before you configure the MAC filter you need to know the MAC address of the client first If not knowing what your MAC address is please enter a c...

Page 30: ...to add in the list If you use WEB configuration the MAC Address Filter configuration are as shown below 1 Using a web browser login AP by giving the LAN IP address of AP in URL field Default LAN IP i...

Page 31: ...that packages are not modified during the transition The standard does not discuss how the shared key is established In practice most installations use a single key that is shared between all mobile...

Page 32: ...used to encrypt wireless data transmission For example Menu 3 5 Wireless LAN Setup Operaing Mode Access Point Edit MAC Address Filter No ESSID Wireless Edit Roaming Configuration No Hide ESSID No Edi...

Page 33: ...ll use Key 3 to decrypt data So the Key 3 of station has to equal to the Key 3 of access point Though access point use Key 3 as default key but the station can use the other Key as its default key to...

Page 34: ...t Show Config Utility The utility will pop up on your windows screen Note If the utility icon doesn t exist in your task bar click Start Programs IEEE802 11b WLAN Card IEEE802 11b WLAN Card 2 Select t...

Page 35: ...cters WEP key or uncheck ASCII field for Hexadecimal digits WEP key Hexadecimal digits don t need to preceded by 0x For example 64 bits with characters WEP key Key1 loads Key2 oueww Key3 wopek Key4 wo...

Page 36: ...guration AP1 for Roaming using SMT To Enable the roaming feature if you have two or more ZyAIRs on the same subnet Follow the steps below to allow roaming on your ZyAIR 1 From the SMT main menu enter...

Page 37: ...n displays as shown next Menu 3 5 2 Roaming Configuration Active Yes Port 3517 Press ENTER to Confirm or ESC to Cancel field description Active Press SPACE BAR and then ENTER to select Yes to enable r...

Page 38: ...ort 3 Upon completion click Apply to make configuration take effect Configuration AP2 for Roaming using Web configurator To Enable the roaming feature if you have two or more ZyAIRs on the same subnet...

Page 39: ...met in order for wireless stations to roam between the coverage areas 1 All the access points and wireless stations must be on the same subnet configured with the same ESSID and security settings suc...

Page 40: ...t the facility walk through the facility to verify the accuracy of the diagram and mark down any large obstacle you see that may effect the RF signal such as metal shelf metal desk etc on the diagram...

Page 41: ...g the access point at the corner of the room and walk away from the access point in a systematic manner Record down the changes at point where transfer rate drop and the link quality and signal streng...

Page 42: ...vice is required from corner of the room 6 Repeat step 1 5 and now you should be able to mark an RF coverage area as illustrated in above picutre 7 You may need more than one access point is the RF co...

Page 43: ...ere are more than one access point is needed be sure to make the adjacent access point service area over lap one another So the wireless station are able to roam For more information please refer to r...

Page 44: ...t through the device The ZyAIR G 5100 can function as a wireless network bridge repeater links with other bridge repeater Configuration for Wireless Station 1 The ZyAIR G 5100 can function as wireless...

Page 45: ...ed and Wireless 2 Select Bridge Repeater in the Operation Mode drop down list box to display the screen as down 3 Type the MAC address of peer device in the Remote Bridge MAC Address field that is six...

Page 46: ...ed and Wireless 2 Select Bridge Repeater in the Operation Mode drop down list box to display the screen as down 3 Type the MAC address of peer device in the Remote Bridge MAC Address field that is six...

Page 47: ......

Page 48: ...station can connect to the wired network through AP and bridge two APs can communicate with one another connection at the same time Note When the ZyAIR G 5100 is in AP Bridge mode the traffic between...

Page 49: ...anced and Wireless 2 Select AP Bridge in the Operation Mode drop down list box to display the screen as down 3 Type a name to identify the ZyAIR in the wireless LAN up to 32 characters as the ESSID 4...

Page 50: ...5 Type the MAC address of peer device in the Remote Bridge MAC Address field that is six hexadecimal character pairs 6 Click Apply to finish...

Page 51: ...e Integrity Check MIC named Michael an extend initialization vector IV with sequencing rules and a re keying mechanism If you do not have an external RADIUS server you should use WPA PSK WPA Pre Share...

Page 52: ...tility icon here is the Centrion on Windows XP in your windows task bar the utility will pop up on your windows screen 2 Select the wireless card that you want to configure 3 Select on from the Switch...

Page 53: ...n the field 7 Click Next button 8 Select WPA PSK from the Network Authentication field 9 Select TKIP from the Data Encryption field 10 Type the Pre Share Key 8 63 character in the Pass phrase field 11...

Page 54: ...ttings choose the profile you configured Then click Connect button to associate with the Access Point 13 Click the General option we will see the following information that means the PC associated and...

Page 55: ......

Page 56: ...emove entry from call history countrycode countrycode set country code date year month date set display date domainname display domain name edit filename edit a text file extraphnum maintain extra pho...

Page 57: ...lue systemname system name Change system name time hour min sec display set system time trcdisp parse brief disp monitor packets trclog trcpacket syslog server destIP set syslog server IP address faci...

Page 58: ...cnt disp name display ether driver counters ioctl ch_name Useless in this stage status ch_name see LAN status version see ethernet device type edit load ether no load ether data from spt save save et...

Page 59: ...elf diagnostics essid ess id set ESS ID scan scan wireless channels version display WLAN version information IP Related Command Home Command Description ip address addr display host ip address arp sta...

Page 60: ...ault bits gateway metric add private route drop host addr bits drop a route status display ip statistic counters udp status display udp status rip tcp status tcb interval display TCP statistic counter...

Page 61: ...ption 8021x radius authentication Show show current radius authentication server configuration accounting Show show current radius accounting server configuration debug reauth 0 off 1 on set IEEE802 1...

Page 62: ...wer adapter and that it is plugged in to an appropriate power source Check that the power source is turned on If the problem persists you may have a hardware problem In this case you should contact yo...

Page 63: ...the list of denied MAC addressed 4 Temporarily disable any security feature on both the access point and the client If this solves the problem check to make sure that the Wired Equivalent Privacy WEP...

Page 64: ...X If 802 1X security is used in your network you can troubleshoot the authentication through SMT Menu 24 3 1 System Maintenance Log and Trace Here is the format of the log message user mac of user s S...

Page 65: ...rent vendor the suggest configuration is Auto The system will automatically detect your adapter type and auto configure to the client adapter when WEP is enabled Unable to get an IP address via DHCP 1...

Page 66: ...the same on your AP What should I get back to my technical support for analysis Following information are helpful to your technical support to troubleshoot your problem please get back the answer and...

Reviews: