background image

Appendix A Setting Up Your Computer’s IP Address

NWA-3500/NWA-3550 User’s Guide

296

5

The 

Internet Protocol TCP/IP Properties

 window opens.

Figure 190   

Windows XP: Internet Protocol (TCP/IP) Properties

6

Select 

Obtain an IP address automatically

 if your network administrator or ISP 

assigns your IP address dynamically.

Select 

Use the following IP Address

 and fill in the 

IP address

Subnet mask

and 

Default gateway

 fields if you have a static IP address that was assigned to 

you by your network administrator or ISP. You may also have to enter a 

Preferred 

DNS server

 and an 

Alternate

 

DNS server,

 if that information was provided.

7

Click 

OK

 to close the 

Internet Protocol (TCP/IP) Properties

 window.

Click 

OK

 to close the 

Local Area Connection Properties

 window.

Verifying Settings

1

Click 

Start

 > 

All Programs

 > 

Accessories

 > 

Command Prompt

.

2

In the 

Command Prompt

 window, type "ipconfig" and then press [ENTER]. 

You can also go to 

Start > Control Panel > Network Connections

, right-click a 

network connection, click 

Status

 and then click the 

Support 

tab to view your IP 

address and connection information.

Содержание 802.11a/g Wireless CardBus Card ZyXEL AG-120

Страница 1: ...550 802 11a g Dual Radio Wireless Business AP 802 11a g Dual Radio Outdoor WLAN Business AP Copyright 2009 ZyXEL Communications Corporation Firmware Version 3 7 Edition 1 1 2009 Default Login Details...

Страница 2: ......

Страница 3: ...g up your network and configuring for Internet access Note It is recommended you use the web configurator to configure the NWA Support Disc Refer to the included CD for support documents ZyXEL Web Sit...

Страница 4: ...contact your vendor then contact a ZyXEL office for the region in which you bought the device See http www zyxel com web contact_us php for contact information Please have the following information re...

Страница 5: ...font A key stroke is denoted by square brackets and uppercase text for example ENTER means the enter or return key on your keyboard Enter means for you to type one or more characters and then press th...

Страница 6: ...ed in Figures Figures in this User s Guide may use the following generic icons The NWA icon is not an exact representation of your NWA Table 1 Common Icons NWA Computer Notebook Server Printer Telepho...

Страница 7: ...OT use the device if the power adaptor or cord is damaged as it might cause electrocution If the power adaptor or cord is damaged remove it from the device and the power source Do NOT attempt to repai...

Страница 8: ...Safety Warnings NWA 3500 NWA 3550 User s Guide 8...

Страница 9: ...09 Wireless Configuration 119 SSID Screen 141 Wireless Security Screen 147 RADIUS Screen 161 Layer 2 Isolation Screen 165 MAC Filter Screen 171 IP Screen 175 Rogue AP Detection 179 Remote Management S...

Страница 10: ...Contents Overview NWA 3500 NWA 3550 User s Guide 10...

Страница 11: ...24 1 2 3 AP Bridge 25 1 2 4 MBSSID 26 1 2 5 Pre Configured SSID Profiles 27 1 2 6 Configuring Dual WLAN Adaptors 28 1 3 CAPWAP 28 1 4 Ways to Manage the NWA 29 1 5 Configuring Your NWA s Security Feat...

Страница 12: ...ow 53 5 1 3 Before You Begin 54 5 2 Controller AP Navigation Menu 54 5 3 Controller AP Status Screen 55 5 4 AP List Screen 57 5 4 1 The AP Lists Edit Screen 59 5 5 Configuration Screen 60 5 6 Redundan...

Страница 13: ...3 Setup 92 6 4 4 Configure the SERVER_1 Network 93 6 4 5 Configure the SERVER_2 Network 96 6 4 6 Checking your Settings and Testing the Configuration 96 6 4 6 1 Checking Settings 96 6 4 6 2 Testing th...

Страница 14: ...8 5 Technical Reference 131 8 5 1 Spanning Tree Protocol STP 131 8 5 1 1 Rapid STP 131 8 5 1 2 STP Terminology 132 8 5 1 3 How STP Works 132 8 5 1 4 STP Port States 133 8 5 2 DFS 133 8 5 3 Roaming 133...

Страница 15: ...Screen 161 11 3 What You Need To Know 162 11 4 The RADIUS Screen 163 Chapter 12 Layer 2 Isolation Screen 165 12 1 Overview 165 12 2 What You Can Do in the Layer 2 Isolation Screen 166 12 3 What You N...

Страница 16: ...e FTP Screen 191 16 6 The WWW Screen 192 16 7 The SNMP Screen 194 16 8 Technical Reference 195 16 8 1 MIB 195 16 8 2 Supported MIBs 196 16 8 3 SNMP Traps 196 Chapter 17 Internal RADIUS Server 199 17 1...

Страница 17: ...ce 232 19 6 1 Example Log Messages 232 19 6 2 Log Commands 233 19 6 3 Configuring What You Want the NWA to Log 233 19 6 4 Displaying Logs 234 19 6 5 Log Command Example 234 Chapter 20 VLAN 235 20 1 Ov...

Страница 18: ...ics Screen 266 23 5 Association List Screen 268 23 6 Channel Usage Screen 269 23 7 F W Upload Screen 270 23 8 Configuration Screen 272 23 8 1 Backup Configuration 272 23 8 2 Restore Configuration 273...

Страница 19: ...uide 19 Appendix C Pop up Windows JavaScripts and Java Permissions 335 Appendix D Importing Certificates 343 Appendix E IP Addresses and Subnetting 369 Appendix F Text File Based Auto Configuration 37...

Страница 20: ...Table of Contents NWA 3500 NWA 3550 User s Guide 20...

Страница 21: ...21 PART I Introduction Introducing the NWA 23 Introducing the Web Configurator 35 Status Screens 39 Management Mode 47 Tutorial 67...

Страница 22: ...22...

Страница 23: ...you to easily assign different types of security to groups of users The NWA controls network access with MAC address filtering rogue AP detection layer 2 isolation and an internal authentication serve...

Страница 24: ...ternet access application for your NWA is shown as follows Clients A B and C can access the wired network through the NWAs Figure 1 Access Point Application 1 2 2 Bridge Repeater The NWA can act as a...

Страница 25: ...h APs must use the same pre shared key See Section 8 4 2 on page 126 for more details Once the security settings of peer sides match one another the connection between devices is made At the time of w...

Страница 26: ...ty settings refers to the traffic between the wireless stations and the NWA Figure 4 AP Bridge Application 1 2 4 MBSSID A BSS Basic Service Set is the set of devices forming a single wireless network...

Страница 27: ...ing figure VoIP_SSID users have Quality of Service QoS priority SSID03 is the wireless network for standard users and Guest_SSID is the wireless network for guest users In this example the guest user...

Страница 28: ...2 6 Configuring Dual WLAN Adaptors The NWA is equipped with dual wireless adaptors This means you can configure two different wireless networks to operate simultaneously In the following example the N...

Страница 29: ...e CAPWAP managed APs NWA 3160 NWA 3163 NWA 3500 NWA 3550 NWA 8500 The following figure illustrates a CAPWAP wireless network The user U configures the controller AP C which then automatically updates...

Страница 30: ...utton they can then reset the device s password to its default password log in and reconfigure its settings Change any default passwords on the NWA such as the password used for accessing the NWA s we...

Страница 31: ...n configuring the MAC filter 1 6 Maintaining Your NWA Do the following things regularly to keep your NWA running Check the ZyXEL website www zyxel com tw regularly for new firmware for your NWA Ensure...

Страница 32: ...section applies to the NWA 3500 only Figure 8 LEDs Table 3 LEDs LABEL LED COLOR STATUS DESCRIPTION 1 WL1 Green On The wireless adaptor WLAN1 is active Blinking The wireless adaptor WLAN1 is active an...

Страница 33: ...Off The wireless adaptor WLAN2 is not active 4 ZyAIR Blue On The NWA is receiving power You can turn the ZyAIR LED off and on using the Web configurator See Section 8 4 on page 123 Blinking The NWA is...

Страница 34: ...Chapter 1 Introducing the NWA NWA 3500 NWA 3550 User s Guide 34...

Страница 35: ...our computer or computer network to connect to the NWA refer to the Quick Start Guide 2 Launch your web browser 3 Type 192 168 1 2 as the URL default 4 Type 1234 default as the password and click Logi...

Страница 36: ...icate screen to create a certificate using your NWA s MAC address that will be specific to this device Figure 10 Replace Certificate Screen You should now see the Status screen See Chapter 2 on page 3...

Страница 37: ...t configuration file Hold this button in for about 10 seconds the lights will begin to blink Use this method for cases when the password or IP address of the NWA is not known This applies to the NWA 3...

Страница 38: ...l Password and Time Setting WIRELESS Wireless SSID Security RADIUS Layer 2 Isolation MAC Filter IP ROGUE AP Configuration Friendly AP Rogue AP REMOTE MGNT Telnet FTP WWW and SNMP AUTH SERVER Setting T...

Страница 39: ...log into the NWA or click STATUS in the navigation menu Use the Status screens to look at the current status of the device system resources interfaces and SSID status The Status screen also provides d...

Страница 40: ...u configured in the MGMT MODE screen The NWA works as a standalone AP by default Figure 12 The Status Screen Standalone AP Figure 13 The Status Screen AP Controller The following table describes the l...

Страница 41: ...anagement mode This field displays the current operating mode of the second wireless module AP Bridge Repeater AP Bridge or MBSSID You can change the operating mode in the Wireless Wireless screen Man...

Страница 42: ...N1 Associations This field is not available when the NWA is in AP controller management mode This field displays the number of wireless clients currently associated with the first wireless module Each...

Страница 43: ...ireless clients connect to the NWA Redundancy This section is available only when the NWA is in AP controller management mode The redundancy feature should be also enabled and the NWA acts as the regu...

Страница 44: ...to see which wireless channels are currently in use in the local area See Section 23 6 on page 269 SSID Information This link is available only when the NWA is in AP controller management mode Click...

Страница 45: ...IPTION Table 6 Status AP Statistics LABEL DESCRIPTION AP Description This is the descriptive name configured for this AP in the Controller AP Lists 802 11 Mode This is the wireless standard supported...

Страница 46: ...e NWA is in AP controller management mode Figure 16 Status SSID Information The following table describes the labels in this screen Table 7 Status SSID Information LABEL DESCRIPTION SSID Security Mode...

Страница 47: ...visioning of Wireless Access Points This is ZyXEL s implementation of the IETF s Internet Engineering Task Force CAPWAP protocol RFC 4118 The CAPWAP dataflow is protected by DTLS Datagram Transport La...

Страница 48: ...P CAPWAP managed APs must be DHCP clients supplied with an IP address by a DHCP server on your network Furthermore the AP controller must have a static IP address it cannot be a DHCP client 4 1 3 CAPW...

Страница 49: ...ler uses its internal RADIUS server managed APs also use the AP controller s authentication server to authenticate wireless clients Only one AP controller can exist in any single broadcast domain If a...

Страница 50: ...configurator neither managing nor managed by other devices Managed AP Select this to have the NWA managed by another NWA on your network When you do this the NWA can be configured ONLY by the manageme...

Страница 51: ...the IP address of the secondary controller AP Apply Click this to save your changes Note If you change the mode in this screen the NWA restarts Wait a short while before you attempt to log in again I...

Страница 52: ...Chapter 4 Management Mode NWA 3500 NWA 3550 User s Guide 52...

Страница 53: ...o view information about your managed wireless network Use the AP Lists screen Section 5 4 on page 57 to manage connected APs Use the Configuration screen Section 5 5 on page 60 to control the way in...

Страница 54: ...he wireless clients of the managed APs 5 1 3 Before You Begin Note The Controller AP options are only available when the NWA is set to function in this mode Therefore ensure that you have switched mod...

Страница 55: ...Note A managed AP may potentially be turned off if it is within range of its controller AP while the controller AP updates its settings The managed AP retains the last settings acquired from the contr...

Страница 56: ...y the NWA that are not currently active turned off or otherwise unreachable on the network Un managed This field displays the number of access points on the network that are not managed by the NWA but...

Страница 57: ...e Controller AP Lists Screen LABEL DESCRIPTION Managed Access Points List This section lists the access points currently controlled by the NWA This always includes the NWA itself Index This is the ind...

Страница 58: ...Access Points List This section lists the CAPWAP enabled access points in the area that are in managed AP mode but which are not currently controlled by the NWA Index This is the index number of an u...

Страница 59: ...ED This field displays only if the managed AP supports this feature Select this box to disable the WLAN LED light Clear this box to enable the WLAN LED WLAN1 Radio Profile Select the radio profile you...

Страница 60: ...ncrypt communications between the NWA and its managed APs This key is used to encrypt DTLS Datagram Transport Layer Security transmissions Enter 8 32 English keyboard characters The proprietary AutoPS...

Страница 61: ...ng table describes the labels in this screen Table 12 The Controller Redundancy Screen LABEL DESCRIPTION Redundancy Select Enable to set the NWA either as a Primary AP Controller or as a Secondary Con...

Страница 62: ...rity screen see Section 10 2 on page 136 The Profile Edit RADIUS screen see Section 11 2 on page 149 The Profile Edit Layer 2 Isolation screen see Section 12 2 on page 153 The Profile Edit MAC Filter...

Страница 63: ...number of each radio profile Profile Name This field displays the identification name of each radio profile on the NWA 802 11 Mode This field displays the IEEE 802 11 wireless mode the radio profile u...

Страница 64: ...0 User s Guide 64 5 8 The Radio Profile Edit Screen Use this screen to configure a specific radio profile In the Profile Edit Radio screen select a profile and click Edit The following screen displays...

Страница 65: ...um MSDU MAC service data unit size turns off the RTS CTS handshake Setting this attribute to its smallest value 256 turns on the RTS CTS handshake Enter a value between 256 and 2346 Fragmentation Thre...

Страница 66: ...rofile or profiles you want access points using this radio profile to use Each AP can use multiple SSID profiles simultaneously Configure SSID profiles in the Profile Edit SSID screens Index This is t...

Страница 67: ...ing mode if you want to allow wireless clients to access your wired network all using the same security and Quality of Service QoS settings See Section 1 2 1 on page 24 for details Use Bridge Repeater...

Страница 68: ...the first wireless network select WLAN1 in the WLAN Interface field and follow the steps in Section 6 1 2 on page 68 Then select WLAN2 in the WLAN Interface field and follow the same procedure to con...

Страница 69: ...onfigure WDS Security Select 802 11 Mode and Channel ID Configure WDS Security Select SSID Profile Configure SSID Profile Edit Security Profile Configure RADIUS authentication optional Configure inter...

Страница 70: ...ltiple Wireless Networks In this example you have been using your NWA as an access point for your office network See your Quick Start Guide for information on how to set up your NWA in Access Point mo...

Страница 71: ...Quality of Service QoS setting see Chapter 8 on page 119 for information on QoS The guest network Guest_SSID has access to the Internet and the network printer only and a low QoS setting To configure...

Страница 72: ...ating Mode Log in to the NWA see Section 2 1 on page 35 Click WIRELESS Wireless The Wireless screen appears In this example the NWA is using WLAN Interface 1 in Access Point operating mode and is curr...

Страница 73: ...n one of the Profile list boxes number 3 in this example Select the Active box for the entry and click Apply to activate the profile Your standard wireless network SSID04 is now accessible to your wir...

Страница 74: ...VoIP_SSID and Guest_SSID profiles you will need to set different security profiles Figure 35 Tutorial WIRELESS SSID The Voice over IP VoIP network will use the pre configured SSID profile so select Vo...

Страница 75: ...he SSID to wireless clients scanning the area The standard network SSID04 is currently using the security01 profile so use a different profile for the VoIP network If you used the security01 profile a...

Страница 76: ...you do not have a RADIUS server for authentication so select WPA2 PSK in the Security Mode field WPA2 PSK provides strong security that anyone with a compatible wireless client can use once they know...

Страница 77: ...onfigure the Guest Network When you are setting up the wireless network for guests to your office your primary concern is to keep your network secure while allowing access to certain resources such as...

Страница 78: ...t Disable from the Hide Name SSID list box This makes it easier for guests to configure their own computers wireless clients to your network s settings The standard network SSID04 is already using the...

Страница 79: ...y that is supported by most wireless clients Even though your Guest_SSID clients do not have access to sensitive information on the network you should not leave the network without security An attacke...

Страница 80: ...e 80 6 2 3 2 Set up Layer 2 Isolation Configure layer 2 isolation to control the specific devices you want the users on your guest network to access Click WIRELESS Layer 2 Isolation The following scre...

Страница 81: ...ect its entry and click Edit The following screen displays Figure 45 Tutorial Layer 2 Isolation Profile Enter the MAC addresses and descriptions of the two network devices you want users on the guest...

Страница 82: ...led Try to access each network using the correct security settings and then using incorrect security settings such as the WPA PSK for another active network If the behavior is different from expected...

Страница 83: ...rity considerations In this example you want to ensure that your company s data is not accessible to an attacker gaining entry to your wireless network through a rogue AP Your wireless network operate...

Страница 84: ...n configuring the rogue AP feature on your NWAs in this example you will need to use the information in the following table You need the IP addresses of your APs to access their Web configurators and...

Страница 85: ...ings 1 Set up and save a friendly AP list 2 Activate periodic Rogue AP Detection 3 Set up e mail alerts 4 Configure your other access points 5 Test the setup 6 3 1 Set Up and Save a Friendly AP list T...

Страница 86: ...o your network s security The Friendly AP screen now appears as follows Figure 49 Tutorial Friendly AP After Data Entry Table 17 Tutorial Friendly AP Information MAC ADDRESS DESCRIPTION 00 AA 00 AA 00...

Страница 87: ...ist of friendly APs in order to provide a backup and upload it to your other access points Click the Configuration tab The following screen appears Figure 50 Tutorial Configuration 4 Click Export If a...

Страница 88: ...teps to activate rogue AP detection on the first of your NWAs 1 In the ROGUE AP Configuration screen select Enable from the Rogue AP Period Detection field Figure 53 Tutorial Periodic Rogue AP Detecti...

Страница 89: ...st of your four APs to send a log message to your e mail inbox whenever a rogue AP is discovered in your wireless network s coverage area 1 Click LOGS Log Settings The following screen appears Figure...

Страница 90: ...it detects an access point not on the list Now you need to configure the other wireless access points on your network to do the same things For each access point take the following steps 1 From a com...

Страница 91: ...ve the NWA perform a scan immediately Check the ROGUE AP Rogue AP screen You should see an entry in the list with the same MAC address as your rogue AP Check the LOGS View Logs screen You should see a...

Страница 92: ...3 Setup In this example you have already set up the NWA in MBSSID mode see Chapter 12 on page 165 It uses two SSID profiles simultaneously You have configured each SSID profile as shown in the followi...

Страница 93: ...k which are as follows 6 4 4 Configure the SERVER_1 Network First you will set up the SERVER_1 network which allows Alice to access secure server 1 via the network switch You will configure the MAC fi...

Страница 94: ...e following screen displays showing the SSID profiles you already configured Figure 56 Tutorial SSID Profile 2 Select SERVER_1 s entry and click Edit The following screen displays Figure 57 Tutorial S...

Страница 95: ...ave restricted users on the SERVER_1 network to access only the devices with the MAC addresses you entered 4 Click the MAC Filter tab When the MAC Filter screen appears select macfilter03 s entry and...

Страница 96: ...Settings Take the following steps to check that the NWA is using the correct SSIDs MAC filters and layer 2 isolation profiles Table 21 Tutorial SERVER_2 Network Information SSID Screen Index 4 Profil...

Страница 97: ...shown in the following figure Figure 60 Tutorial SSID Profiles Activated 2 Next click the SSID tab Check that each configured SSID profile uses the correct Security Layer 2 Isolation and MAC Filter p...

Страница 98: ...should be unable to do so If you can do so MAC filtering is misconfigured 2 Test the SERVER_2 network Using Bob s computer and wireless client and the correct security settings do the following Attemp...

Страница 99: ...because of their location You want to convert one of your NWA to a controller AP A which will allow you to manage all 4 NWA APs using the Web Configurator of this newly transformed NWA controller AP A...

Страница 100: ...as A to serve as the secondary controller AP E Both controller APs A and E are in the 1st floor of the building recommended The NWA APs B C and D from the 2nd 3rd and 4th floors are going to be your m...

Страница 101: ...ave both primary and secondary controller APs in the network the secondary controller AP s WLAN radio is turned off as long as the primary controller AP is turned on 1 Access the Web Configurator of t...

Страница 102: ...mode in your network Changes made in the Web Configurator of the NWA primary AP controller are synchronized automatically with the secondary controller AP if there is one and the members of the manage...

Страница 103: ...nuously managing it You can switch the NWA to standalone AP mode by pressing the reset button on the casing NWA 3500 only Previous configurations are lost 1 To set your NWA in managed AP mode open the...

Страница 104: ...rial Registration Type If the Registration Type is set to Manual the controller AP add managed APs to a queue in the Un Managed Access Points List in the Controller AP Lists screen If the Registration...

Страница 105: ...st have their WLAN Radio Profile set to disabled This means that their wireless functions are turned off Note The NWA controller AP uses WLAN Radio Profile to categorize different wireless settings pr...

Страница 106: ...tility screen to check if radio6 SSID Mktg Grp 6 is in the list of wireless networks available Figure 71 Tutorial Checking your Setup MGNT Mode Settings Open the wireless client s screen that list the...

Страница 107: ...on 119 SSID Screen 141 Wireless Security Screen 147 RADIUS Screen 161 Layer 2 Isolation Screen 165 MAC Filter Screen 171 IP Screen 175 Rogue AP Detection 179 Remote Management Screens 187 Internal RAD...

Страница 108: ...108...

Страница 109: ...ects to an Network Time Protocol NTP server to set the time on the device 7 2 What You Can Do in the System Screens Use the General screen see Section 7 4 on page 112 to specify the System name Domain...

Страница 110: ...art of a much larger organization you should consult your network administrator for the appropriate IP addresses Note Regardless of your particular situation do not create an arbitrary IP address alwa...

Страница 111: ...evice on your network is using that IP address The subnet mask specifies the network number portion of an IP address Your device will compute the subnet mask automatically based on the IP address that...

Страница 112: ...o 30 alphanumeric characters long Spaces are not allowed but dashes and underscores _ are accepted Domain Name This is not a required field Leave this field blank or enter the domain name here if you...

Страница 113: ...erver IP address that the DHCP assigns Select User Defined if you have the IP address of a DNS server Enter the DNS server s IP address in the field to the right If you chose User Defined but leave th...

Страница 114: ...sword Type in your existing system password 1234 is the default password New Password Type your new system password up to 31 characters Note that as you type a password the screen displays an asterisk...

Страница 115: ...S server profile of the RADIUS server that is to authenticate management logins to the NWA The NWA tests the user name and password against the RADIUS server when you apply your settings The user name...

Страница 116: ...your NWA Each time you reload this page the NWA synchronizes the time with the time server if configured Current Date This field displays the last updated date from the time server Manual Select this...

Страница 117: ...Time at 2 A M local time So in the United States you would select Second Sunday March and type 2 in the o clock field Daylight Saving Time starts in the European Union on the last Sunday of March All...

Страница 118: ...following pre defined list of NTP time servers if you do not specify a time server or it cannot synchronize with the time server you specified When the NWA uses the pre defined list of NTP time serve...

Страница 119: ...e above the NWA allows access to another bridge device A and a notebook computer B upon verifying their settings and credentials It denies access to other devices C and D with configurations that do n...

Страница 120: ...When Intra BSS traffic blocking is disabled wireless station A and B can access the wired network and communicate with each other When Intra BSS traffic blocking is enabled wireless station A and B c...

Страница 121: ...Repeater The NWA acts as a wireless network bridge and establishes wireless links with other APs You need to know the MAC address of the peer device which also must be in bridge mode The NWA can esta...

Страница 122: ...ld use a different channel than an adjacent AP access point to reduce interference Wireless Mode The IEEE 802 1x standard was designed to extend the features of IEEE 802 11 to support extended authent...

Страница 123: ...ther be used in conjunction with 802 1x security 8 4 Configuring Wireless Settings Click WIRELESS Wireless The screen varies depending upon the operating mode you select 8 4 1 Access Point Mode Select...

Страница 124: ...and packet bursting Disable channel switching for DFS This field displays only when you select 802 11a in the 802 11 Mode field Select this if you do not want to use DFS Dynamic Frequency Selection C...

Страница 125: ...k This value can be set from 1 to 100 Fragmentation Threshold The threshold number of bytes for the fragmentation boundary for directed messages It is the maximum data fragment size that can be sent E...

Страница 126: ...educe signal interference Enable Breathing LED Select this check box to enable the blue breathing LED also known as the NWA LED Clear the check box to turn this LED off even when the NWA is on and dat...

Страница 127: ...ireless Configuration NWA 3500 NWA 3550 User s Guide 127 To have the NWA act as a wireless bridge only click WIRELESS Wireless and select Bridge Repeater as the Operating Mode Figure 80 Wireless Bridg...

Страница 128: ...ntegrity Protocol TKIP security on your WDS This option is compatible with other ZyXEL access points including that support WDS security Use this if the other access points on your network support WDS...

Страница 129: ...for information on the other labels in this screen 8 4 3 AP Bridge Mode Select AP Bridge as the Operating Mode in the WIRELESS Wireless screen to have the NWA function as a bridge and access point sim...

Страница 130: ...cribing the fields in the Access Point and Bridge Repeater operating modes for descriptions of the fields in this screen 8 4 4 MBSSID Mode Use this screen to have the NWA function in MBSSID mode Selec...

Страница 131: ...have Table 29 Wireless MBSSID LABEL DESCRIPTION Operating Mode Select MBSSID in this field to display the screen as shown Select SSID Profile An SSID profile is the set of parameters relating to one...

Страница 132: ...5 1 3 How STP Works After a bridge determines the lowest cost spanning tree with STP it enables the root port and the ports that are the designated ports for connected LANs and disables all other port...

Страница 133: ...ther channel then resumes communications on the new channel 8 5 3 Roaming A wireless station is a device with an IEEE 802 11a b g compliant wireless interface An access point AP acts as a bridge betwe...

Страница 134: ...a wireless station moves between coverage areas Wireless stations can still associate with other APs even if you disable roaming Enabling roaming ensures correct traffic forwarding bridge tables are u...

Страница 135: ...on the access point the new access point must have the user profile for the wireless station The adjacent access points should use different radio channels when their coverage areas overlap All acces...

Страница 136: ...the following figure Figure 85 Bridging Example Be careful to avoid bridge loops when you enable bridging in the NWA Bridge loops cause broadcast traffic to circle the network endlessly resulting in...

Страница 137: ...ce in wireless networks It controls WLAN transmission priority on packets to be transmitted over the wireless network WMM QoS prioritizes wireless traffic according to delivery requirements WMM QoS is...

Страница 138: ...e sensitive applications such as FTP File Transfer Protocol The following table shows some common applications their time sensitivity and their typical data packet sizes Note that the figures given ar...

Страница 139: ...s of how to configure ATC WMM Use the ATC WMM function if you want to do the following enable WMM QoS on your wireless network and automatically assign a WMM priority to packets that do not already ha...

Страница 140: ...ned an ATC value based on their WMM value not their size The following table shows how priorities are assigned for packets coming from the WLAN to the LAN when using ATC WMM Table 35 ATC WMM Priority...

Страница 141: ...figure above the NWA has three SSID profiles configured a standard profile SSID04 a profile with high QoS settings for Voice over IP VoIP users VoIP_SSID and a guest profile that allows visitors acce...

Страница 142: ...s you want to allow access to it Each SSID profile references the settings configured in the following screens Wireless Security one of the security profiles Wireless RADIUS one of the RADIUS profiles...

Страница 143: ...each SSID profile on the NWA SSID This field displays the name of the wireless profile on the network When a wireless client scans for an AP to associate with this is the name that is broadcast and s...

Страница 144: ...figure and click Edit to go to the SSID configuration screen Table 37 Wireless SSID LABEL DESCRIPTION Table 38 Wireless SSID Edi LABEL DESCRIPTION Profile Name Enter a name identifying this profile SS...

Страница 145: ...on 8 5 8 on page 139 for more information on ATC WMM If you select WMM_VOICE WMM_VIDEO WMM_BEST_EFFORT or WMM_BACKGROUND the NWA applies that QoS setting to all of that SSID s traffic If you select NO...

Страница 146: ...Chapter 9 SSID Screen NWA 3500 NWA 3550 User s Guide 146...

Страница 147: ...ork Figure 91 Securing the Wireless Network In the figure above the NWA checks the identity of devices before giving them access to the network In this scenario computer A is denied access to the netw...

Страница 148: ...t is sent in the wireless network even if they cannot use the wireless network Furthermore there are ways for unauthorized wireless users to get a valid user name and password Then they can use that u...

Страница 149: ...A passphrase functions like a password In WEP security mode it is further converted by the NWA into a complicated string that is referred to as the key This key is requested from all devices wishing t...

Страница 150: ...ing screens are configurable only in Access Point AP Bridge and MBSSID operating modes Use this screen to choose and edit a security profile Click Wireless Security The following screen displays Figur...

Страница 151: ...varies according to the Security Mode you select 10 4 1 Security WEP Use this screen to set the selected profile to Wired Equivalent Privacy WEP security mode Select WEP in the Security Mode field to...

Страница 152: ...t this option to enter ASCII characters as the WEP keys Hex Select this option to enter hexadecimal characters as the WEP keys The preceding 0x is entered automatically Key 1 to Key 4 The WEP keys are...

Страница 153: ...ireless stations have to resend user names and passwords in order to stay connected Enter a time interval between 10 and 9999 seconds The default time interval is 1800 seconds 30 minutes Alternatively...

Страница 154: ...ic 128 in this field ASCII Select this option to enter ASCII characters as the WEP keys Hex Select this option to enter hexadecimal characters as the WEP keys The preceding 0x is entered automatically...

Страница 155: ...ter 0 to turn reauthentication off Note If wireless station authentication is done using a RADIUS server the reauthentication timer on the RADIUS server has priority Idle Timeout The NWA automatically...

Страница 156: ...reauthentication timer on the RADIUS server has priority Idle Timeout The NWA automatically disconnects a wireless station from the wired network after a period of inactivity The wireless station nee...

Страница 157: ...er The Group Key Update Timer is the rate at which the AP sends a new group key out to all clients The re keying process is the WPA equivalent of automatically changing the group key for an AP and all...

Страница 158: ...same The only difference between the two is that WPA PSK uses a simple common password instead of user specific credentials Type a pre shared key from 8 to 63 case sensitive ASCII characters includin...

Страница 159: ...e WEP key encrypting A higher bit key offers better security You can manually enter 64 bit 128 bit or 152 bit WEP keys More information on Wireless Security can be found in Appendix B on page 233 Grou...

Страница 160: ...Chapter 10 Wireless Security Screen NWA 3500 NWA 3550 User s Guide 160...

Страница 161: ...and the server is the RADIUS server Figure 100 RADIUS Server Setup In the figure above wireless clients A and B are trying to access the Internet via the NWA The NWA in turn queries the RADIUS server...

Страница 162: ...package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server You should know the IP addresses ports and share secrets of the external RADIUS serv...

Страница 163: ...sociated with the Index number above Primary Configure the fields below to set up user authentication and accounting Backup If the NWA cannot communicate with the Primary accounting server you can hav...

Страница 164: ...is not available when you select Internal Share Secret Enter a password up to 128 alphanumeric characters as the key to be shared between the external authentication server and the NWA The key must b...

Страница 165: ...a network In the following figure layer 2 isolation is enabled on the NWA Z to allow a guest wireless client A to access the main network router B The router provides access to the Internet C and the...

Страница 166: ...Isolation Screen Use the Wireless Layer 2 Isolation screen see Section 12 4 on page 167 to configure the MAC addresses of the wireless client AP computer or router that you want to allow the associat...

Страница 167: ...1 Configuring Layer 2 Isolation Use this screen to specify the configuration for your layer 2 isolation profile Select a layer 2 isolation profile in Wireless Layer 2 Isolation and click Edit to displ...

Страница 168: ...es with these MAC addresses These are the MAC address of a wireless client AP computer or router A wireless client associated with the NWA can communicate with another wireless client AP computer or r...

Страница 169: ...solation configurations on your NWA A Figure 105 Layer 2 Isolation Example Configuration Example 1 Restricting Access to Server In the following example wireless clients 1 and 2 can communicate with f...

Страница 170: ...tion Example 1 Example 2 Restricting Access to Client In the following example wireless clients 1 and 2 can communicate with access point B and file server C but not wireless client 3 Enter the server...

Страница 171: ...tion Figure 108 MAC Filtering In the figure above wireless client U is able to connect to the Internet because its MAC address is in the allowed association list specified in the NWA The MAC address o...

Страница 172: ...cimal characters for example 00 A0 C5 00 00 02 You need to know the MAC address of each device to configure MAC filtering on the NWA 13 4 The MAC Filter Screen The MAC filter profile is a user configu...

Страница 173: ...e Profile Name This field displays the name given to a MAC filter profile in the MAC Filter Configuration screen Edit Select an entry from the list and click Edit to configure settings for that profil...

Страница 174: ...it screen and click Apply Index This is the index number of the MAC address MAC Address Enter the MAC addresses in XX XX XX XX XX XX format of the wireless station to be allowed or denied access to th...

Страница 175: ...address to communicate across the network These networking devices are also known as hosts Figure 111 IP Setup The figure above illustrates one possible setup of your NWA The gateway IP address is 19...

Страница 176: ...ng table describes the labels in this screen Table 52 IP Setup LABEL DESCRIPTION IP Address Assignment Get automatically from DHCP Select this option if your NWA is using a dynamically assigned IP add...

Страница 177: ...cal networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Regardless of your particular situation do n...

Страница 178: ...Chapter 14 IP Screen NWA 3500 NWA 3550 User s Guide 178...

Страница 179: ...access to the network or set up their own rogue APs in order to capture information from wireless clients If a scan reveals a rogue AP you can use commercially available software to physically locate...

Страница 180: ...can configure the NWA to detect rogue IEEE 802 11a 5 GHz and IEEE 802 11b g 2 4 GHz APs You can also set the NWA to e mail you immediately when a rogue AP is detected see Chapter 19 on page 229 for in...

Страница 181: ...attacker tries to capture usernames passwords and other sensitive information from unsuspecting clients A and B who attempt to connect This is known as a honeypot attack Figure 114 Honeypot Attack If...

Страница 182: ...ue AP Period Detection field Expiration Time minutes Specify how long between 30 and 180 minutes an AP s entry can remain in the Rogue AP List before the NWA removes it from the list if the AP is no l...

Страница 183: ...lowed Add Click this button to include the AP in the list Friendly AP List This is the list of safe wireless access points you have already configured Index This is the index number of the AP s entry...

Страница 184: ...button to have the NWA scan for rogue APs Index This is the index number of the AP s entry in the list Select Use this check box to select the APs you want to move to the friendly AP list see Section...

Страница 185: ...nderscores _ and dashes are allowed Add to Friendly AP List If you know that the AP described in an entry is not a threat select the Active check box enter a short description in the Description field...

Страница 186: ...Chapter 15 Rogue AP Detection NWA 3500 NWA 3550 User s Guide 186...

Страница 187: ...of the NWA s interfaces Remote Management allows a user to administrate the device over the network You can manage your NWA from a remote location via the following interfaces WLAN LAN Both WLAN and L...

Страница 188: ...the SNMP screen see Section 16 7 on page 194 to configure through which interface s and from which IP address es a network systems manager can access the ZyXEL Device 16 3 What You Need To Know Telne...

Страница 189: ...ment functions It executes applications that control and monitor managed devices SNMP allows a manager and agents to communicate for the purpose of accessing information such as packets received node...

Страница 190: ...YSTEM screen 16 4 The Telnet Screen Use this screen to configure your NWA for remote Telnet access You can use Telnet to access the NWA s Command Line Interface CLS Click REMOTE MGNT TELNET The follow...

Страница 191: ...responding private key is to be used to identify the NWA for SSH connections You must have certificates already configured in the Certificates My Certificates screen Server Port You can change the ser...

Страница 192: ...You may change the server port number for a service if needed however you must use the same port number in order to use that service for remote management Server Access Select the interface s through...

Страница 193: ...cates optional to require the SSL client to authenticate itself with the NWA by sending the NWA a certificate To do that the SSL client must have a CA signed certificate from a CA that has been import...

Страница 194: ...Enter the Set community which is the password for incoming Set requests from the management station The default is public and allows all requests Community Type the trap community which is the passwor...

Страница 195: ...count s security settings or select Admin to have the NWA use the Admin account s security settings Use the Configure SNNMPv3 User Profile link to set up each account s security settings Configure SNM...

Страница 196: ...an agent Trap Used by the agent to inform the manager of some events 16 8 2 Supported MIBs The NWA supports MIB II that is defined in RFC 1213 and RFC 1215 as well as the proprietary ZyXEL private MI...

Страница 197: ...MIB whyReboot 1 3 6 1 4 1 890 1 5 1 3 0 1 This trap is sent with the reason for restarting before the system reboots warm start System reboot by user is added for an intentional reboot for example dow...

Страница 198: ...Chapter 16 Remote Management Screens NWA 3500 NWA 3550 User s Guide 198...

Страница 199: ...ing its internal RADIUS server to control access to a wired network A wireless notebook A requests access by sending its credentials The NWA consults its internal RADIUS server s list of user names an...

Страница 200: ...and passwords 17 3 What You Need To Know The NWA has a built in RADIUS server that can authenticate wireless clients or other trusted APs Certificates are used by wireless clients to authenticate the...

Страница 201: ...me This field displays the name used to identify this certificate It is recommended that you give each certificate a unique name auto_generated_self_signed_cert is the factory default certificate comm...

Страница 202: ...ommon name organizational unit or department organization or company and country With self signed certificates this is the same information as in the Subject field Valid From This field displays the d...

Страница 203: ...pe the IP address of the trusted AP in dotted decimal notation Shared Secret Enter a password up to 31 alphanumeric characters no spaces as the key for encrypting communications between the AP and the...

Страница 204: ...nd password activated on their wireless utilities User Name Enter the user name for this user account This name can be up to 31 alphanumeric characters long including spaces The wireless client s util...

Страница 205: ...he following steps to set up trusted APs and trusted users 1 Configure an IP address and shared secret in the Trusted AP database to specify an AP as trusted 2 Configure wireless client user names and...

Страница 206: ...DOMAIN user When you configure your Windows XP SP2 Wireless Zero Configuration PEAP MS CHAPv2 settings deselect the Use Windows logon name and password check box When authentication begins a pop up di...

Страница 207: ...ertificates Example In the figure above the NWA Z checks the identity of the notebook A using a certificate before granting it access to the network 18 2 What You Can Do in the Certificates Screen Use...

Страница 208: ...and you never need to transmit private keys The certification authority certificate that you want to import has to be in one of these file formats Binary X 509 This is an ITU T recommendation that de...

Страница 209: ...unique name Type This field displays what kind of certificate this is REQ represents a certification request and is not yet a valid certificate Send a certification request to a certification authorit...

Страница 210: ...e a certificate that shows SELF in the Type field 1 Make sure that no other features such as HTTPS VPN SSH are configured to use the SELF certificate 2 Click the details icon next to another self sign...

Страница 211: ...ibes the labels in this screen 18 4 2 My Certificates Create Screen Use this screen if you do not have an existing or issued certificate and want to have the NWA create a self signed certificate enrol...

Страница 212: ...mmon Name is mandatory The certification authority may add fields such as a serial number to the subject information when it issues a certificate It is recommended that each certificate have unique su...

Страница 213: ...send to the certification authority Copy the certification request from the My Certificate Details screen Section 18 4 3 on page 214 and then send it to the certification authority Create a certificat...

Страница 214: ...case of a self signed certificate you can set it to be the one that the NWA uses to sign the trusted remote host certificates that you import to the NWA CA Certificate Select the certification author...

Страница 215: ...NWA 3550 User s Guide 215 Click Certificates My Certificates to open the My Certificates screen Figure 130 on page 209 Click the details button to open the My Certificate Details screen Figure 133 Cer...

Страница 216: ...s the only one in the list The NWA does not trust the certificate and displays Not trusted in this field if any certificate on the path has expired or been revoked Refresh Click Refresh to display the...

Страница 217: ...icate s path MD5 Fingerprint This is the certificate s message digest that the NWA calculated using the MD5 algorithm SHA1 Fingerprint This is the certificate s message digest that the NWA calculated...

Страница 218: ...cates Trusted CA Certificates This field displays the certificate index number The certificates are listed in alphabetical order Name This field displays the name used to identify this certificate Sub...

Страница 219: ...to have the NWA check the CRL before trusting any certificates issued by the certification authority Otherwise the field displays No Details Click Details to view in depth information about the certi...

Страница 220: ...ou want the NWA to check a certification authority s list of revoked certificates before trusting a certificate issued by the certification authority Table 71 Certificates Trusted CA Import LABEL DESC...

Страница 221: ...ays the identifying name of this certificate If you want to change the name type up to 31 characters to identify this key certificate You may use any character not including spaces Property Check inco...

Страница 222: ...ication authority Subject This field displays information that identifies the owner of the certificate such as Common Name CN Organizational Unit OU Organization O and Country C Issuer This field disp...

Страница 223: ...verify a remote host s certificate before you import it into the NWA SHA1 Fingerprint This is the certificate s message digest that the NWA calculated using the SHA1 algorithm You cannot use this valu...

Страница 224: ...key pair one public key and one private key 2 Tim keeps the private key and makes the public key openly available This means that anyone who receives a message seeming to come from Tim can read it an...

Страница 225: ...how to check a certificate s fingerprint to verify that you have the actual certificate 1 Browse to where you have the certificate saved on your computer 2 Make sure that the certificate has a cer or...

Страница 226: ...se a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields The secure method may vary according to your situation Possible examp...

Страница 227: ...ministrators to effectively monitor events errors progress etc so that when network problems or system failures occur the cause or origin can be traced Logs are also essential for auditing and keeping...

Страница 228: ...them by their color in the View Log screen Alerts are displayed in red and logs are displayed in black Receiving Logs via Email If you want to receive logs in your email account you need to have the n...

Страница 229: ...gs select All Logs The number of categories shown in the drop down list box depends on the selection in the Log Settings page Time This field displays the time the log was recorded Message This field...

Страница 230: ...ress Info Mail Server Enter the server name or the IP address of the mail server for the e mail addresses specified below If this field is left blank logs and alert messages will not be sent via e mai...

Страница 231: ...configure the frequency of log messages being sent as E mail Daily Weekly Hourly When Log is Full None If the Weekly or the Daily option is selected specify a time of day when the E mail should be se...

Страница 232: ...address to a client SMT Login Successfully Someone has logged on to the NWA s SMT interface SMT Login Fail Someone has failed to log on to the NWA s SMT interface WEB Login Successfully Someone has lo...

Страница 233: ...work 1 Redirect datagrams for the Host 2 Redirect datagrams for the Type of Service and Network 3 Redirect datagrams for the Type of Service and Host 8 Echo 0 Echo message 11 Time Exceeded 0 Time to l...

Страница 234: ...n an individual NWA log category Use the sys logs clear command to erase all of the NWA s logs 19 6 5 Log Command Example This example shows how to set the NWA to record the error logs and alerts and...

Страница 235: ...bove the NWA allows station A to connect to the internet but not to the server It allows station B to connect to the server but not to the Internet 20 2 What You Can Do in the VLAN Screen Use the Wire...

Страница 236: ...screen See Section 20 5 3 on page 243 for more information Note To use RADIUS VLAN you must first select Enable VIRTUAL LAN and configure the Management VLAN ID in the VLAN Wireless VLAN screen The M...

Страница 237: ...NWA 3500 NWA 3550 User s Guide 237 20 4 Wireless VLAN Screen Use this screen to enable and configure your Wireless Virtual LAN setup Click VLAN Wireless VLAN The following screen appears Figure 143 VL...

Страница 238: ...use to connect to the NWA Index This is the index number of the SSID profile Name This is the name of the SSID profile SSID This is the SSID the profile uses VLAN ID Enter a VLAN ID number from 1 to...

Страница 239: ...attributes sent from the RADIUS server do not match a configured Name field When you select this check box only users with names configured in this screen can access the network through the NWA VLAN...

Страница 240: ...LAN VLAN ID 1 The following procedure shows you how to configure a tagged VLAN Note Use the out of band management port or console port to configure the switch if you misconfigure the management VLAN...

Страница 241: ...the following steps in the switch web configurator 1 Click VLAN under Advanced Application 2 Click Static VLAN 3 Select the ACTIVE check box 4 Type a Name for the VLAN ID 5 Type a VLAN Group ID This s...

Страница 242: ...ions in the Quick Start Guide to set up your NWA for configuration The NWA should be connected to the VLAN aware switch In the above example the switch is using port 1 to connect to your computer and...

Страница 243: ...aware device you will lock yourself out of the NWA If this happens you must reset the NWA to access it again 20 5 3 Configuring Microsoft s IAS Server Example Dynamic VLAN assignment can be used with...

Страница 244: ...ot matched the NWA uses the VLAN ID configured in the WIRELESS VLAN screen and the wireless station This VLAN ID is independent and hence different to the ID in the VLAN screen 20 5 3 1 Configuring VL...

Страница 245: ...ong to which VLAN groups Click the Add button and configure the VLAN group details 3 Repeat the previous step to add each VLAN group required Figure 151 Add Group Members 20 5 3 2 Configuring Remote A...

Страница 246: ...tion policy is still present it should be moved to the bottom or deleted to allow the VLAN Group policies to take precedence 1a 1 Right click Remote Access Policy and select New Remote Access Policy 1...

Страница 247: ...e group value Figure 154 Adding VLAN Group 6 When the Permissions options screen displays select Grant remote access permission 6a Click Next to grant access based on group membership 6b Click the Edi...

Страница 248: ...8 Click the Encryption tab Select the Strongest encryption option This step is not required for EAP MD5 but is performed as a safeguard Figure 157 Encryption Tab Settings 9 Click the IP tab and selec...

Страница 249: ...IUS VLAN attributes required for 802 1X Dynamic VLAN Assignment Figure 158 Connection Attributes Screen 11 The RADIUS Attribute screen displays From the list three RADIUS attributes will be added Tunn...

Страница 250: ...igure 160 802 Attribute Setting for Tunnel Medium Type 13 Return to the RADIUS Attribute Screen shown as Figure 159 on page 250 13a Select Tunnel Pvt Group ID 13b Click Add 14 The Attribute Informatio...

Страница 251: ...Group ID 15 Return to the RADIUS Attribute Screen shown as Figure 159 on page 250 15a Select Tunnel Type 15b Click Add 16 The Enumerable Attribute Information screen displays 16a Select Virtual LANs...

Страница 252: ...esemble the following screen Figure 163 Completed Advanced Tab Note Repeat the Configuring Remote Access Policies procedure for each VLAN Group defined in the Active Directory Remember to place the mo...

Страница 253: ...with a VLAN ID incoming VLAN ID These incoming VLAN packets are forwarded to the NWA The NWA compares the VLAN ID in the packet header with each SSID s configured VLAN ID and second Rx VLAN ID setting...

Страница 254: ...o restore the default configuration file 4 Select the SSID profile you want to configure SSID03 in this example and enter the VLAN ID number between 1 and 4094 5 Enter a Second Rx VLAN ID The followin...

Страница 255: ...let connect choose this option For example if your company s graphic design team has their own NWA and they have 10 computers you can load balance for 10 Later if someone from the sales department vi...

Страница 256: ...it for their turn or get shunted to the nearest identical AP The following figure depicts an NWA with a hard bandwidth limit of 6 Megabits per second Mbps Bandwidth up to 6 Mbps is considered balanced...

Страница 257: ...een appears Figure 167 Load Balancing The following table describes the labels in this screen Table 82 Load Balancnig FIELD DESCRIPTION Enable Load Balancing Select this option to turn on wireless loa...

Страница 258: ...oaded If you leave this unchecked then the AP simply delays the connection until it can afford the bandwidth it requires or it shunts the connection to another AP within its broadcast radius The kick...

Страница 259: ...ck the connections that are pushing it over its balanced bandwidth allotment Figure 169 Kicking a Connection Connections are kicked based in either idle timeout or signal strength The NWA first looks...

Страница 260: ...Chapter 21 Load Balancing NWA 3160 Series User s Guide 260...

Страница 261: ...umerous APs broadcast within a given area they introduce the possibility of heightened radio interference especially if some or all of them are broadcasting on the same radio channel This can make acc...

Страница 262: ...unused then set your device to use one of them But with Dynamic Channel Selection the NWA does this automatically 22 2 The DCS Screen Use this screen to configure your Dynamic Channel Selection option...

Страница 263: ...switches channels are dropped DCS Allow Channel List 2 4G only Select the range of non overlapping channel numbers for which you want the NWA to scan and subsequently use if available DCS DFS Channel...

Страница 264: ...Chapter 22 Dynamic Channel Selection NWA 3160 Series User s Guide 264...

Страница 265: ...nformation such as port status packet specific statistics and bridge link status Also provided are system up time and poll interval s Use the Association List screen Section 23 5 on page 268 to view t...

Страница 266: ...ntenance System Status The following table describes the labels in this screen 23 4 1 System Statistics Screen Use this screen to view diagnostic information about the NWA Click Maintenance Show Stati...

Страница 267: ...rt connections can be in half duplex or full duplex mode Full duplex refers to a device s ability to send and receive simultaneously while half duplex indicates that traffic can flow in only one direc...

Страница 268: ...the bridge connection is activated or not Remote Bridge MAC This is the MAC address of the peer device in bridge mode Status This shows the current status of the bridge connection which can be Up or...

Страница 269: ...h the wireless station is associated Signal This field displays the RSSI Received Signal Strength Indicator of the wireless connection WDS Link This section displays only when bridge mode is activated...

Страница 270: ...IBSS as one that doesn t See the chapter on wireless configuration for more information on basic service sets BSS and extended service sets ESS MAC Address This field displays the MAC address of the A...

Страница 271: ...t In some operating systems you may see the following icon on your desktop Figure 178 Network Temporarily Disconnected After two minutes log in again and check your new firmware version in the System...

Страница 272: ...Screen Use this screen backup or upload your NWA s configuration file You can also reset the configuration of your device in this screen Click Maintenance Configuration The following figure displays...

Страница 273: ...upload is in progress After you see a restore configuration successful screen you must then wait one minute before logging into the NWA again Figure 181 Configuration Upload Successful The NWA automa...

Страница 274: ...ar Click Return to go back to the Configuration screen Figure 183 Configuration Upload Error 23 8 3 Back to Factory Defaults Pressing the Reset button in this section clears all user entered configura...

Страница 275: ...Maintenance NWA 3500 NWA 3550 User s Guide 275 Click Maintenance Restart The following screen displays Click Restart to have the NWA reboot This does not affect the NWA s configuration Figure 185 Rest...

Страница 276: ...Chapter 23 Maintenance NWA 3500 NWA 3550 User s Guide 276...

Страница 277: ...277 PART III Troubleshooting and Specifications Troubleshooting 279 Product Specifications 285...

Страница 278: ...278...

Страница 279: ...shooting 24 1 Power and Hardware Connections The NWA does not turn on 1 Make sure you are using the PoE power injector included with the NWA 2 Make sure the PoE power injector is connected to the NWA...

Страница 280: ...address Section 14 4 on page 176 use the new IP address If you changed the IP address and have forgotten it see the troubleshooting suggestions for I forgot the IP address for the NWA 2 Check the hard...

Страница 281: ...t to access the NWA Log out of the NWA in the other session or ask the person who is logged in to log out 3 Disconnect and re connect the power adaptor or cord to the NWA 4 If this does not work you h...

Страница 282: ...ur ISP I cannot access the Internet anymore I had access to the Internet with the NWA but my Internet connection is not available anymore 1 Check the hardware connections See the Quick Start Guide 2 R...

Страница 283: ...s LAN is enabled on the NWA 2 Make sure the wireless adapter on the wireless client is working properly 3 Make sure the wireless adapter installed on your computer is IEEE 802 11 compatible and suppor...

Страница 284: ...Chapter 24 Troubleshooting NWA 3500 NWA 3550 User s Guide 284...

Страница 285: ...cables Power over Ethernet PoE IEEE 802 3af compliant Antenna Specifications Two external antenna connectors N Type Output Power IEEE 802 11b g 17 dBm IEEE 802 11a 14 dBm Operating Environment Tempera...

Страница 286: ...s associated with your NWA from communicating with other wireless clients APs computers or routers in a network Multiple BSSID MBSSID MBSSID mode allows the NWA to operate up to 8 different wireless n...

Страница 287: ...ded FTP and TFTP Servers The embedded FTP and TFTP servers enable fast firmware upgrades as well as configuration file backups and restoration Auto Configuration Administrators can use text configurat...

Страница 288: ...try Canada RSS 210 Australia AS NZS 4268 EMC EMI USA FCC Part 15 Subpart B EU EN 301 489 17 V1 2 1 08 2002 EN 55022 2006 Canada ICES 003 Australia AS NZS CISPR22 EMC EMS EU EN 301 489 1 V1 5 1 11 2004...

Страница 289: ...in dBi 8 9 14 18 6 8 8 18 Max VSWR 2 0 1 1 5 1 1 5 1 1 5 1 2 0 1 2 0 1 2 0 1 2 0 1 HPBW Horizontal 360 65 30 15 65 50 360 18 HPBW Vertical 15 60 30 5 75 50 20 18 Impedance Ohm 50 50 50 50 50 50 50 Con...

Страница 290: ...N PLUG to N PLUG for 6M 91 005 075002G N PLUG to N PLUG for 9M 91 005 075003G N PLUG to N PLUG for 12M 91 005 075004G N PLUG to N PLUG for 1M LMR 200 91 005 074001G N PLUG to RP SMA PLUG for 3M 91 005...

Страница 291: ...ing Up Your Computer s IP Address 293 Wireless LANs 319 Pop up Windows JavaScripts and Java Permissions 335 Importing Certificates 343 IP Addresses and Subnetting 369 Text File Based Auto Configuratio...

Страница 292: ...292...

Страница 293: ...P 2000 Mac OS 9 OS X and all versions of UNIX LINUX include the software components you need to use TCP IP on your computer If you manually assign IP information instead of using a dynamic IP make sur...

Страница 294: ...Up Your Computer s IP Address NWA 3500 NWA 3550 User s Guide 294 1 Click Start Control Panel Figure 186 Windows XP Start Menu 2 In the Control Panel click the Network Connections icon Figure 187 Windo...

Страница 295: ...Guide 295 3 Right click Local Area Connection and then select Properties Figure 188 Windows XP Control Panel Network Connections Properties 4 On the General tab select Internet Protocol TCP IP and the...

Страница 296: ...P address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided 7 Click OK to clo...

Страница 297: ...ection shows screens from Windows Vista Professional 1 Click Start Control Panel Figure 191 Windows Vista Start Menu 2 In the Control Panel click the Network and Internet icon Figure 192 Windows Vista...

Страница 298: ...connections Figure 194 Windows Vista Network and Sharing Center 5 Right click Local Area Connection and then select Properties Figure 195 Windows Vista Network and Sharing Center Note During this pro...

Страница 299: ...x A Setting Up Your Computer s IP Address NWA 3500 NWA 3550 User s Guide 299 6 Select Internet Protocol Version 4 TCP IPv4 and then select Properties Figure 196 Windows Vista Local Area Connection Pro...

Страница 300: ...atic IP address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided Click Advan...

Страница 301: ...e 301 Mac OS X 10 3 and 10 4 The screens in this section are from Mac OS X 10 4 but can also apply to 10 3 1 Click Apple System Preferences Figure 198 Mac OS X 10 4 Apple Menu 2 In the System Preferen...

Страница 302: ...rences pane opens select Built in Ethernet from the network connection type list and then click Configure Figure 200 Mac OS X 10 4 Network Preferences 4 For dynamically assigned settings select Using...

Страница 303: ...tatically assigned settings do the following From the Configure IPv4 list select Manually In the IP Address field type your IP address In the Subnet Mask field type your subnet mask In the Router fiel...

Страница 304: ...tings Check your TCP IP properties by clicking Applications Utilities Network Utilities and then selecting the appropriate Network Interface from the Info tab Figure 203 Mac OS X 10 4 Network Utility...

Страница 305: ...Appendix A Setting Up Your Computer s IP Address NWA 3500 NWA 3550 User s Guide 305 2 In System Preferences click the Network icon Figure 205 Mac OS X 10 5 Systems Preferences...

Страница 306: ...ist of available connection types Figure 206 Mac OS X 10 5 Network Preferences Ethernet 4 From the Configure list select Using DHCP for dynamically assigned settings 5 For statically assigned settings...

Страница 307: ...tting Up Your Computer s IP Address NWA 3500 NWA 3550 User s Guide 307 In the Router field enter the IP address of your NWA Figure 207 Mac OS X 10 5 Network Preferences Ethernet 6 Click Apply and clos...

Страница 308: ...Linux Ubuntu 8 GNOME This section shows you how to configure your computer s TCP IP settings in the GNU Object Model Environment GNOME using the Ubuntu 8 Linux distribution The procedure screens and f...

Страница 309: ...ure 209 Ubuntu 8 System Administration Menu 2 When the Network Settings window opens click Unlock to open the Authenticate window By default the Unlock button is greyed out until clicked You cannot ma...

Страница 310: ...icate window enter your admin account name and password then click the Authenticate button Figure 211 Ubuntu 8 Administrator Account Authentication 4 In the Network Settings window select the connecti...

Страница 311: ...operties In the Configuration list select Automatic Configuration DHCP if you have a dynamic IP address In the Configuration list select Static IP address if you have a static IP address Fill in the I...

Страница 312: ...in the Network Settings window and then enter the DNS server information in the fields provided Figure 214 Ubuntu 8 Network Settings DNS 8 Click the Close button to apply the changes Verifying Setting...

Страница 313: ...w to configure your computer s TCP IP settings in the K Desktop Environment KDE using the openSUSE 10 3 Linux distribution The procedure screens and file locations may vary depending on your specific...

Страница 314: ...500 NWA 3550 User s Guide 314 1 Click K Menu Computer Administrator Settings YaST Figure 216 openSUSE 10 3 K Menu Computer Menu 2 When the Run as Root KDE su dialog opens enter the admin password and...

Страница 315: ...window opens select Network Devices and then click the Network Card icon Figure 218 openSUSE 10 3 YaST Control Center 4 When the Network Settings window opens click the Overview tab select the approp...

Страница 316: ...click the Address tab Figure 220 openSUSE 10 3 Network Card Setup 6 Select Dynamic Address DHCP if you have a dynamic IP address Select Statically assigned IP Address if you have a static IP address F...

Страница 317: ...r s Guide 317 8 If you know your DNS server IP address es click the Hostname DNS tab in Network Settings and then enter the DNS server information in the fields provided Figure 221 openSUSE 10 3 Netwo...

Страница 318: ...on the Task bar to check your TCP IP properties From the Options sub menu select Show Connection Information Figure 222 openSUSE 10 3 KNetwork Manager When the Connection Status KNetwork Manager wind...

Страница 319: ...endent network which is commonly referred to as an ad hoc network or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an...

Страница 320: ...xtended Service Set ESS consists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is calle...

Страница 321: ...t AP access point to reduce interference Interference occurs when radio signals from different access points overlap causing interference and degrading performance Adjacent channels partially overlap...

Страница 322: ...must first send an RTS Request To Send message to the AP for permission to send it The AP then responds with a CTS Clear to Send message to all other stations within its range to notify them to defer...

Страница 323: ...ngth of the synchronization field in a packet Short preamble increases performance as less time sending preamble means more time for sending data All IEEE 802 11b g compliant wireless adapters support...

Страница 324: ...igure shows the relative effectiveness of these wireless security methods available on your NWA Note You must enable the same wireless security settings on the NWA and on all wireless clients that you...

Страница 325: ...the wireless clients RADIUS RADIUS is based on a client server model that supports authentication authorization and accounting The access point is the client and the server is the RADIUS server The R...

Страница 326: ...and LEAP Your wireless LAN device may not support all authentication types EAP Extensible Authentication Protocol is an authentication protocol that runs on top of the IEEE 802 1x transport mechanism...

Страница 327: ...ssive attacks A digital certificate is an electronic ID card that authenticates the sender s identity However to implement EAP TLS you need a Certificate Authority CA to handle certificates which impo...

Страница 328: ...2 Wi Fi Protected Access WPA is a subset of the IEEE 802 11i standard WPA2 IEEE 802 11i is a wireless security standard that defines stronger encryption authentication and key management than WPA Key...

Страница 329: ...Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the PMK to dynamically generate unique data encryption keys to encrypt every data packet that is wi...

Страница 330: ...tication enables fast roaming by allowing the wireless client already connecting to an AP to perform IEEE 802 1x authentication with another AP before connecting to it Wireless Client WPA Supplicants...

Страница 331: ...wireless clients Figure 228 WPA 2 with RADIUS Application Example WPA 2 PSK Application Example A WPA 2 PSK application looks as follows 1 First enter identical passwords into the AP and all wireless...

Страница 332: ...l type MAC address filters are not dependent on how you configure these security features Table 101 Wireless Security Relational Matrix AUTHENTICATION METHOD KEY MANAGEMENT PROTOCOL ENCRYPTIO N METHOD...

Страница 333: ...overage area Antenna Gain Antenna gain measured in dB decibel is the increase in coverage within the RF beam width Higher antenna gain improves the range of the signal for better communications For an...

Страница 334: ...grees very directional to 120 degrees less directional Directional antennas are ideal for hallways and outdoor point to point applications Positioning Antennas In general antennas should be mounted as...

Страница 335: ...rnet Explorer versions may vary Internet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Ser...

Страница 336: ...x in the Pop up Blocker section of the screen This disables any web pop up blockers you may have enabled Figure 231 Internet Options Privacy 3 Click Apply to save this setting Enable pop up Blockers w...

Страница 337: ...00 NWA 3550 User s Guide 337 2 Select Settings to open the Pop up Blocker Settings screen Figure 232 Internet Options Privacy 3 Type the IP address of your device the web page that you do not want to...

Страница 338: ...ck Add to move the IP address to the list of Allowed sites Figure 233 Pop up Blocker Settings 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting JavaScripts If pages of t...

Страница 339: ...xplorer click Tools Internet Options and then the Security tab Figure 234 Internet Options Security 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that E...

Страница 340: ...lick OK to close the window Figure 235 Security Settings Java Scripting Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button...

Страница 341: ...s NWA 3500 NWA 3550 User s Guide 341 5 Click OK to close the window Figure 236 Security Settings Java JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make su...

Страница 342: ...Appendix C Pop up Windows JavaScripts and Java Permissions NWA 3500 NWA 3550 User s Guide 342 3 Click OK to close the window Figure 237 Java Sun...

Страница 343: ...cates These can be used by web browsers on a LAN or WAN to verify that they are in fact connecting to the legitimate device and not one masquerading as it However because the certificates were not iss...

Страница 344: ...the first time you browse to it you are presented with a certification error Figure 238 Internet Explorer 7 Certification Error 2 Click Continue to this website not recommended Figure 239 Internet Ex...

Страница 345: ...A 3500 NWA 3550 User s Guide 345 4 In the Certificate dialog box click Install Certificate Figure 241 Internet Explorer 7 Certificate 5 In the Certificate Import Wizard click Next Figure 242 Internet...

Страница 346: ...matically select certificate store based on the type of certificate click Next again and then go to step 9 Figure 243 Internet Explorer 7 Certificate Import Wizard 7 Otherwise select Place all certifi...

Страница 347: ...t Certificate Store dialog box choose a location in which to save the certificate and then click OK Figure 245 Internet Explorer 7 Select Certificate Store 9 In the Completing the Certificate Import W...

Страница 348: ...lly click OK when presented with the successful certificate installation message Figure 248 Internet Explorer 7 Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL...

Страница 349: ...one has been issued to you 1 Double click the public key certificate file Figure 250 Internet Explorer 7 Public Key Certificate File 2 In the security warning dialog box click Open Figure 251 Interne...

Страница 350: ...00 NWA 3550 User s Guide 350 1 Open Internet Explorer and click Tools Internet Options Figure 252 Internet Explorer 7 Tools Menu 2 In the Internet Options dialog box click Content Certificates Figure...

Страница 351: ...icates Authorities tab select the certificate that you want to delete and then click Remove Figure 254 Internet Explorer 7 Certificates 4 In the Certificates confirmation click Yes Figure 255 Internet...

Страница 352: ...following example uses Mozilla Firefox 2 on Windows XP Professional however the screens can also apply to Firefox 2 on all platforms 1 If your device s web configurator is set to use SSL certificatio...

Страница 353: ...to open the Page Info Security window to view the web page s security information Figure 258 Firefox 2 Page Info Installing a Stand Alone Certificate File in Firefox Rather than browsing to a ZyXEL w...

Страница 354: ...3500 NWA 3550 User s Guide 354 2 In the Options dialog box click Advanced Encryption View Certificates Figure 260 Firefox 2 Options 3 In the Certificate Manager dialog box click Web Sites Import Figu...

Страница 355: ...Firefox 2 Select File 5 The next time you visit the web site click the padlock in the address bar to open the Page Info Security window to see the web page s security information Removing a Certificat...

Страница 356: ...n the Options dialog box click Advanced Encryption View Certificates Figure 264 Firefox 2 Options 3 In the Certificate Manager dialog box select the Web Sites tab select the certificate that you want...

Страница 357: ...blic key certificate you just removed a certification error appears Opera The following example uses Opera 9 on Windows XP Professional however the screens can apply to Opera 9 on all platforms 1 If y...

Страница 358: ...w to view the web page s security details Figure 268 Opera 9 Security information Installing a Stand Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a p...

Страница 359: ...Appendix D Importing Certificates NWA 3500 NWA 3550 User s Guide 359 2 In Preferences click Advanced Security Manage certificates Figure 270 Opera 9 Preferences...

Страница 360: ...NWA 3550 User s Guide 360 3 In the Certificates Manager click Authorities Import Figure 271 Opera 9 Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click...

Страница 361: ...stall authority certificate 6 Next click OK Figure 274 Opera 9 Install authority certificate 7 The next time you visit the web site click the padlock in the address bar to open the Security informatio...

Страница 362: ...porting Certificates NWA 3500 NWA 3550 User s Guide 362 1 Open Opera and click Tools Preferences Figure 275 Opera 9 Tools Menu 2 In Preferences Advanced Security Manage certificates Figure 276 Opera 9...

Страница 363: ...ificate you just removed a certification error appears Note There is no confirmation when you delete a certificate authority so be absolutely certain that you want to go through with it before clickin...

Страница 364: ...queror 3 5 Server Authentication 3 Click Forever when prompted to accept the certificate Figure 279 Konqueror 3 5 Server Authentication 4 Click the padlock in the address bar to open the KDE SSL Infor...

Страница 365: ...en prompted you can install a stand alone certificate file if one has been issued to you 1 Double click the public key certificate file Figure 281 Konqueror 3 5 Public Key Certificate File 2 In the Ce...

Страница 366: ...security details Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3 5 1 Open Konqueror and click Settings Configure Konqueror Figure 284...

Страница 367: ...e next time you go to the web site that issued the public key certificate you just removed a certification error appears Note There is no confirmation when you remove a certificate authority so be abs...

Страница 368: ...Appendix D Importing Certificates NWA 3500 NWA 3550 User s Guide 368...

Страница 369: ...mber and the other part is the host ID In the same way that houses on a street share a common street name the hosts on a network share a common network number Similarly as each house has its own house...

Страница 370: ...and which bits are part of the host ID using a logical AND operation The term subnet is short for sub network A subnet mask has 32 bits If a bit in the subnet mask is a 1 then the corresponding bit in...

Страница 371: ...k number determines the maximum number of possible hosts you can have on your network The larger the number of network number bits the smaller the number of remaining host ID bits An IP address with h...

Страница 372: ...ess For example 192 1 1 0 25 is equivalent to saying 192 1 1 0 with subnet mask 255 255 255 128 The following table shows some possible subnet masks using both notations Table 104 Maximum Host Numbers...

Страница 373: ...s is 192 168 1 0 The first three octets of the address 192 168 1 are the network number and the remaining octet is the host ID allowing a maximum of 28 2 or 254 possible hosts The following figure sho...

Страница 374: ...55 255 128 is subnet A itself and 192 168 1 127 with mask 255 255 255 128 is its broadcast address Therefore the lowest IP address that can be assigned to an actual host for subnet A is 192 168 1 1 an...

Страница 375: ...UMBER LAST OCTET BIT VALUE IP Address 192 168 1 64 IP Address Binary 11000000 10101000 00000001 01000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 64 Lowest Host...

Страница 376: ...192 168 1 255 Highest Host ID 192 168 1 254 Table 109 Subnet 4 continued IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE Table 110 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BR...

Страница 377: ...vate use please do not use any other number unless you are told otherwise You must also enable Network Address Translation NAT on the NWA Once you have decided on the network number pick an IP address...

Страница 378: ...works 10 0 0 0 10 255 255 255 172 16 0 0 172 31 255 255 192 168 0 0 192 168 255 255 You can obtain your IP address from the IANA from an ISP or it can be assigned from a private network If you belong...

Страница 379: ...ew You can use plain text configuration files to configure the wireless LAN settings on multiple APs The AP can automatically get a configuration file from a TFTP server at startup or after renewing D...

Страница 380: ...ad the file from the specified TFTP server The AP then uses the file to configure wireless LAN settings Note Not all DHCP servers allow you to specify options 66 and 67 Manual Configuration Use the fo...

Страница 381: ...e must use the following format Figure 290 Configuration File Format The first line must be ZYXEL PROWLAN Table 115 Configuration via SNMP STEPS MIB VARIABLE VALUE Step 1 pwTftpServer Set the IP addre...

Страница 382: ...age with the line number and reason for the first error subsequent errors during the processing of an individual configuration file are not recorded You can use SNMP management software to display the...

Страница 383: ...index 1 wcfg security save wcfg ssid 1 name ssid wep wcfg ssid 1 security Test wep wcfg ssid 1 l2iolation disable wcfg ssid 1 macfilter disable wcfg ssid save ZYXEL PROWLAN VERSION 12 wcfg security 2...

Страница 384: ...Test wpapsk wcfg security 3 mode wpapsk wcfg security 3 passphrase qwertyuiop wcfg security 3 reauthtime 1800 wcfg security 3 idletime 3600 wcfg security 3 groupkeytime 1800 wcfg security save wcfg ss...

Страница 385: ...Test 8021x wcfg ssid 2 radius radius rd wcfg ssid 3 name ssid wpapsk wcfg ssid 3 security Test wpapsk wcfg ssid 4 name ssid wpa2psk wcfg ssid 4 security Test wpa2psk wcfg ssid save line starting with...

Страница 386: ...Appendix F Text File Based Auto Configuration NWA 3500 NWA 3550 User s Guide 386...

Страница 387: ...arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the...

Страница 388: ...evision reception which can be determined by turning the device off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the...

Страница 389: ...yXEL Limited Warranty ZyXEL warrants to the original end user purchaser that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase...

Страница 390: ...e or purpose ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser To obtain the services of this warranty contact your vendor You may also refer to...

Страница 391: ...8 authentication server 23 auto configuration 379 auto configuration status 382 B backup 272 Basic Service Set 120 see BSS bridge 24 25 Bridge Protocol Data Units BPDUs 132 Bridge Repeater 23 24 BSS 2...

Страница 392: ...al setup 112 guest SSID 27 H hidden node 321 honeypot attack 181 host 114 host ID 110 humidity 285 286 I IANA 110 378 IBSS 319 IEEE 802 11g 323 IEEE 802 1x 23 in band management 240 Independent Basic...

Страница 393: ...329 331 password 113 286 path cost 132 PoE 290 power specification 285 power specifications 285 290 preamble mode 323 pre configured profiles 27 priorities 138 prioritization 23 private IP address 11...

Страница 394: ...to configuration 287 379 TFTP restrictions 189 time setting 116 time sensitive 23 trademarks 387 traffic security 23 U use 23 V Virtual Local Area Network 235 VLAN 235 255 261 VoIP 23 27 145 VoIP SSID...

Страница 395: ...Guide 395 WPA2 23 328 user authentication 330 vs WPA2 PSK 329 wireless client supplicant 330 with RADIUS application example 330 WPA2 Pre Shared Key 328 WPA2 PSK 328 329 application example 331 WPA P...

Страница 396: ...Index NWA 3500 NWA 3550 User s Guide 396...

Отзывы: