background image

Key Settings:
  

Option

Descriptions

Filter Action 

Allow or block association from MAC addresses contained in this list. If Allow Association is selected in this field, 
hosts with MAC addresses configured in this list will be allowed to associate with AP. If Deny Association is selected in 
this field, hosts with MAC addresses configured in this list will be blocked. 

MAC Address

This field specifies those MAC Addresses that you want to add in the list.

If you use WEB configuration, the MAC Address Filter configuration are as shown below. 

1.  Using a web browser, login AP by giving the LAN IP address of AP in URL field. Default LAN IP is 192.168.1.1, default password to login 

web configurator is 1234.

2.  Click Advanced, and click Wireless tab on the left.
3.  Click MAC Filter tab on the top and select Yes in the Active field to enable MAC Filter.
4.  Select the Filter Action to allow or deny association from hosts in the list.
5.  Enter the MAC Addresses which you may want to apply the filter to allow or block associations from.
6.  Click Apply to make your setting work.

 

Содержание ZyAIR G-5100

Страница 1: ...V 0 2005 6 30 FAQ ZyNOS FAQ Product FAQ Wireless FAQ Application Notes Infrastructure Mode Wireless MAC Address Filtering WEP Configurations Roaming Site Survey Repeater mode AP Bridge mode 802 1x WPA...

Страница 2: ...figurator 8 How do I backup restore configurations by using TFTP client program via LAN 9 How do I backup restore configurations by using FTP client program via LAN 1 What is ZyNOS ZyNOS is ZyXEL s pr...

Страница 3: ...o confirm than press Apply button to save the change 4 How do I upload the ZyNOS firmware code via embeded web configurator The procedure for uploading ZyNOS via embeded web configurator is as follows...

Страница 4: ...upgrade firmware use FTP client program to put firmware in file ras in the ZyAIR G 5100 After data transfer is finished the Prestige will program the upgraded firmware into FLASH ROM and reboot itsel...

Страница 5: ...G 5100 b Enter CI command sys stdio 0 in menu 24 8 to disable console idle timeout c To backup the configurations use TFTP client program to get file rom 0 from the Prestige d To restore the configura...

Страница 6: ...XP 8 What is the default user name and password to login the ZyAIR G 5100 via the browser 9 How can I manage the ZyAIR G 5100 10 What network interface does the ZyAIR G 5100 support 11 What is the max...

Страница 7: ...ZyAIR G 5100 is equipped with one auto MDI MDIX Ethernet LAN port and two 802 11g Wireless LAN interfaces It is the simplest and affordable solution for adding wireless mobile capability to your exist...

Страница 8: ...lly is 50m 80m indoor 150m 300m outdoor The actual range may very depends on environment as to obstacles and walls RF interference etc in the environment 5 What can I do if I lost the password for my...

Страница 9: ...use Windows to configure wireless configuration check box and click OK Now you need to exit the supplied configuration utility in the Windows task bar and restart it again Now you can use the supplied...

Страница 10: ...on ZyAIR G 5100 The ZyAIR G 5100 are equip with omni directional antenna with 2 dBi Gains 2 Can I change the antenna on ZyAIR G 5100 Yes you can change the antenna on ZyAIR G 5100 to fit your impleme...

Страница 11: ...involves a more rigorous exchange of frames ensuring that the requesting station is authentic For a station to use shared key authentication it must implement WEP 7 What authentication type does ZyAIR...

Страница 12: ...ation 10 What are 802 1x authentication type and which authentication type does ZyAIR G 5100 802 1x embedded server support 802 1x specify the following authentication type and the ZyAIR G 5100 s embe...

Страница 13: ...Windows XP embedded 802 1x client 2 Funk Software Odyssey client For external TTLS authentication server Odyssey server 1 Funk Software Odyssey client Note 1 XP only support MD5 CHAP and TLS before S...

Страница 14: ...11g 11 Is it possible to use products from a variety of vendors 12 What is Wi Fi 13 What types of devices use the 2 4GHz Band 14 Does Bluetooth interfer with wireless 802 11 LAN 15 Can radio signals...

Страница 15: ...the SSID be encrypted 7 By turning off the broadcast of SSID can someone still sniff the SSID 8 What are Insertion Attacks 9 What is Wireless Sniffer 10 What is the difference between Open System and...

Страница 16: ...hile the initial investment required for wireless LAN hardware can be higher than the cost of wired LAN hardware overall installation expenses and life cycle costs can be significantly lower Long term...

Страница 17: ...es 6 What is IEEE 802 11 The IEEE 802 11 is a wireless LAN industry standard and the objective of IEEE 802 11 is to make sure that different manufactures wireless LAN devices can communicate to each o...

Страница 18: ...1 Mbps or lower depending on range The range at 54 Mbps is less than for 802 11b operating at 11 Mbps 11 Is it possible to use products from a variety of vendors Yes As long as the products comply to...

Страница 19: ...nces with a high water content do not allow radio waves to pass through Metals reflect radio waves and concrete attenuates radio waves The amount of attenuation suffered in passing through concrete wi...

Страница 20: ...ired in a given area This depends on the surrounding terrain the diameter of the client population and the number of clients If an area is large with dispersed pockets of populations then extension po...

Страница 21: ...otocol and system that allows for unlicensed use of radios within a prescribed power level The ISM band is populated by Industrial Scientific and Medical devices that are all low power devices but can...

Страница 22: ...40 bit 10 Hex character as secret key set by user and a 24 bit Initialization Vector not under user control 40 24 64 Some vendors refer to this level of WEP as 40 bit others as 64 bit 4 What is a WEP...

Страница 23: ...attack principle on the wireless 10 What is the difference between Open System and Shared Key of Authentication Type Open System The default authentication service that simply announces the desire to...

Страница 24: ...frame is received The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server Each client attempting to access the netw...

Страница 25: ...in infrastructure mode through that access point Configuration Wireless Access Point to Infrastructure mode using SMT To configure Infrastructure mode of your ZyAIR G 5100 wireless AP please follow th...

Страница 26: ...om the web configurator main menu click advanced wireless to display Wireless LAN 3 Configure the desired configuation on ZyAIR G 5100 4 Finished Configuration Wireless Station to Infrastructure mode...

Страница 27: ...l down menu fill in an SSID or leave it as any if you wish to connect to any AP than press Apply Change to take effect 4 Click on Site Survey tab and press search all the available AP will be listed 5...

Страница 28: ...associated with the selected AP The linked AP s channel current linkup rate SSID link quality and signal strength will show on the Link Info page You now successfully associate with the selected AP w...

Страница 29: ...ed in menu 3 5 1 WLAN MAC Address Filter Configuration Before you configure the MAC filter you need to know the MAC address of the client first If not knowing what your MAC address is please enter a c...

Страница 30: ...to add in the list If you use WEB configuration the MAC Address Filter configuration are as shown below 1 Using a web browser login AP by giving the LAN IP address of AP in URL field Default LAN IP i...

Страница 31: ...that packages are not modified during the transition The standard does not discuss how the shared key is established In practice most installations use a single key that is shared between all mobile...

Страница 32: ...used to encrypt wireless data transmission For example Menu 3 5 Wireless LAN Setup Operaing Mode Access Point Edit MAC Address Filter No ESSID Wireless Edit Roaming Configuration No Hide ESSID No Edi...

Страница 33: ...ll use Key 3 to decrypt data So the Key 3 of station has to equal to the Key 3 of access point Though access point use Key 3 as default key but the station can use the other Key as its default key to...

Страница 34: ...t Show Config Utility The utility will pop up on your windows screen Note If the utility icon doesn t exist in your task bar click Start Programs IEEE802 11b WLAN Card IEEE802 11b WLAN Card 2 Select t...

Страница 35: ...cters WEP key or uncheck ASCII field for Hexadecimal digits WEP key Hexadecimal digits don t need to preceded by 0x For example 64 bits with characters WEP key Key1 loads Key2 oueww Key3 wopek Key4 wo...

Страница 36: ...guration AP1 for Roaming using SMT To Enable the roaming feature if you have two or more ZyAIRs on the same subnet Follow the steps below to allow roaming on your ZyAIR 1 From the SMT main menu enter...

Страница 37: ...n displays as shown next Menu 3 5 2 Roaming Configuration Active Yes Port 3517 Press ENTER to Confirm or ESC to Cancel field description Active Press SPACE BAR and then ENTER to select Yes to enable r...

Страница 38: ...ort 3 Upon completion click Apply to make configuration take effect Configuration AP2 for Roaming using Web configurator To Enable the roaming feature if you have two or more ZyAIRs on the same subnet...

Страница 39: ...met in order for wireless stations to roam between the coverage areas 1 All the access points and wireless stations must be on the same subnet configured with the same ESSID and security settings suc...

Страница 40: ...t the facility walk through the facility to verify the accuracy of the diagram and mark down any large obstacle you see that may effect the RF signal such as metal shelf metal desk etc on the diagram...

Страница 41: ...g the access point at the corner of the room and walk away from the access point in a systematic manner Record down the changes at point where transfer rate drop and the link quality and signal streng...

Страница 42: ...vice is required from corner of the room 6 Repeat step 1 5 and now you should be able to mark an RF coverage area as illustrated in above picutre 7 You may need more than one access point is the RF co...

Страница 43: ...ere are more than one access point is needed be sure to make the adjacent access point service area over lap one another So the wireless station are able to roam For more information please refer to r...

Страница 44: ...t through the device The ZyAIR G 5100 can function as a wireless network bridge repeater links with other bridge repeater Configuration for Wireless Station 1 The ZyAIR G 5100 can function as wireless...

Страница 45: ...ed and Wireless 2 Select Bridge Repeater in the Operation Mode drop down list box to display the screen as down 3 Type the MAC address of peer device in the Remote Bridge MAC Address field that is six...

Страница 46: ...ed and Wireless 2 Select Bridge Repeater in the Operation Mode drop down list box to display the screen as down 3 Type the MAC address of peer device in the Remote Bridge MAC Address field that is six...

Страница 47: ......

Страница 48: ...station can connect to the wired network through AP and bridge two APs can communicate with one another connection at the same time Note When the ZyAIR G 5100 is in AP Bridge mode the traffic between...

Страница 49: ...anced and Wireless 2 Select AP Bridge in the Operation Mode drop down list box to display the screen as down 3 Type a name to identify the ZyAIR in the wireless LAN up to 32 characters as the ESSID 4...

Страница 50: ...5 Type the MAC address of peer device in the Remote Bridge MAC Address field that is six hexadecimal character pairs 6 Click Apply to finish...

Страница 51: ...e Integrity Check MIC named Michael an extend initialization vector IV with sequencing rules and a re keying mechanism If you do not have an external RADIUS server you should use WPA PSK WPA Pre Share...

Страница 52: ...tility icon here is the Centrion on Windows XP in your windows task bar the utility will pop up on your windows screen 2 Select the wireless card that you want to configure 3 Select on from the Switch...

Страница 53: ...n the field 7 Click Next button 8 Select WPA PSK from the Network Authentication field 9 Select TKIP from the Data Encryption field 10 Type the Pre Share Key 8 63 character in the Pass phrase field 11...

Страница 54: ...ttings choose the profile you configured Then click Connect button to associate with the Access Point 13 Click the General option we will see the following information that means the PC associated and...

Страница 55: ......

Страница 56: ...emove entry from call history countrycode countrycode set country code date year month date set display date domainname display domain name edit filename edit a text file extraphnum maintain extra pho...

Страница 57: ...lue systemname system name Change system name time hour min sec display set system time trcdisp parse brief disp monitor packets trclog trcpacket syslog server destIP set syslog server IP address faci...

Страница 58: ...cnt disp name display ether driver counters ioctl ch_name Useless in this stage status ch_name see LAN status version see ethernet device type edit load ether no load ether data from spt save save et...

Страница 59: ...elf diagnostics essid ess id set ESS ID scan scan wireless channels version display WLAN version information IP Related Command Home Command Description ip address addr display host ip address arp sta...

Страница 60: ...ault bits gateway metric add private route drop host addr bits drop a route status display ip statistic counters udp status display udp status rip tcp status tcb interval display TCP statistic counter...

Страница 61: ...ption 8021x radius authentication Show show current radius authentication server configuration accounting Show show current radius accounting server configuration debug reauth 0 off 1 on set IEEE802 1...

Страница 62: ...wer adapter and that it is plugged in to an appropriate power source Check that the power source is turned on If the problem persists you may have a hardware problem In this case you should contact yo...

Страница 63: ...the list of denied MAC addressed 4 Temporarily disable any security feature on both the access point and the client If this solves the problem check to make sure that the Wired Equivalent Privacy WEP...

Страница 64: ...X If 802 1X security is used in your network you can troubleshoot the authentication through SMT Menu 24 3 1 System Maintenance Log and Trace Here is the format of the log message user mac of user s S...

Страница 65: ...rent vendor the suggest configuration is Auto The system will automatically detect your adapter type and auto configure to the client adapter when WEP is enabled Unable to get an IP address via DHCP 1...

Страница 66: ...the same on your AP What should I get back to my technical support for analysis Following information are helpful to your technical support to troubleshoot your problem please get back the answer and...

Отзывы: