Zyxel NWA1123-AC Инструкция по эксплуатации онлайн

Quick Start Guide
www.zyxel.com
NWA1120 Series
Wireless LAN Ceiling Mountable PoE Access Point
Version 1.00
Edition 2, 10/2013
Copyright © 2013 ZyXEL Communications Corporation
User’s Guide
Default Login Details
LAN IP Address http://192.168.1.2
User Name admin
Password 1234
Содержание
- Default login details 1
- Nwa1120 series 1
- Quick start guide 1
- User s guide 1
- Wireless lan ceiling mountable poe access point 1
- Important 2
- Keep this guide for future reference 2
- Read carefully before use 2
- Related documentation 2
- Contents overview 3
- Technical reference 5 3
- User s guide 3
- Chapter 1 introducing the nwa 0 4
- Chapter 2 introducing the web configurator 8 4
- Chapter 3 dashboard 4 4
- Contents overview 4
- Part i user s guide 8 4
- Table of contents 4
- Chapter 4 tutorial 8 5
- Chapter 5 monitor 7 5
- Chapter 6 wireless lan 2 5
- Part ii technical reference 45 5
- Chapter 7 lan 8 6
- Chapter 8 vlan 2 6
- Chapter 9 system 4 6
- Appendix a setting up your computer s ip address 23 7
- Appendix b pop up windows javascript and java permissions 51 7
- Appendix c ip addresses and subnetting 62 7
- Appendix d ipv6 70 7
- Appendix e wireless lans 79 7
- Appendix f customer support 93 7
- Appendix g legal information 99 7
- Chapter 10 log settings 07 7
- Chapter 11 maintenance 111 7
- Chapter 12 troubleshooting 118 7
- Index 05 7
- User s guide 8
- Dual band 10
- Introducing the nwa 10
- Mbssid 11
- Wireless modes 11
- Note the nwa1123 ni or nwa1123 ac is a dual band ap which contains two different types of wireless radios to transmit at 2 ghz and 5 ghz bands separately and simultaneously if one of the nwa1123 ni wireless radio is set to work in client mode the other radio will be disabled automatically 12
- Wireless client 12
- Repeater 14
- Root ap 14
- Ways to manage the nwa 15
- Configuring your nwa s security features 16
- Control access to your device 16
- Good habits for managing the nwa 16
- Wireless security 16
- Hardware connections 17
- Accessing the web configurator 18
- Introducing the web configurator 18
- Overview 18
- Note if you do not change the password the following screen appears every time you login 19
- Methods of restoring factory defaults 20
- Resetting the nwa 20
- Navigating the web configurator 21
- Title bar 21
- Chapter 2 introducing the web configurator 22
- Link tab function 22
- Navigation panel 22
- Nwa1120 series user s guide 22
- Table 3 navigation panel summary 22
- Use the menu items on the navigation panel to open screens to configure nwa features the following tables describe each menu item 22
- Main window 23
- Dashboard 24
- The dashboard screen 24
- Chapter 3 dashboard 26
- Label description 26
- Nwa1120 series user s guide 26
- Table 4 the dashboard screen 26
- The following table describes the labels in this screen 26
- Chapter 3 dashboard 27
- Label description 27
- Nwa1120 series user s guide 27
- Table 4 the dashboard screen continued 27
- Choosing the wireless mode 28
- Further reading 28
- How to configure multiple wireless networks 28
- How to configure the wireless lan 28
- Tutorial 28
- Configure the ssid profiles 30
- Mbssid 31
- Configure the standard network 32
- Configure the voip network 33
- Configure the guest network 35
- Nwa setup in ap and wireless client modes 37
- Scenario 37
- Testing the wireless networks 37
- Configuring the nwa in mbssid or root ap mode 38
- Configuring the nwa in wireless client mode 41
- Mac filter setup 43
- Testing the connection and troubleshooting 44
- Technical reference 45
- Monitor 47
- Overview 47
- View logs 47
- What you can do 47
- Chapter 5 monitor 48
- Figure 15 logs 48
- Label description 48
- Nwa1120 series user s guide 48
- Statistics 48
- Table 6 logs 48
- The following table describes the labels in this screen 48
- Use this screen to view read only information including 802 1 mode channel id retry count and fcs error count also provided is the poll interval the poll interval field is configurable and is used for refreshing the screen 48
- Association list 49
- Chapter 5 monitor 49
- Figure 16 statistics 49
- Label description 49
- Nwa1120 series user s guide 49
- Statistics the following screen pops up 49
- Table 7 statistics 49
- The following table describes the labels in this screen 49
- View the wireless devices that are currently associated with the nwa in the association list screen association means that a wireless client for example your network or computer with a wireless network card has connected successfully to the ap or wireless router using the same ssid channel and security settings 49
- Channel usage 50
- Chapter 5 monitor 51
- Figure 18 channel usage 51
- Label description 51
- Nwa1120 series user s guide 51
- Table 9 channel usage 51
- The following table describes the labels in this screen 51
- Wait a moment while the nwa compiles the information 51
- Overview 52
- What you can do in this chapter 52
- Wireless lan 52
- Operating mode 53
- What you need to know 53
- Channel 54
- Mbssid 54
- Wireless mode 54
- Wireless security 54
- Note to guarantee 802 1n wireless speed please only use wpa2 or wpa2 psk security mode other security modes may degrate the wireless speed performance to 802 1g 55
- User authentication 55
- Encryption 56
- Passphrase 56
- Radius 56
- Wireless settings screen 57
- Root ap mode 58
- Chapter 6 wireless lan 59
- Label description 59
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 59
- Nwa1120 series user s guide 59
- The following table describes the general wireless lan labels in this screen 59
- Wireless settings root ap 59
- Chapter 6 wireless lan 60
- Label description 60
- Note repeater security is independent of the security settings between the nwa and any wireless clients 60
- Note you can only configure none wpa psk or wpa2 psk security mode for the ssid used by a repeater connection 60
- Nwa1120 series user s guide 60
- Wireless settings root ap continued 60
- Chapter 6 wireless lan 61
- Label description 61
- Note you can set the nwa to use up to four mcs rates at a time 61
- Nwa1120 series user s guide 61
- Wireless settings root ap continued 61
- Repeater mode 62
- Chapter 6 wireless lan 63
- Label description 63
- Note repeater security is independent of the security settings between the nwa and any wireless clients 63
- Note you can only configure none wpa psk or wpa2 psk security mode for the ssid used by a repeater connection 63
- Nwa1120 series user s guide 63
- Wireless settings repeater continued 63
- Chapter 6 wireless lan 64
- Label description 64
- Note you can set the nwa to use up to four mcs rates at a time 64
- Nwa1120 series user s guide 64
- Wireless settings repeater continued 64
- Wireless client mode 65
- Chapter 6 wireless lan 66
- Label description 66
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 66
- Nwa1120 series user s guide 66
- Wireless settings wireless client continued 66
- Chapter 6 wireless lan 67
- Label description 67
- Nwa1120 series user s guide 67
- Wireless settings wireless client continued 67
- Mbssid mode 68
- Chapter 6 wireless lan 69
- Label description 69
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 69
- Nwa1120 series user s guide 69
- Wireless settings mbssid continued 69
- Chapter 6 wireless lan 70
- Label description 70
- Note you can set the nwa to use up to four mcs rates at a time 70
- Nwa1120 series user s guide 70
- Wireless settings mbssid continued 70
- Chapter 6 wireless lan 71
- Nwa1120 series user s guide 71
- Ssid screen 71
- Ssid to display the screen as shown 71
- The following table describes the labels in this screen 71
- Chapter 6 wireless lan 72
- Configuring ssid 72
- Figure 27 ssid edit 72
- Nwa1120 series user s guide 72
- Ssid screen click edit next to the ssid profile you want to configure to display the following screen 72
- Table 16 ssid edit 72
- The following table describes the labels in this screen 72
- Chapter 6 wireless lan 73
- Note when you configure an ssid profile s qos settings the nwa applies the same qos setting to all of the profile s traffic 73
- Nwa1120 series user s guide 73
- Table 16 ssid edit continued 73
- Use this screen to choose the security mode for your nwa 73
- Wireless security screen 73
- Note you must enable the same wireless security settings on the nwa and on all wireless clients that you want to associate with it 74
- Chapter 6 wireless lan 75
- Figure 30 security wep 75
- Label description 75
- Nwa1120 series user s guide 75
- Security wep 75
- Table 17 security wep 75
- The following table describes the labels in this screen 75
- Use this screen to use wep as the security mode for your nwa select wep in the security mode field to display the following screen 75
- Access point 76
- Chapter 6 wireless lan 76
- Figure 31 security wpa wpa2 for access point 76
- Label description 76
- Nwa1120 series user s guide 76
- Security wpa wpa2 wpa2 mix 76
- Table 17 security wep continued 76
- Table 18 security wpa wpa2 for access point 76
- The following table describes the labels in this screen 76
- Use this screen to employ wpa or wpa2 as the security mode for your nwa that is in root ap mbssid or repeater operating mode select wpa wpa2 or wpa2 mix in the security mode field to display the following screen 76
- Wireless settings screen 76
- Chapter 6 wireless lan 77
- Figure 32 security wpa for wireless client 77
- Label description 77
- Note if wireless station authentication is done using a radius server the reauthentication timer on the radius server has priority 77
- Nwa1120 series user s guide 77
- Table 18 security wpa wpa2 for access point continued 77
- Use this screen to employ wpa or wpa2 as the security mode for your nwa that is in wireless client operating mode select wpa or wpa2 in the security mode field to display the following screen 77
- Wireless client 77
- Chapter 6 wireless lan 78
- Figure 33 security wpa psk wpa2 psk or wpa2 psk mix 78
- Label description 78
- Nwa1120 series user s guide 78
- Security wpa psk wpa2 psk wpa2 psk mix 78
- Table 19 security wpa wpa2 for wireless client 78
- The following table describes the labels in this screen 78
- Use this screen to employ wpa psk wpa2 psk or wpa2 psk mix as the security mode of your nwa select wpa psk wpa2 psk or wpa2 psk mix in the security mode field to display the following screen 78
- Chapter 6 wireless lan 79
- Label description 79
- Nwa1120 series user s guide 79
- Radius 79
- Radius screen 79
- Radius the screen appears as shown 79
- Table 20 security wpa psk wpa2 psk or wpa2 psk mix 79
- The following table describes the labels not previously discussed 79
- Chapter 6 wireless lan 80
- Label description 80
- Nwa1120 series user s guide 80
- Radius 80
- Select a profile you want to configure and click edit 80
- The following table describes the labels in this screen 80
- Chapter 6 wireless lan 81
- In the following example layer 2 isolation is enabled on the nwa to allow a guest wireless client a to access the main network router b the router provides access to the internet and the network printer c while preventing the client from accessing other computers and servers on the 81
- Label description 81
- Layer 2 isolation 81
- Layer 2 isolation is used to prevent wireless clients associated with your nwa from communicating with other wireless clients aps computers or routers in a network 81
- Nwa1120 series user s guide 81
- Radius continued 81
- Layer 2 isolation screen 82
- Note intra bss traffic blocking is activated when you enable layer 2 isolation 82
- Chapter 6 wireless lan 83
- Every ethernet device has a unique mac media access control address the mac address is assigned at the factory and consists of six pairs of hexadecimal characters for example 83
- Label description 83
- Layer 2 isolation 83
- Mac filter screen 83
- Note you need to know the mac address of each wireless client ap computer or router that you want to allow to communicate with the nwa s wireless clients 83
- Nwa1120 series user s guide 83
- The following table describes the labels in this screen 83
- Chapter 6 wireless lan 85
- Figure 40 mac filter edit 85
- Label description 85
- Mac filter 85
- Nwa1120 series user s guide 85
- Select a profile you want to configure and click edit 85
- Technical reference 85
- The following table describes the labels in this screen 85
- This section provides technical background information about the topics covered in this chapter refer to appendix e on page 179 for further readings on wireless lan 85
- Additional wireless terms 86
- Chapter 6 wireless lan 86
- Nwa1120 series user s guide 86
- On aps without wmm qos all traffic streams are given the same access priority to the wireless network if the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity then the new traffic stream reduces the throughput of the other traffic streams 86
- Table 24 additional wireless terms 86
- Term description 86
- The nwa uses wmm qos to prioritize traffic streams according to the ieee 802 q or dscp information in each packet s header the nwa automatically determines the priority to use for an individual traffic stream this prevents reductions in data transmission for applications that are sensitive to latency and jitter variations in delay 86
- Wmm qos 86
- Wmm qos prioritizes wireless traffic according to the delivery requirements of the individual and applications wmm qos is a part of the ieee 802 1e qos enhancement to certified wi fi wireless networks 86
- Wmm wi fi multimedia qos quality of service ensures quality of service in wireless networks it controls wlan transmission priority on packets to be transmitted over the wireless network 86
- Chapter 6 wireless lan 87
- If you don t have wpa 2 aware wireless clients then use wep key encrypting a higher bit key offers better security you can manually enter 64 bit or 128 bit wep keys 87
- More information on wireless security can be found in appendix e on page 179 87
- Nwa1120 series user s guide 87
- Security mode guideline 87
- Table 25 wmm qos priorities 87
- The following is a general guideline in choosing the security mode for your nwa 87
- The following table describes the wmm qos priority levels that the nwa uses 87
- Use wpa 2 psk if you have wpa 2 aware wireless clients but no radius server 87
- Use wpa 2 security if you have wpa 2 aware wireless clients and a radius server wpa has user authentication and improved data encryption over wep 87
- Wmm qos priorities 87
- Overview 88
- What you can do in this chapter 88
- What you need to know 88
- Global address 89
- Ipv6 addressing 89
- Link local address 89
- Prefix and prefix length 89
- Lan ip screen 90
- Chapter 7 lan 91
- Label description 91
- Nwa1120 series user s guide 91
- Table 27 lan ip continued 91
- Overview 92
- What you can do in this chapter 92
- What you need to know 92
- Ieee 802 q tag 93
- Vlan screen 93
- Overview 94
- System 94
- What you can do in this chapter 94
- Telnet 95
- What you need to know 95
- Remote management limitations 96
- Snmp v3 and security 96
- Certificate 97
- Www screen 97
- Certificates screen 98
- Chapter 9 system 98
- Label description 98
- Nwa1120 series user s guide 98
- The following table describes the labels in this screen 98
- Use this screen to delete or import certificates 98
- Www the following screen shows 98
- Telnet screen 99
- Chapter 9 system 100
- Label description 100
- Nwa1120 series user s guide 100
- Telnet 100
- The following table describes the labels in this screen 100
- Snmp screen 101
- Chapter 9 system 102
- Label description 102
- Nwa1120 series user s guide 102
- The following table describes the labels in this screen 102
- Chapter 9 system 103
- Ftp screen 103
- Label description 103
- Nwa1120 series user s guide 103
- Snmp continued 103
- Use this screen to upload and download the nwa s firmware using ftp to use this feature your computer must have an ftp client 103
- Chapter 9 system 104
- Ftp the following screen displays 104
- Label description 104
- Managed devices in an smnp managed network contain object variables or managed objects that define each piece of information to be collected about a device examples of variables include such 104
- Nwa1120 series user s guide 104
- Technical reference 104
- The following table describes the labels in this screen 104
- This section provides some technical background information about the topics covered in this chapter 104
- Certification authorities 105
- Private public certificates 105
- Supported mibs 105
- Checking the fingerprint of a certificate on your computer 106
- Log settings 107
- Overview 107
- What you can do in this chapter 107
- Alerts and logs 108
- Enabling syslog logging 108
- Log settings screen 108
- Receiving logs via e mail 108
- What you need to know 108
- Chapter 10 log settings 110
- Label description 110
- Nwa1120 series user s guide 110
- Table 33 log settings continued 110
- Maintenance 111
- Overview 111
- What you can do in this chapter 111
- General screen 112
- What you need to know 112
- Chapter 11 maintenance 113
- Label descriptions 113
- Nwa1120 series user s guide 113
- Password 113
- Password screen 113
- Password the following screen displays 113
- The following table describes the labels in this screen 113
- Chapter 11 maintenance 114
- Label description 114
- Nwa1120 series user s guide 114
- The following table describes the labels in this screen 114
- Time screen 114
- Time the following screen displays 114
- Do not turn off the nwa while firmware upload is in progress 115
- Firmware upgrade screen 115
- Backup configuration 116
- Configuration file screen 116
- Do not turn off the nwa while configuration file upload is in progress 116
- Restore configuration 116
- Back to factory defaults 117
- Restart screen 117
- Power hardware connections and leds 118
- Troubleshooting 118
- I cannot see or access the login screen in the web configurator 119
- I forgot the ip address for the nwa 119
- I forgot the password 119
- Nwa access and login 119
- I can see the login screen but i cannot log in to the nwa 120
- I cannot access the internet through the nwa 120
- I cannot use ftp to upload new firmware 120
- Internet access 120
- I cannot access the internet anymore i had access to the internet with the nwa but my internet connection is not available anymore 121
- I cannot access the nwa or ping any computer from the wlan 121
- The internet connection is slow or intermittent 121
- Wireless lan 121
- Ppendi 123
- Setting up your computer s ip address 123
- Verifying settings 126
- Windows vista 127
- Note during this procedure click continue whenever windows displays a screen saying that it needs your permission to continue 128
- Verifying settings 130
- Windows 7 131
- Note during this procedure click continue whenever windows displays a screen saying that it needs your permission to continue 132
- Verifying settings 134
- Mac os x 10 and 10 135
- Mac os x 10 and 10 138
- Verifying settings 138
- Linux ubuntu 8 gnome 141
- Note make sure you are logged in as the root administrator 141
- Verifying settings 141
- Linux opensuse 10 kde 145
- Note make sure you are logged in as the root administrator 145
- Verifying settings 145
- Verifying settings 149
- Pop up windows javascript and java permissions 151
- Ppendi 151
- Enable pop up blockers with exceptions 152
- Javascript 154
- Java permissions 156
- Java sun 157
- Mozilla firefox 158
- Allowing pop ups 160
- Enabling java 160
- Ip addresses and subnetting 162
- Ppendi 162
- Subnet masks 163
- An ip address with host ids of all zeros is the ip address of the network 192 68 with a 24 bit subnet mask for example an ip address with host ids of all ones is the broadcast address for that network 192 68 55 with a 24 bit subnet mask for example 164
- Appendix c ip addresses and subnetting 164
- As these two ip addresses cannot be used for individual hosts calculate the maximum number of possible hosts in a network as follows 164
- Binary 164
- Decimal 1st octet 164
- For example 192 25 is equivalent to saying 192 with subnet mask 255 55 55 28 164
- Nd octet 164
- Network size 164
- Notation 164
- Nwa1120 series user s guide 164
- Rd octet 4th octet 164
- Since the mask is always a continuous number of ones beginning from the left followed by a continuous number of zeros for the remainder of the 32 bit mask you can simply specify the number of ones instead of writing the value of each octet this is usually specified by writing a followed by the number of bits in the mask after the address 164
- Subnet mask host id size maximum number of hosts 164
- Subnet masks are expressed in dotted decimal notation just like ip addresses the following examples show the binary and decimal notation for 8 bit 16 bit 24 bit and 29 bit subnet masks 164
- Subnet masks can be referred to by the size of the network number part the bits with a 1 value for example an 8 bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes 164
- Table 40 subnet masks 164
- Table 41 maximum host numbers 164
- The size of the network number determines the maximum number of possible hosts you can have on your network the larger the number of network number bits the smaller the number of remaining host id bits 164
- 2 or 254 possible hosts 165
- Appendix c ip addresses and subnetting 165
- Figure 89 subnetting example before subnetting 165
- In this example the company network address is 192 68 the first three octets of the address 192 68 are the network number and the remaining octet is the host id allowing a maximum of 165
- Last octet binary 165
- Last octet decimal 165
- Nwa1120 series user s guide 165
- Subnet mask alternative notation 165
- Subnetting 165
- Table 42 alternative subnet mask notation 165
- The borrowed host id bit can have a value of either 0 or 1 allowing two subnets 192 68 25 and 192 68 28 25 165
- The following figure shows the company network before subnetting 165
- The following table shows some possible subnet masks using both notations 165
- You can borrow one of the host id bits to divide the network 192 68 into two separate sub networks the subnet mask is now 25 bits 255 55 55 28 or 25 165
- You can use subnetting to divide one network into multiple sub networks in the following example a network administrator creates two sub networks to isolate a group of servers from the rest of the company network for security reasons 165
- Example four subnets 166
- Appendix c ip addresses and subnetting 167
- Example eight subnets 167
- Ip subnet mask network number last octet bit value 167
- Nwa1120 series user s guide 167
- Similarly use a 27 bit mask to create eight subnets 000 001 010 011 100 101 110 and 111 167
- Table 43 subnet 1 continued 167
- Table 44 subnet 2 167
- Table 45 subnet 3 167
- Table 46 subnet 4 167
- Appendix c ip addresses and subnetting 168
- Broadcast address 168
- No borrowed host bits subnet mask no subnets no hosts per subnet 168
- Nwa1120 series user s guide 168
- Subnet planning 168
- Subnet subnet address first address last address 168
- Table 47 eight subnets 168
- Table 48 24 bit network number subnet planning 168
- Table 49 16 bit network number subnet planning 168
- The following table is a summary for subnet planning on a network with a 16 bit network number 168
- The following table is a summary for subnet planning on a network with a 24 bit network number 168
- The following table shows ip address last octet values for each subnet 168
- Configuring ip addresses 169
- Private ip addresses 169
- Ppendi 170
- Global address 171
- Loopback address 171
- Multicast address 171
- Unspecified address 171
- Eui 64 172
- Interface id 172
- Stateless autoconfiguration 172
- Subnet masking 172
- Dhcp relay agent 173
- Dhcpv6 173
- Identity association 173
- Rebind 173
- Renew rebind 173
- Renew to s1 173
- Icmpv6 174
- Ipv6 cache 174
- Neighbor discovery protocol ndp 174
- Prefix delegation 174
- Mld messages 175
- Multicast listener discovery 175
- Example enabling dhcpv6 on windows xp 176
- Example enabling ipv6 on windows xp 2003 vista 176
- Example enabling ipv6 on windows 7 177
- Ppendi 179
- Wireless lans 179
- Channel 181
- Rts cts 181
- Fragmentation threshold 182
- Note enabling the rts threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy 182
- Note the wireless devices must use the same preamble mode in order to communicate 183
- Preamble type 183
- Wireless lan standards 183
- Ieee 802 x 184
- Note you must enable the same wireless security settings on the nwa and on all wireless clients that you want to associate with it 184
- Wireless security overview 184
- Radius 185
- Types of eap authentication 185
- Types of radius messages 185
- Eap md5 message digest algorithm 5 186
- Eap tls transport layer security 186
- Eap ttls tunneled transport layer service 186
- Peap protected eap 186
- Appendix e wireless lans 187
- Dynamic wep key exchange 187
- Eap md5 eap tls eap ttls peap leap 187
- For added security certificate based authentications eap tls eap ttls and peap use dynamic keys for data encryption they are often deployed in corporate environments but for public deployment a simple user name and password pair is more practical the following table is a comparison of the features of authentication types 187
- If both an ap and the wireless clients support wpa2 and you have an external radius server use wpa2 for stronger data encryption if you don t have an external radius server you should use wpa2 psk wpa2 pre shared key that only requires a single identical password entered into each access point wireless gateway and wireless client as long as the passwords match a wireless client will be granted access to a wlan 187
- If the ap or the wireless clients do not support wpa2 just use wpa or wpa psk depending on whether you have an external radius server or not 187
- If this feature is enabled it is not necessary to configure a default encryption key in the wireless security configuration screen you may still configure and store keys but they will not be used while dynamic wep is enabled 187
- Key differences between wpa or wpa2 and wep are improved data encryption and user authentication 187
- Leap lightweight extensible authentication protocol is a cisco implementation of ieee 802 x 187
- Note eap md5 cannot be used with dynamic wep key exchange 187
- Nwa1120 series user s guide 187
- Select wep only when the ap and or wireless clients do not support wpa or wpa2 wep is less secure than wpa or wpa2 187
- Table 57 comparison of eap authentication types 187
- The ap maps a unique key that is generated with the radius server this key expires when the wireless connection times out disconnects or reauthentication times out a new wep key is generated each time reauthentication is performed 187
- Wi fi protected access wpa is a subset of the ieee 802 1i standard wpa2 ieee 802 1i is a wireless security standard that defines stronger encryption authentication and key management than wpa 187
- Wpa and wpa2 187
- Encryption 188
- User authentication 188
- Wireless client wpa supplicants 189
- Wpa 2 psk application example 189
- Wpa 2 with radius application example 189
- Security parameters summary 190
- Antenna characteristics 191
- Antenna gain 191
- Antenna overview 191
- Frequency 191
- Radiation pattern 191
- Types of antennas for wlan 191
- Positioning antennas 192
- Customer support 193
- Ppendi 193
- Austria 194
- Belarus 194
- Europe 194
- Malaysia 194
- Pakistan 194
- Philipines 194
- Singapore 194
- Taiwan 194
- Thailand 194
- Vietnam 194
- Belgium 195
- Bulgaria 195
- Denmark 195
- Estonia 195
- Finland 195
- France 195
- Germany 195
- Hungary 195
- Latvia 195
- Lithuania 196
- Netherlands 196
- Norway 196
- Poland 196
- Romania 196
- Russia 196
- Slovakia 196
- Sweden 196
- Switzerland 196
- Argentina 197
- Ecuador 197
- Latin america 197
- Middle east 197
- North america 197
- Turkey 197
- Ukraine 197
- Africa 198
- Australia 198
- Oceania 198
- South africa 198
- Legal information 199
- Ppendi 199
- Appendix g legal information 200
- Erp energy related products declaration of conformity 200
- Ic radiation exposure statement 200
- Notices 200
- Nwa1120 series user s guide 200
- Registration 200
- Viewing certifications 200
- Zyxel limited warranty 200
- 注意 200
- Appendix g legal information 201
- Declaration of conformity with regard to eu directive 1999 5 ec r tte directive 201
- European union 201
- Nwa1120 series user s guide 201
- Open source licenses 201
- Regulatory information 201
- Appendix g legal information 202
- National restrictions 202
- Nwa1120 series user s guide 202
- Appendix g legal information 203
- List of national codes 203
- Nwa1120 series user s guide 203
- Safety warnings 203
- Environmental product declaration 204
Похожие устройства
- Zyxel NWA1123-AC Инструкция по установке
- Zyxel NWA1123-AC Технические характеристики
- Zyxel NWA1123-NI Инструкция по эксплуатации
- Zyxel NWA1123-NI Технические характеристики
- Zyxel NWA1123-NI Инструкция по установке
- Zyxel NWA1121-NI Инструкция по эксплуатации
- Zyxel NWA1121-NI Инструкция по установке
- Zyxel NWA1121-NI Технические характеристики
- HP color laserjet enterprise 700 m750dn Инструкция по эксплуатации
- HP 15-d001sr, f7r84ea Инструкция по эксплуатации
- HP envy 15-j152sr, f7s86ea Инструкция по эксплуатации
- HP dl160gen8 Инструкция по эксплуатации
- HP dl380egen8 Инструкция по эксплуатации
- HP officejet pro 8620 (a7f65a) Инструкция по эксплуатации
- HP laserjet pro 400 color mfp m476nw Инструкция по эксплуатации
- HP laserjet pro 400 color mfp m476dn Инструкция по эксплуатации
- HP laserjet pro 400 color mfp m476dw Инструкция по эксплуатации
- HP envy x360 15-u050er, j3r54ea Инструкция по эксплуатации
- HP 15-d059sr, f8s96ea Инструкция по эксплуатации
- HP 3800-24g-2sfp+, j9575a Инструкция по эксплуатации
Скачать
Случайные обсуждения