Zyxel NWA1123-NI [124/212] Nwa access and login
![Zyxel NWA1123-NI [124/212] Nwa access and login](/views2/1169137/page124/bg7c.png)
Chapter 12 Troubleshooting
NWA1120 Series User’s Guide
124
12.2 NWA Access and Login
I forgot the IP address for the NWA.
1 The default IP address is 192.168.1.2.
2 If the NWA is working as a DHCP client and receives an IP address from a DHCP server, check the
DHCP server for the NWA’s IP address.
3 If you configured a static IP address and have forgotten it, you have to reset the device to its
factory defaults. See Section 2.2 on page 20.
I forgot the password.
1 The default password is 1234.
2 If this does not work, you have to reset the device to its factory defaults. See Section 2.2 on page
20.
I cannot see or access the Login screen in the web configurator.
1 Make sure you are using the correct IP address.
• The default IP address is 192.168.1.2.
• If you changed the IP address (Section 7.4 on page 93), use the new IP address.
• If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I
forgot the IP address for the NWA.
2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick
Start Guide and Section 1.7 on page 18.
3 Make sure your Internet browser does not block pop-up windows and has JavaScript and Java
enabled. See Section 12.1 on page 123.
4 Make sure your computer is in the same subnet as the NWA. (If you know that there are routers
between your computer and the NWA, skip this step.)
• If there is no DHCP server on your network, make sure your computer’s IP address is in the
same subnet as the NWA.
5 Reset the device to its factory defaults, and try to access the NWA with the default IP address. See
Chapter 2 on page 20.
6 If the problem continues, contact the network administrator or vendor, or try one of the advanced
suggestions.
Содержание
- Default login details 1
- Nwa1120 series 1
- Quick start guide 1
- User s guide 1
- Wireless lan ceiling mountable poe access point 1
- Important 2
- Keep this guide for future reference 2
- Read carefully before use 2
- Related documentation 2
- Contents overview 3
- Technical reference 7 3
- User s guide 3
- Chapter 1 introducing the nwa 11 5
- Chapter 2 introducing the web configurator 9 5
- Chapter 3 dashboard 5 5
- Contents overview 5
- Part i user s guide 9 5
- Table of contents 5
- Chapter 4 tutorial 9 6
- Chapter 5 monitor 9 6
- Chapter 6 wireless lan 5 6
- Part ii technical reference 47 6
- Chapter 7 lan 1 7
- Chapter 8 vlan 5 7
- Chapter 9 system 7 7
- Appendix a setting up your computer s ip address 29 8
- Appendix b pop up windows javascript and java permissions 57 8
- Appendix c ip addresses and subnetting 69 8
- Appendix d ipv6 77 8
- Appendix e wireless lans 87 8
- Appendix f legal information 01 8
- Chapter 10 log settings 111 8
- Chapter 11 maintenance 115 8
- Chapter 12 troubleshooting 23 8
- Index 07 8
- User s guide 9
- Introducing the nwa 11
- Dual band 12
- Mbssid 12
- Wireless modes 12
- Note the nwa1123 ni is a dual band ap which contains two different types of wireless radios to transmit at 2 ghz and 5 ghz bands separately and simultaneously if one of the nwa1123 ni wireless radio is set to work in client mode the other radio will be disabled automatically 13
- Wireless client 13
- Repeater 15
- Root ap 15
- Ways to manage the nwa 16
- Configuring your nwa s security features 17
- Control access to your device 17
- Good habits for managing the nwa 17
- Wireless security 17
- Hardware connections 18
- Accessing the web configurator 19
- Introducing the web configurator 19
- Note if you do not change the password the following screen appears every time you login 20
- Resetting the nwa 20
- Methods of restoring factory defaults 21
- Navigating the web configurator 22
- Title bar 22
- Chapter 2 introducing the web configurator 23
- Link tab function 23
- Navigation panel 23
- Nwa1120 series user s guide 23
- Table 3 navigation panel summary 23
- Use the menu items on the navigation panel to open screens to configure nwa features the following tables describe each menu item 23
- Main window 24
- Dashboard 25
- The dashboard screen 25
- Chapter 3 dashboard 27
- Label description 27
- Nwa1120 series user s guide 27
- Table 4 the dashboard screen 27
- The following table describes the labels in this screen 27
- Chapter 3 dashboard 28
- Label description 28
- Nwa1120 series user s guide 28
- Table 4 the dashboard screen continued 28
- Choosing the wireless mode 29
- Further reading 29
- How to configure multiple wireless networks 29
- How to configure the wireless lan 29
- Tutorial 29
- Configure the ssid profiles 31
- Mbssid 32
- Configure the standard network 33
- Configure the voip network 34
- Configure the guest network 36
- Nwa setup in ap and wireless client modes 38
- Scenario 38
- Testing the wireless networks 38
- Configuring the nwa in mbssid or root ap mode 39
- Configuring the nwa in wireless client mode 42
- Mac filter setup 44
- Testing the connection and troubleshooting 45
- Technical reference 47
- Monitor 49
- Overview 49
- View logs 49
- What you can do 49
- Chapter 5 monitor 50
- Figure 15 logs 50
- Label description 50
- Nwa1120 series user s guide 50
- Statistics 50
- Table 6 logs 50
- The following table describes the labels in this screen 50
- Use this screen to view read only information including 802 1 mode channel id retry count and fcs error count also provided is the poll interval the poll interval field is configurable and is used for refreshing the screen 50
- Association list 51
- Chapter 5 monitor 51
- Figure 16 statistics 51
- Label description 51
- Nwa1120 series user s guide 51
- Statistics the following screen pops up 51
- Table 7 statistics 51
- The following table describes the labels in this screen 51
- View the wireless devices that are currently associated with the nwa in the association list screen association means that a wireless client for example your network or computer with a wireless network card has connected successfully to the ap or wireless router using the same ssid channel and security settings 51
- Channel usage 52
- Chapter 5 monitor 53
- Figure 18 channel usage 53
- Label description 53
- Nwa1120 series user s guide 53
- Table 9 channel usage 53
- The following table describes the labels in this screen 53
- Wait a moment while the nwa compiles the information 53
- Overview 55
- What you can do in this chapter 55
- Wireless lan 55
- Operating mode 56
- What you need to know 56
- Channel 57
- Mbssid 57
- Wireless mode 57
- Wireless security 57
- Note to guarantee 802 1n wireless speed please only use wpa2 or wpa2 psk security mode other security modes may degrate the wireless speed performance to 802 1g 58
- User authentication 58
- Encryption 59
- Passphrase 59
- Radius 59
- Wireless settings screen 60
- Root ap mode 61
- Chapter 6 wireless lan 62
- Label description 62
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 62
- Nwa1120 series user s guide 62
- The following table describes the general wireless lan labels in this screen 62
- Wireless settings root ap 62
- Chapter 6 wireless lan 63
- Label description 63
- Note universal repeater security is independent of the security settings between the nwa and any wireless clients 63
- Note you can only configure none wpa psk or wpa2 psk security mode for the ssid used by a universal repeater connection 63
- Nwa1120 series user s guide 63
- Wireless settings root ap continued 63
- Chapter 6 wireless lan 64
- Label description 64
- Note you can set the nwa to use up to four mcs rates at a time 64
- Nwa1120 series user s guide 64
- Wireless settings root ap continued 64
- Repeater mode 65
- Chapter 6 wireless lan 66
- Label description 66
- Note universal repeater security is independent of the security settings between the nwa and any wireless clients 66
- Note you can only configure none wpa psk or wpa2 psk security mode for the ssid used by a universal repeater connection 66
- Nwa1120 series user s guide 66
- Wireless settings repeater continued 66
- Chapter 6 wireless lan 67
- Label description 67
- Note you can set the nwa to use up to four mcs rates at a time 67
- Nwa1120 series user s guide 67
- Wireless settings repeater continued 67
- Wireless client mode 68
- Chapter 6 wireless lan 69
- Label description 69
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 69
- Nwa1120 series user s guide 69
- Wireless settings wireless client continued 69
- Chapter 6 wireless lan 70
- Label description 70
- Nwa1120 series user s guide 70
- Wireless settings wireless client continued 70
- Mbssid mode 71
- Chapter 6 wireless lan 72
- Label description 72
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 72
- Nwa1120 series user s guide 72
- Wireless settings mbssid continued 72
- Chapter 6 wireless lan 73
- Label description 73
- Note you can set the nwa to use up to four mcs rates at a time 73
- Nwa1120 series user s guide 73
- Wireless settings mbssid continued 73
- Chapter 6 wireless lan 74
- Nwa1120 series user s guide 74
- Ssid screen 74
- Ssid to display the screen as shown 74
- The following table describes the labels in this screen 74
- Chapter 6 wireless lan 75
- Configuring ssid 75
- Figure 27 ssid edit 75
- Nwa1120 series user s guide 75
- Ssid screen click edit next to the ssid profile you want to configure to display the following screen 75
- Table 16 ssid edit 75
- The following table describes the labels in this screen 75
- Chapter 6 wireless lan 76
- Note when you configure an ssid profile s qos settings the nwa applies the same qos setting to all of the profile s traffic 76
- Nwa1120 series user s guide 76
- Table 16 ssid edit continued 76
- Use this screen to choose the security mode for your nwa 76
- Wireless security screen 76
- Note you must enable the same wireless security settings on the nwa and on all wireless clients that you want to associate with it 77
- Chapter 6 wireless lan 78
- Figure 30 security wep 78
- Label description 78
- Nwa1120 series user s guide 78
- Security wep 78
- Table 17 security wep 78
- The following table describes the labels in this screen 78
- Use this screen to use wep as the security mode for your nwa select wep in the security mode field to display the following screen 78
- Access point 79
- Chapter 6 wireless lan 79
- Figure 31 security wpa wpa2 for access point 79
- Label description 79
- Nwa1120 series user s guide 79
- Security wpa wpa2 wpa2 mix 79
- Table 17 security wep continued 79
- Table 18 security wpa wpa2 for access point 79
- The following table describes the labels in this screen 79
- Use this screen to employ wpa or wpa2 as the security mode for your nwa that is in root ap mbssid or repeater operating mode select wpa wpa2 or wpa2 mix in the security mode field to display the following screen 79
- Wireless settings screen 79
- Chapter 6 wireless lan 80
- Figure 32 security wpa for wireless client 80
- Label description 80
- Note if wireless station authentication is done using a radius server the reauthentication timer on the radius server has priority 80
- Nwa1120 series user s guide 80
- Table 18 security wpa wpa2 for access point continued 80
- Use this screen to employ wpa or wpa2 as the security mode for your nwa that is in wireless client operating mode select wpa or wpa2 in the security mode field to display the following screen 80
- Wireless client 80
- Chapter 6 wireless lan 81
- Figure 33 security wpa psk wpa2 psk or wpa2 psk mix 81
- Label description 81
- Nwa1120 series user s guide 81
- Security wpa psk wpa2 psk wpa2 psk mix 81
- Table 19 security wpa wpa2 for wireless client 81
- The following table describes the labels in this screen 81
- Use this screen to employ wpa psk wpa2 psk or wpa2 psk mix as the security mode of your nwa select wpa psk wpa2 psk or wpa2 psk mix in the security mode field to display the following screen 81
- Chapter 6 wireless lan 82
- Label description 82
- Nwa1120 series user s guide 82
- Radius 82
- Radius screen 82
- Radius the screen appears as shown 82
- Table 20 security wpa psk wpa2 psk or wpa2 psk mix 82
- The following table describes the labels not previously discussed 82
- Chapter 6 wireless lan 83
- Label description 83
- Nwa1120 series user s guide 83
- Radius 83
- Select a profile you want to configure and click edit 83
- The following table describes the labels in this screen 83
- Chapter 6 wireless lan 84
- In the following example layer 2 isolation is enabled on the nwa to allow a guest wireless client a to access the main network router b the router provides access to the internet and the network printer c while preventing the client from accessing other computers and servers on the 84
- Label description 84
- Layer 2 isolation 84
- Layer 2 isolation is used to prevent wireless clients associated with your nwa from communicating with other wireless clients aps computers or routers in a network 84
- Nwa1120 series user s guide 84
- Radius continued 84
- Layer 2 isolation screen 85
- Note intra bss traffic blocking is activated when you enable layer 2 isolation 85
- Chapter 6 wireless lan 86
- Every ethernet device has a unique mac media access control address the mac address is assigned at the factory and consists of six pairs of hexadecimal characters for example 86
- Label description 86
- Layer 2 isolation 86
- Mac filter screen 86
- Note you need to know the mac address of each wireless client ap computer or router that you want to allow to communicate with the nwa s wireless clients 86
- Nwa1120 series user s guide 86
- The following table describes the labels in this screen 86
- Chapter 6 wireless lan 88
- Figure 40 mac filter edit 88
- Label description 88
- Mac filter 88
- Nwa1120 series user s guide 88
- Select a profile you want to configure and click edit 88
- Technical reference 88
- The following table describes the labels in this screen 88
- This section provides technical background information about the topics covered in this chapter refer to appendix e on page 187 for further readings on wireless lan 88
- Additional wireless terms 89
- Chapter 6 wireless lan 89
- Nwa1120 series user s guide 89
- On aps without wmm qos all traffic streams are given the same access priority to the wireless network if the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity then the new traffic stream reduces the throughput of the other traffic streams 89
- Table 24 additional wireless terms 89
- Term description 89
- The nwa uses wmm qos to prioritize traffic streams according to the ieee 802 q or dscp information in each packet s header the nwa automatically determines the priority to use for an individual traffic stream this prevents reductions in data transmission for applications that are sensitive to latency and jitter variations in delay 89
- Wmm qos 89
- Wmm qos prioritizes wireless traffic according to the delivery requirements of the individual and applications wmm qos is a part of the ieee 802 1e qos enhancement to certified wi fi wireless networks 89
- Wmm wi fi multimedia qos quality of service ensures quality of service in wireless networks it controls wlan transmission priority on packets to be transmitted over the wireless network 89
- Chapter 6 wireless lan 90
- If you don t have wpa 2 aware wireless clients then use wep key encrypting a higher bit key offers better security you can manually enter 64 bit or 128 bit wep keys 90
- More information on wireless security can be found in appendix e on page 187 90
- Nwa1120 series user s guide 90
- Security mode guideline 90
- Table 25 wmm qos priorities 90
- The following is a general guideline in choosing the security mode for your nwa 90
- The following table describes the wmm qos priority levels that the nwa uses 90
- Use wpa 2 psk if you have wpa 2 aware wireless clients but no radius server 90
- Use wpa 2 security if you have wpa 2 aware wireless clients and a radius server wpa has user authentication and improved data encryption over wep 90
- Wmm qos priorities 90
- Overview 91
- What you can do in this chapter 91
- What you need to know 91
- Global address 92
- Ipv6 addressing 92
- Link local address 92
- Prefix and prefix length 92
- Lan ip screen 93
- Chapter 7 lan 94
- Label description 94
- Nwa1120 series user s guide 94
- Table 27 lan ip continued 94
- Overview 95
- What you can do in this chapter 95
- What you need to know 95
- Ieee 802 q tag 96
- Vlan screen 96
- Overview 97
- System 97
- What you can do in this chapter 97
- Telnet 98
- What you need to know 98
- Remote management limitations 99
- Snmp v3 and security 99
- Certificate 100
- Www screen 100
- Certificates screen 101
- Chapter 9 system 101
- Label description 101
- Nwa1120 series user s guide 101
- The following table describes the labels in this screen 101
- Use this screen to delete or import certificates 101
- Www the following screen shows 101
- Telnet screen 102
- Chapter 9 system 103
- Label description 103
- Nwa1120 series user s guide 103
- Telnet 103
- The following table describes the labels in this screen 103
- Snmp screen 104
- Chapter 9 system 105
- Label description 105
- Nwa1120 series user s guide 105
- The following table describes the labels in this screen 105
- Chapter 9 system 106
- Ftp screen 106
- Label description 106
- Nwa1120 series user s guide 106
- Snmp continued 106
- Use this screen to upload and download the nwa s firmware using ftp to use this feature your computer must have an ftp client 106
- Chapter 9 system 107
- Ftp the following screen displays 107
- Label description 107
- Managed devices in an smnp managed network contain object variables or managed objects that define each piece of information to be collected about a device examples of variables include such 107
- Nwa1120 series user s guide 107
- Technical reference 107
- The following table describes the labels in this screen 107
- This section provides some technical background information about the topics covered in this chapter 107
- Certification authorities 108
- Private public certificates 108
- Supported mibs 108
- Checking the fingerprint of a certificate on your computer 109
- Log settings 111
- Overview 111
- What you can do in this chapter 111
- Alerts and logs 112
- Enabling syslog logging 112
- Log settings screen 112
- Receiving logs via e mail 112
- What you need to know 112
- Chapter 10 log settings 114
- Label description 114
- Nwa1120 series user s guide 114
- Table 33 log settings continued 114
- Maintenance 115
- Overview 115
- What you can do in this chapter 115
- General screen 116
- What you need to know 116
- Chapter 11 maintenance 117
- Label descriptions 117
- Nwa1120 series user s guide 117
- Password 117
- Password screen 117
- Password the following screen displays 117
- The following table describes the labels in this screen 117
- Chapter 11 maintenance 118
- Label description 118
- Nwa1120 series user s guide 118
- The following table describes the labels in this screen 118
- Time screen 118
- Time the following screen displays 118
- Do not turn off the nwa while firmware upload is in progress 119
- Firmware upgrade screen 119
- Backup configuration 120
- Configuration file screen 120
- Do not turn off the nwa while configuration file upload is in progress 120
- Restore configuration 120
- Back to factory defaults 121
- Restart screen 121
- Power hardware connections and leds 123
- Troubleshooting 123
- I cannot see or access the login screen in the web configurator 124
- I forgot the ip address for the nwa 124
- I forgot the password 124
- Nwa access and login 124
- I can see the login screen but i cannot log in to the nwa 125
- I cannot access the internet through the nwa 125
- I cannot use ftp to upload new firmware 125
- Internet access 125
- I cannot access the internet anymore i had access to the internet with the nwa but my internet connection is not available anymore 126
- I cannot access the nwa or ping any computer from the wlan 126
- The internet connection is slow or intermittent 126
- Wireless lan 126
- Ppendi 129
- Setting up your computer s ip address 129
- Verifying settings 132
- Windows vista 133
- Note during this procedure click continue whenever windows displays a screen saying that it needs your permission to continue 134
- Verifying settings 136
- Windows 7 137
- Note during this procedure click continue whenever windows displays a screen saying that it needs your permission to continue 138
- Verifying settings 140
- Mac os x 10 and 10 141
- Mac os x 10 and 10 144
- Verifying settings 144
- Linux ubuntu 8 gnome 147
- Note make sure you are logged in as the root administrator 147
- Verifying settings 147
- Linux opensuse 10 kde 151
- Note make sure you are logged in as the root administrator 151
- Verifying settings 151
- Verifying settings 155
- Pop up windows javascript and java permissions 157
- Ppendi 157
- Enable pop up blockers with exceptions 158
- Javascript 160
- Java permissions 162
- Java sun 163
- Mozilla firefox 164
- Allowing pop ups 166
- Enabling java 166
- Ip addresses and subnetting 169
- Ppendi 169
- Subnet masks 170
- An ip address with host ids of all zeros is the ip address of the network 192 68 with a 24 bit subnet mask for example an ip address with host ids of all ones is the broadcast address for that network 192 68 55 with a 24 bit subnet mask for example 171
- Appendix c ip addresses and subnetting 171
- As these two ip addresses cannot be used for individual hosts calculate the maximum number of possible hosts in a network as follows 171
- Binary 171
- Decimal 1st octet 171
- For example 192 25 is equivalent to saying 192 with subnet mask 255 55 55 28 171
- Nd octet 171
- Network size 171
- Notation 171
- Nwa1120 series user s guide 171
- Rd octet 4th octet 171
- Since the mask is always a continuous number of ones beginning from the left followed by a continuous number of zeros for the remainder of the 32 bit mask you can simply specify the number of ones instead of writing the value of each octet this is usually specified by writing a followed by the number of bits in the mask after the address 171
- Subnet mask host id size maximum number of hosts 171
- Subnet masks are expressed in dotted decimal notation just like ip addresses the following examples show the binary and decimal notation for 8 bit 16 bit 24 bit and 29 bit subnet masks 171
- Subnet masks can be referred to by the size of the network number part the bits with a 1 value for example an 8 bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes 171
- Table 40 subnet masks 171
- Table 41 maximum host numbers 171
- The size of the network number determines the maximum number of possible hosts you can have on your network the larger the number of network number bits the smaller the number of remaining host id bits 171
- 2 or 254 possible hosts 172
- Appendix c ip addresses and subnetting 172
- Figure 89 subnetting example before subnetting 172
- In this example the company network address is 192 68 the first three octets of the address 192 68 are the network number and the remaining octet is the host id allowing a maximum of 172
- Last octet binary 172
- Last octet decimal 172
- Nwa1120 series user s guide 172
- Subnet mask alternative notation 172
- Subnetting 172
- Table 42 alternative subnet mask notation 172
- The borrowed host id bit can have a value of either 0 or 1 allowing two subnets 192 68 25 and 192 68 28 25 172
- The following figure shows the company network before subnetting 172
- The following table shows some possible subnet masks using both notations 172
- You can borrow one of the host id bits to divide the network 192 68 into two separate sub networks the subnet mask is now 25 bits 255 55 55 28 or 25 172
- You can use subnetting to divide one network into multiple sub networks in the following example a network administrator creates two sub networks to isolate a group of servers from the rest of the company network for security reasons 172
- Example four subnets 173
- Appendix c ip addresses and subnetting 174
- Example eight subnets 174
- Ip subnet mask network number last octet bit value 174
- Nwa1120 series user s guide 174
- Similarly use a 27 bit mask to create eight subnets 000 001 010 011 100 101 110 and 111 174
- Table 43 subnet 1 continued 174
- Table 44 subnet 2 174
- Table 45 subnet 3 174
- Table 46 subnet 4 174
- Appendix c ip addresses and subnetting 175
- Broadcast address 175
- No borrowed host bits subnet mask no subnets no hosts per subnet 175
- Nwa1120 series user s guide 175
- Subnet planning 175
- Subnet subnet address first address last address 175
- Table 47 eight subnets 175
- Table 48 24 bit network number subnet planning 175
- Table 49 16 bit network number subnet planning 175
- The following table is a summary for subnet planning on a network with a 16 bit network number 175
- The following table is a summary for subnet planning on a network with a 24 bit network number 175
- The following table shows ip address last octet values for each subnet 175
- Configuring ip addresses 176
- Private ip addresses 176
- Ppendi 177
- Global address 178
- Loopback address 178
- Multicast address 178
- Unspecified address 178
- Eui 64 179
- Interface id 179
- Stateless autoconfiguration 179
- Subnet masking 179
- Dhcp relay agent 180
- Dhcpv6 180
- Identity association 180
- Rebind 180
- Renew rebind 180
- Renew to s1 180
- Icmpv6 181
- Ipv6 cache 181
- Neighbor discovery protocol ndp 181
- Prefix delegation 181
- Mld messages 182
- Multicast listener discovery 182
- Example enabling dhcpv6 on windows xp 183
- Example enabling ipv6 on windows xp 2003 vista 183
- Example enabling ipv6 on windows 7 184
- Ppendi 187
- Wireless lans 187
- Channel 189
- Rts cts 189
- Fragmentation threshold 190
- Note enabling the rts threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy 190
- Note the wireless devices must use the same preamble mode in order to communicate 191
- Preamble type 191
- Wireless lan standards 191
- Ieee 802 x 192
- Note you must enable the same wireless security settings on the nwa and on all wireless clients that you want to associate with it 192
- Wireless security overview 192
- Radius 193
- Types of eap authentication 193
- Types of radius messages 193
- Eap md5 message digest algorithm 5 194
- Eap tls transport layer security 194
- Eap ttls tunneled transport layer service 194
- Peap protected eap 194
- Appendix e wireless lans 195
- Dynamic wep key exchange 195
- Eap md5 eap tls eap ttls peap leap 195
- For added security certificate based authentications eap tls eap ttls and peap use dynamic keys for data encryption they are often deployed in corporate environments but for public deployment a simple user name and password pair is more practical the following table is a comparison of the features of authentication types 195
- If both an ap and the wireless clients support wpa2 and you have an external radius server use wpa2 for stronger data encryption if you don t have an external radius server you should use wpa2 psk wpa2 pre shared key that only requires a single identical password entered into each access point wireless gateway and wireless client as long as the passwords match a wireless client will be granted access to a wlan 195
- If the ap or the wireless clients do not support wpa2 just use wpa or wpa psk depending on whether you have an external radius server or not 195
- If this feature is enabled it is not necessary to configure a default encryption key in the wireless security configuration screen you may still configure and store keys but they will not be used while dynamic wep is enabled 195
- Key differences between wpa or wpa2 and wep are improved data encryption and user authentication 195
- Leap lightweight extensible authentication protocol is a cisco implementation of ieee 802 x 195
- Note eap md5 cannot be used with dynamic wep key exchange 195
- Nwa1120 series user s guide 195
- Select wep only when the ap and or wireless clients do not support wpa or wpa2 wep is less secure than wpa or wpa2 195
- Table 57 comparison of eap authentication types 195
- The ap maps a unique key that is generated with the radius server this key expires when the wireless connection times out disconnects or reauthentication times out a new wep key is generated each time reauthentication is performed 195
- Wi fi protected access wpa is a subset of the ieee 802 1i standard wpa2 ieee 802 1i is a wireless security standard that defines stronger encryption authentication and key management than wpa 195
- Wpa and wpa2 195
- Encryption 196
- User authentication 196
- Wireless client wpa supplicants 197
- Wpa 2 psk application example 197
- Wpa 2 with radius application example 197
- Security parameters summary 198
- Antenna characteristics 199
- Antenna gain 199
- Antenna overview 199
- Frequency 199
- Radiation pattern 199
- Types of antennas for wlan 199
- Positioning antennas 200
- Legal information 201
- Ppendi 201
- Appendix f legal information 202
- Erp energy related products declaration of conformity 202
- Ic radiation exposure statement 202
- Notices 202
- Nwa1120 series user s guide 202
- Viewing certifications 202
- Zyxel limited warranty 202
- 注意 202
- Appendix f legal information 203
- Declaration of conformity with regard to eu directive 1999 5 ec r tte directive 203
- European union 203
- Nwa1120 series user s guide 203
- Open source licenses 203
- Registration 203
- Regulatory information 203
- Appendix f legal information 204
- National restrictions 204
- Nwa1120 series user s guide 204
- Appendix f legal information 205
- List of national codes 205
- Nwa1120 series user s guide 205
- Safety warnings 205
- Appendix f legal information 206
- Nwa1120 series user s guide 206
Похожие устройства
- Zyxel NWA1123-NI Технические характеристики
- Zyxel NWA1123-NI Инструкция по установке
- Zyxel NWA1121-NI Инструкция по эксплуатации
- Zyxel NWA1121-NI Инструкция по установке
- Zyxel NWA1121-NI Технические характеристики
- HP color laserjet enterprise 700 m750dn Инструкция по эксплуатации
- HP 15-d001sr, f7r84ea Инструкция по эксплуатации
- HP envy 15-j152sr, f7s86ea Инструкция по эксплуатации
- HP dl160gen8 Инструкция по эксплуатации
- HP dl380egen8 Инструкция по эксплуатации
- HP officejet pro 8620 (a7f65a) Инструкция по эксплуатации
- HP laserjet pro 400 color mfp m476nw Инструкция по эксплуатации
- HP laserjet pro 400 color mfp m476dn Инструкция по эксплуатации
- HP laserjet pro 400 color mfp m476dw Инструкция по эксплуатации
- HP envy x360 15-u050er, j3r54ea Инструкция по эксплуатации
- HP 15-d059sr, f8s96ea Инструкция по эксплуатации
- HP 3800-24g-2sfp+, j9575a Инструкция по эксплуатации
- HP pavilion x360 13-a050er, j1t49ea Инструкция по эксплуатации
- HP 15-r098sr, j8d70ea Инструкция по эксплуатации
- HP h7000 bluetooth Инструкция по эксплуатации