Zyxel NWA1100-N [3/240] Contents overview
![Zyxel NWA1100-N [3/240] Contents overview](/views2/1169172/page3/bg3.png)
Contents Overview
NBG5715 User’s Guide
3
Contents Overview
User’s Guide .........................................................................................................................................9
Introducing the NWA ............................................................................................................................... 11
Introducing the Web Configurator ...........................................................................................................20
Status Screens ........................................................................................................................................23
Tutorial ....................................................................................................................................................27
Technical Reference ..........................................................................................................................46
Wireless Settings Screen ........................................................................................................................48
Multi SSID Screen ...................................................................................................................................66
Wireless Security Screen ........................................................................................................................71
RADIUS Screen ......................................................................................................................................84
MAC Filter Screen ...................................................................................................................................87
IP Screen ................................................................................................................................................90
System Screens ......................................................................................................................................94
Remote Management ............................................................................................................................100
Certificate Screen .................................................................................................................................. 110
Log Screens .......................................................................................................................................... 114
Maintenance .......................................................................................................................................... 119
Troubleshooting ....................................................................................................................................126
Содержание
- 1b g n poe access point 1
- Default login details 1
- Nwa1100 n 1
- Quick start guide 1
- User s guide 1
- Important 2
- Keep this guide for future reference 2
- Read carefully before use 2
- Related documentation 2
- Contents overview 3
- Technical reference 6 3
- User s guide 3
- Chapter 1 introducing the nwa 11 4
- Chapter 2 introducing the web configurator 0 4
- Chapter 3 status screens 3 4
- Chapter 4 tutorial 7 4
- Contents overview 4
- Part i user s guide 9 4
- Table of contents 4
- Chapter 5 wireless settings screen 8 5
- Chapter 6 multi ssid screen 6 5
- Part ii technical reference 46 5
- Chapter 10 ip screen 0 6
- Chapter 11 system screens 4 6
- Chapter 7 wireless security screen 1 6
- Chapter 8 radius screen 4 6
- Chapter 9 mac filter screen 7 6
- Chapter 12 remote management 00 7
- Chapter 13 certificate screen 110 7
- Chapter 14 log screens 114 7
- Chapter 15 maintenance 119 7
- Appendix a setting up your computer s ip address 30 8
- Appendix b pop up windows javascript and java permissions 58 8
- Appendix c ip addresses and subnetting 69 8
- Appendix d wireless lans 77 8
- Appendix e text file based auto configuration 91 8
- Appendix f open software announcements 93 8
- Appendix g customer support 23 8
- Appendix h legal information 29 8
- Chapter 16 troubleshooting 26 8
- Index 35 8
- User s guide 9
- Applications for the nwa 11
- Introducing the nwa 11
- Access point 12
- Bridge repeater 12
- Bridge repeater mode example 13
- Ap bridge 14
- Wireless client 15
- Multi ssid 16
- Ways to manage the nwa 16
- Configuring your nwa s security features 17
- Control access to your device 17
- Wireless security 17
- Chapter 1 introducing the nwa 18
- Do the following things regularly to make the nwa more secure and to manage it more effectively 18
- Figure 10 leds 18
- Good habits for managing the nwa 18
- Hardware connections 18
- Label led color status description 18
- Nwa1100 n user s guide 18
- See your quick start guide for information on making hardware connections 18
- Table 1 leds 18
- Chapter 1 introducing the nwa 19
- Label led color status description 19
- Nwa1100 n user s guide 19
- Table 1 leds continued 19
- Accessing the web configurator 20
- Introducing the web configurator 20
- Resetting the nwa 20
- Methods of restoring factory defaults 21
- Navigating the web configurator 21
- Status screens 23
- The status screen 23
- Chapter 3 status screens 24
- Label description 24
- Nwa1100 n user s guide 24
- Table 2 the status screen continued 24
- Chapter 3 status screens 25
- Figure 15 system status statistics 25
- Label description 25
- Nwa1100 n user s guide 25
- Statistics the following screen pops up 25
- System statistics screen 25
- Table 2 the status screen continued 25
- Table 3 system status statistics 25
- The following table describes the labels in this screen 25
- Use this screen to view read only information including wireless mode channel id retry count and fcs error count also provided is the poll interval the poll interval field is configurable the fields in this screen vary according to the current wireless mode of each wlan adaptor 25
- Chapter 3 status screens 26
- Label description 26
- Nwa1100 n user s guide 26
- Table 3 system status statistics continued 26
- Choosing the wireless mode 27
- How to configure the wireless lan 27
- Tutorial 27
- Wireless lan configuration overview 27
- Chapter 4 tutorial 28
- Choosing a security mode see section 6 on page 67 28
- Choosing a wireless channel see section 5 on page 50 28
- Choosing an ssid profile see section 5 on page 50 28
- Choosing wireless mode see section 5 on page 50 28
- Configuring an external radius server see section 8 on page 85 28
- Configuring mac filtering see section 9 on page 88 28
- Further reading 28
- Nwa1100 n user s guide 28
- See your quick start guide for information on setting up your nwa and accessing the web configurator 28
- Selecting operation mode see section 5 on page 50 28
- Use these links to find more information on the steps 28
- How to configure multiple wireless networks 29
- Configure the ssid profiles 30
- Multi ssid 31
- Configure the standard network 32
- Configure the voip network 34
- Configure the guest network 35
- Testing the wireless networks 37
- Configuring the nwa in access point mode 38
- Nwa setup in ap and wireless client modes 38
- Scenario 38
- Configuring the nwa in wireless client mode 41
- Mac filter setup 44
- Testing the connection and troubleshooting 44
- Technical reference 46
- Overview 48
- What you can do in this chapter 48
- Wireless settings screen 48
- Channel 49
- Operating mode 49
- What you need to know 49
- Multi ssid 50
- Wireless mode 50
- Wireless settings screen 50
- Access point mode 51
- Chapter 5 wireless settings screen 52
- Label description 52
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 52
- Nwa1100 n user s guide 52
- Wireless settings access point continued 52
- Bridge repeater mode 53
- Chapter 5 wireless settings screen 53
- Label description 53
- Nwa1100 n user s guide 53
- Use this screen to have the nwa act as a wireless network bridge and establish wireless links with other aps you need to know the mac address of the peer device which also must be in bridge mode 53
- Wireless settings access point continued 53
- Chapter 5 wireless settings screen 55
- Label descriptions 55
- Note other aps must use the same encryption method to enable wds security 55
- Note wds security is independent of the security settings between the nwa and any wireless clients 55
- Nwa1100 n user s guide 55
- The following table describes the bridge labels in this screen 55
- Wireless settings bridge repeater 55
- Chapter 5 wireless settings screen 56
- Label descriptions 56
- Note check your other ap s documentation to make sure it supports wds security 56
- Nwa1100 n user s guide 56
- Wireless settings bridge repeater continued 56
- Chapter 5 wireless settings screen 57
- Label descriptions 57
- Nwa1100 n user s guide 57
- Wireless settings bridge repeater continued 57
- Ap bridge mode 58
- Chapter 5 wireless settings screen 59
- Label description 59
- Note after selecting wireless client as the operation mode in the basic settings section you must click apply to be able to select from the ap list 59
- Nwa1100 n user s guide 59
- The following table describes the general wireless lan labels in this screen 59
- Use this screen to turn your nwa into a wireless client select wireless client as the operation mode the following screen displays 59
- Wireless client mode 59
- Wireless settings wireless client 59
- Chapter 5 wireless settings screen 60
- Label description 60
- Nwa1100 n user s guide 60
- Wireless settings wireless client continued 60
- Multi ssid mode 61
- Chapter 5 wireless settings screen 62
- Nwa1100 n user s guide 62
- The following table describes the labels in this screen 62
- Wireless settings multi ssid 62
- Chapter 5 wireless settings screen 63
- Nwa1100 n user s guide 63
- Wireless settings multi ssid continued 63
- Chapter 5 wireless settings screen 64
- Nwa1100 n user s guide 64
- On aps without wmm qos all traffic streams are given the same access priority to the wireless network if the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity then the new traffic stream reduces the throughput of the other traffic streams 64
- Technical reference 64
- The nwa uses wmm qos to prioritize traffic streams according to the ieee 802 q or dscp information in each packet s header the nwa automatically determines the priority to use for an individual traffic stream this prevents reductions in data transmission for applications that are sensitive to latency and jitter variations in delay 64
- This section provides technical background information about the topics covered in this chapter refer to appendix d on page 177 for further readings on wireless lan 64
- Wireless settings multi ssid continued 64
- Wmm qos 64
- Wmm qos prioritizes wireless traffic according to the delivery requirements of the individual and applications wmm qos is a part of the ieee 802 1e qos enhancement to certified wi fi wireless networks 64
- Wmm wi fi multimedia qos quality of service ensures quality of service in wireless networks it controls wlan transmission priority on packets to be transmitted over the wireless network 64
- Additional wireless terms 65
- Chapter 5 wireless settings screen 65
- Nwa1100 n user s guide 65
- Table 8 additional wireless terms 65
- Term description 65
- Multi ssid screen 66
- Overview 66
- What you can do in this chapter 66
- What you need to know 66
- The multi ssid screen 67
- Chapter 6 multi ssid screen 68
- Configuring ssid 68
- Figure 27 multi ssid edit 68
- Multi ssid continued 68
- Multi ssid screen select an ssid profile and click edit to display the following screen 68
- Nwa1100 n user s guide 68
- Table 9 multi ssid edit 68
- The following table describes the labels in this screen 68
- Chapter 6 multi ssid screen 69
- Note when you configure an ssid profile s qos settings the nwa applies the same qos setting to all of the profile s traffic 69
- Nwa1100 n user s guide 69
- On aps without wmm qos all traffic streams are given the same access priority to the wireless network if the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity then the new traffic stream reduces the throughput of the other traffic streams 69
- Table 9 multi ssid edit continued 69
- Technical reference 69
- The nwa uses wmm qos to prioritize traffic streams according to the ieee 802 q or dscp information in each packet s header the nwa automatically determines the priority to use for an 69
- This section provides technical background information about the topics covered in this chapter 69
- Wmm qos 69
- Wmm qos prioritizes wireless traffic according to the delivery requirements of the individual and applications wmm qos is a part of the ieee 802 1e qos enhancement to certified wi fi wireless networks 69
- Wmm wi fi multimedia qos quality of service ensures quality of service in wireless networks it controls wlan transmission priority on packets to be transmitted over the wireless network 69
- Chapter 6 multi ssid screen 70
- In order to control which priority level is given to traffic the device sending the traffic must set the dscp value in the header if the dscp value is not specified then the traffic is treated as best effort this means the wireless clients and the devices with which they are communicating must both set the dscp value in order to make the best use of wmm qos a voice over ip voip device for example may allow you to define the dscp value 70
- Individual traffic stream this prevents reductions in data transmission for applications that are sensitive to latency and jitter variations in delay 70
- Network traffic can be classified by setting the tos type of service values at the data source for example at the nwa so a server can decide the best method of delivery that is the least cost fastest route and so on 70
- Nwa1100 n user s guide 70
- Table 10 wmm qos priorities 70
- Table 11 tos and ieee 802 d to wmm qos priority level mapping 70
- The dscp value of outgoing packets is between 0 and 255 0 is the default priority wmm qos checks the dscp value in the header of data packets it gives the traffic a priority according to this number 70
- The following table describes the wmm qos priority levels that the nwa uses 70
- The following table lists which wmm qos priority level the nwa uses for specific dscp values 70
- Tos type of service and wmm qos 70
- Type of service tos 70
- Wmm qos priorities 70
- Overview 71
- What you can do in this chapter 71
- Wireless security screen 71
- User authentication 72
- What you need to know 72
- Encryption 73
- Note in bridge repeater and ap bridge operating modes the only available security modes are wep wpa psk and wpa2 psk 73
- Note to guarantee 802 1n wireless speed please only use wpa2 or wpa2 psk security mode other security modes may degrate the wireless speed performance to 802 1g 73
- Passphrase 73
- The security screen 73
- Note you must enable the same wireless security settings on the nwa and on all wireless clients that you want to associate with it 74
- Chapter 7 wireless security screen 75
- Figure 31 security wep 75
- Label description 75
- Nwa1100 n user s guide 75
- Security wep 75
- Table 13 security wep 75
- The following table describes the labels in this screen 75
- Use this screen to use wep as the security mode for your nwa select wep in the security mode field to display the following screen 75
- Access point or multi ssid 76
- Security 802 x only 76
- Chapter 7 wireless security screen 77
- Figure 33 security 802 x for wireless client 77
- Label description 77
- Nwa1100 n user s guide 77
- Table 15 security 802 x for wireless client 77
- The following table describes the labels in this screen 77
- Use this screen to use 802 x authentication with no data encryption for your nwa that is in wireless client operating mode select 802 x in the security mode field to display the following screen 77
- Wireless client 77
- Access point or multi ssid 78
- Security 802 x static wep 78
- Chapter 7 wireless security screen 79
- Figure 35 security 802 x static wep for wireless client 79
- Label description 79
- Note if wireless station authentication is done using a radius server the reauthentication timer on the radius server has priority 79
- Nwa1100 n user s guide 79
- Table 16 security 802 x static wep ap mode continued 79
- Use this screen to use 802 x authentication with a static wep key for your nwa that is in wireless client operating mode select 802 x in the security mode field to display the following screen 79
- Wireless client 79
- Chapter 7 wireless security screen 80
- Label description 80
- Nwa1100 n user s guide 80
- Security wpa wpa2 or wpa2 mix 80
- Table 17 security 802 x static wep for wireless client 80
- The following table describes the labels in this screen 80
- Wireless settings screen 80
- Access point or multi ssid 81
- Chapter 7 wireless security screen 81
- Figure 36 security wpa wpa2 or wpa2 mix for access point 81
- Label descriptions 81
- Note if wireless station authentication is done using a radius server the reauthentication timer on the radius server has priority 81
- Nwa1100 n user s guide 81
- Table 18 security wpa wpa2 or wpa2 mix for access point 81
- The following table describes the labels not previously discussed 81
- Use this screen to employ wpa and or wpa2 as the security mode of your nwa that is in access point or multi ssid operating mode select wpa wpa2 or wpa2 mix in the security mode field to display the following screen 81
- Chapter 7 wireless security screen 82
- Figure 37 security wpa or wpa2 for wireless client 82
- Label description 82
- Nwa1100 n user s guide 82
- Table 19 security wpa or wpa2 for wireless client 82
- The following table describes the labels in this screen 82
- Use this screen to employ wpa or wpa2 as the security mode of your nwa that is in wireless client operating mode select wpa or wpa2 in the security mode field to display the following screen 82
- Wireless client 82
- Chapter 7 wireless security screen 83
- Figure 38 security wpa psk wpa2 psk or wpa2 psk mix 83
- If you don t have wpa 2 aware wireless clients then use wep key encrypting a higher bit key offers better security you can manually enter 64 bit 128 bit or 152 bit wep keys 83
- Label description 83
- More information on wireless security can be found in appendix d on page 177 83
- Nwa1100 n user s guide 83
- Security wpa psk wpa2 psk wpa2 psk mix 83
- Table 20 security wpa psk wpa2 psk or wpa2 psk mix 83
- Technical reference 83
- The following is a general guideline in choosing the security mode for your nwa 83
- The following table describes the labels not previously discussed 83
- This section provides technical background information on the topics discussed in this chapter 83
- Use this screen to employ wpa psk wpa2 psk or wpa2 psk mix as the security mode of your nwa select wpa psk wpa2 psk or wpa2 psk mix in the security mode field to display the following screen 83
- Use wpa 2 psk if you have wpa 2 aware wireless clients but no radius server 83
- Use wpa 2 psk if you have wpa 2 aware wireless clients but no radius server use wpa 2 security if you have wpa 2 aware wireless clients and a radius server wpa has user authentication and improved data encryption over wep 83
- Overview 84
- Radius screen 84
- What you can do in this chapter 84
- What you need to know 84
- The radius screen 85
- Chapter 8 radius screen 86
- Label description 86
- Nwa1100 n user s guide 86
- Radius continued 86
- Mac filter screen 87
- Overview 87
- What you can do in this chapter 87
- What you need to know 87
- Mac filter screen 88
- Chapter 9 mac filter screen 89
- Figure 43 mac filter edit 89
- Label description 89
- Mac filter 89
- Nwa1100 n user s guide 89
- Select a profile you want to configure and click edit 89
- The following table describes the labels in this screen 89
- Ip screen 90
- Overview 90
- What you can do in this chapter 90
- What you need to know 90
- Chapter 10 ip screen 91
- Figure 45 ip setup 91
- Ip screen 91
- Label description 91
- Note if the nwa attempts but failes to get an ip address from the dhcp server three times the nwa then uses the default ip address 192 68 91
- Note if you change the nwa s ip address you must use the new ip address if you want to access the web configurator again 91
- Note you must know the ip address assigned to the nwa by the dhcp server to access the nwa again 91
- Nwa1100 n user s guide 91
- Table 23 ip setup 91
- The following table describes the labels in this screen 91
- Use this screen to configure the ip address for your nwa click ip to display the following screen 91
- Note regardless of your particular situation do not create an arbitrary ip address always follow the guidelines above for more information on address assignment please refer to rfc 1597 address allocation for private internets and rfc 1466 guidelines for management of ip address space 92
- Rapid stp 92
- Spanning tree protocol stp 92
- Stp terminology 92
- Technical reference 92
- Wan ip address assignment 92
- After a bridge determines the lowest cost spanning tree with stp it enables the root port and the ports that are the designated ports for connected lans and disables all other ports that participate in stp network packets are therefore only forwarded between enabled ports eliminating any possible network loops 93
- Allowed range 93
- Chapter 10 ip screen 93
- For each lan segment a designated bridge is selected this bridge has the lowest cost to the root among the bridges connected to the lan 93
- How stp works 93
- Link speed recommended value 93
- Nwa1100 n user s guide 93
- On each bridge the root port is the port through which this bridge communicates with the root it is the port on this switch with the lowest path cost to the root the root path cost if there is no root port then this bridge has been accepted as the root bridge of the spanning tree network 93
- Once a stable network topology has been established all bridges listen for hello bpdus bridge protocol data units transmitted from the root bridge if a bridge does not get a hello bpdu after a predefined interval max age the bridge assumes that the link to the root bridge is down this bridge then initiates negotiations with other bridges to reconfigure the network to re establish a valid network topology 93
- Path cost is the cost of transmitting a frame onto a lan through that port it is assigned according to the speed of the link to which a port is attached the slower the media the higher the cost see the following table 93
- Port states descriptions 93
- Recommended range 93
- Stp assigns five port states see next table to eliminate packet looping a bridge port is not allowed to go directly from blocking state to forwarding state so as to eliminate transient loops 93
- Stp aware bridges exchange bridge protocol data units bpdus periodically when the bridged lan topology changes a new spanning tree is constructed 93
- Stp port states 93
- Table 25 stp path costs 93
- Table 26 stp port states 93
- Overview 94
- System screens 94
- What you can do in this chapter 94
- What you need to know 94
- Ip address and subnet mask 95
- Note regardless of your particular situation do not create an arbitrary ip address always follow the guidelines above for more information on address assignment please refer to rfc 1597 address allocation for private internets and rfc 1466 guidelines for management of ip address space 95
- Chapter 11 system screens 96
- General 96
- General screen 96
- General the following screen displays 96
- Label description 96
- Nwa1100 n user s guide 96
- The following table describes the labels in this screen 96
- Chapter 11 system screens 97
- Label descriptions 97
- Nwa1100 n user s guide 97
- Password 97
- Password screen 97
- Password the following screen displays 97
- The following table describes the labels in this screen 97
- Chapter 11 system screens 98
- Label description 98
- Nwa1100 n user s guide 98
- The following table describes the labels in this screen 98
- Time screen 98
- Time the following screen displays 98
- Pre defined ntp time servers list 99
- Technical reference 99
- Overview 100
- Remote management 100
- What you can do in this chapter 100
- Telnet 101
- What you need to know 101
- Note snmp is only available if tcp ip is configured 102
- Remote management limitations 102
- Chapter 12 remote management 103
- Figure 52 remote management telnet 103
- Label description 103
- Nwa1100 n user s guide 103
- System timeout 103
- Table 32 remote management telnet 103
- Telnet the following screen displays 103
- The following table describes the labels in this screen 103
- The telnet screen 103
- There is a default system management idle timeout of five minutes three hundred seconds the nwa automatically logs you out if the management session remains idle for longer than this timeout period the management session does not time out when a statistics screen is polling 103
- Use this screen to configure your nwa for remote telnet access you can use telnet to access the nwa s command line interface cli 103
- Chapter 12 remote management 104
- Figure 53 remote management ftp 104
- Ftp the following screen displays 104
- Label description 104
- Nwa1100 n user s guide 104
- Table 33 remote management ftp 104
- The following table describes the labels in this screen 104
- The ftp screen 104
- The www screen 104
- Use this screen to configure your nwa via the world wide web www using a web browser this lets you specify which ip addresses or computers are able to communicate with and access the nwa 104
- Use this screen to upload and download the nwa s firmware using ftp to use this feature your computer must have an ftp client 104
- Chapter 12 remote management 105
- Figure 54 remote management www 105
- Label description 105
- Nwa1100 n user s guide 105
- Table 34 remote management www 105
- The following table describes the labels in this screen 105
- Www the following screen shows 105
- Chapter 12 remote management 106
- Figure 55 remote management snmp 106
- Label description 106
- Nwa1100 n user s guide 106
- Snmp the following screen displays 106
- Table 35 remote management snmp 106
- The following table describes the labels in this screen 106
- The snmp screen 106
- Chapter 12 remote management 107
- Label description 107
- Nwa1100 n user s guide 107
- Table 35 remote management snmp continued 107
- Chapter 12 remote management 108
- Get allows the manager to retrieve an object variable from the agent 108
- Getnext allows the manager to retrieve the next object variable from a table or list within an agent in snmpv1 when a manager wants to retrieve all elements of a table from an agent it initiates a get operation followed by a series of getnext operations 108
- Label description 108
- Managed devices in an smnp managed network contain object variables or managed objects that define each piece of information to be collected about a device examples of variables include such as number of packets received node port status etc a management information base mib is a collection of managed objects snmp itself is a simple request response protocol based on the manager agent model the manager issues a request and the agent returns responses using the following protocol operations 108
- Nwa1100 n user s guide 108
- Set allows the manager to set values for object variables within an agent 108
- Supported mibs 108
- Table 35 remote management snmp continued 108
- Technical reference 108
- The nwa supports mib ii that is defined in rfc 1213 and rfc 1215 as well as the proprietary zyxel private mib the purpose of the mibs is to let administrators collect statistical data and monitor status and performance 108
- This section provides some technical background information about the topics covered in this chapter 108
- Trap used by the agent to inform the manager of some events 108
- Chapter 12 remote management 109
- Nwa1100 n user s guide 109
- Snmp traps 109
- Snmp traps are messages sent by the agents of each managed device to the snmp manager these messages inform the administrator of events in data networks handled by the device the nwa can send the following traps to the snmp manager 109
- Some traps include an snmp interface index the following table maps the snmp interface indexes to the nwa s physical and virtual ports 109
- Table 36 snmp traps 109
- Table 37 snmp interface index to physical and virtual port mapping 109
- Trap name object identifier oid description 109
- Type interface port 109
- Certificate screen 110
- Overview 110
- What you can do in this chapter 110
- What you need to know 110
- Certificates screen 111
- Chapter 13 certificate screen 111
- Click certificates to open the nwa s summary list of certificates and to import a new certificate see the following figure 111
- Figure 57 certificates 111
- Label description 111
- Nwa1100 n user s guide 111
- Private public certificates 111
- Table 38 certificates 111
- Technical reference 111
- The following table describes the labels in this screen 111
- This section provides technical background information about the topics covered in this chapter 111
- Use this screen to view delete and import certificates 111
- When using public key cryptology for authentication each host has two keys one key is public and can be made openly available the other key is private and must be kept secure 111
- Certification authorities 112
- Checking the fingerprint of a certificate on your computer 112
- Log screens 114
- Overview 114
- What you can do in this chapter 114
- Alerts and logs 115
- Enabling syslog logging 115
- Receiving logs via e mail 115
- View log screen 115
- What you need to know 115
- Chapter 14 log screens 116
- Label description 116
- Log settings screen 116
- Nwa1100 n user s guide 116
- Table 39 view log 116
- The following table describes the labels in this screen 116
- Use this screen to configure to where and when the nwa is to send the logs and which logs and or immediate alerts it is to send 116
- Chapter 14 log screens 117
- Figure 62 log settings 117
- Label description 117
- Log settings the screen appears as shown 117
- Nwa1100 n user s guide 117
- Table 40 log settings 117
- The following table describes the labels in this screen 117
- Chapter 14 log screens 118
- Label description 118
- Nwa1100 n user s guide 118
- Table 40 log settings continued 118
- Client information screen 119
- Maintenance 119
- Overview 119
- What you can do in this chapter 119
- What you need to know 119
- Channel scan screen 120
- Chapter 15 maintenance 121
- F w upload follow the instructions in this section to upload firmware to your nwa 121
- F w upload screen 121
- Figure 65 firmware upload 121
- Label description 121
- Nwa1100 n user s guide 121
- Table 42 channel scan 121
- Table 43 firmware upload 121
- The following table describes the labels in this screen 121
- Do not turn off the nwa while firmware upload is in progress 122
- Backup configuration 123
- Configuration file screen 123
- Restore configuration 123
- Do not turn off the nwa while configuration file upload is in progress 124
- Back to factory defaults 125
- Reboot screen 125
- Power hardware connections and leds 126
- Troubleshooting 126
- I cannot see or access the login screen in the web configurator 127
- I forgot the ip address for the nwa 127
- I forgot the password 127
- Nwa access and login 127
- I can see the login screen but i cannot log in to the nwa 128
- I cannot access the internet 128
- I cannot access the internet anymore i had access to the internet with the nwa but my internet connection is not available anymore 128
- I cannot use ftp to upload new firmware 128
- Internet access 128
- I cannot access the nwa or ping any computer from the wlan 129
- The internet connection is slow or intermittent 129
- Wireless lan 129
- Ppendi 130
- Setting up your computer s ip address 130
- Verifying settings 133
- Windows vista 134
- Note during this procedure click continue whenever windows displays a screen saying that it needs your permission to continue 135
- Verifying settings 137
- Windows 7 138
- Note during this procedure click continue whenever windows displays a screen saying that it needs your permission to continue 139
- Verifying settings 141
- Mac os x 10 and 10 142
- Mac os x 10 and 10 145
- Verifying settings 145
- Linux ubuntu 8 gnome 148
- Note make sure you are logged in as the root administrator 148
- Verifying settings 148
- Linux opensuse 10 kde 152
- Note make sure you are logged in as the root administrator 152
- Verifying settings 152
- Verifying settings 156
- Pop up windows javascript and java permissions 158
- Ppendi 158
- Enable pop up blockers with exceptions 159
- Javascript 161
- Java permissions 163
- Java sun 164
- Mozilla firefox 165
- Allowing pop ups 167
- Enabling java 167
- Ip addresses and subnetting 169
- Ppendi 169
- Subnet masks 170
- An ip address with host ids of all zeros is the ip address of the network 192 68 with a 24 bit subnet mask for example an ip address with host ids of all ones is the broadcast address for that network 192 68 55 with a 24 bit subnet mask for example 171
- Appendix c ip addresses and subnetting 171
- As these two ip addresses cannot be used for individual hosts calculate the maximum number of possible hosts in a network as follows 171
- Binary 171
- Decimal 1st octet 171
- For example 192 25 is equivalent to saying 192 with subnet mask 255 55 55 28 171
- Nd octet 171
- Network size 171
- Notation 171
- Nwa1100 n user s guide 171
- Rd octet 4th octet 171
- Since the mask is always a continuous number of ones beginning from the left followed by a continuous number of zeros for the remainder of the 32 bit mask you can simply specify the number of ones instead of writing the value of each octet this is usually specified by writing a followed by the number of bits in the mask after the address 171
- Subnet mask host id size maximum number of hosts 171
- Subnet masks are expressed in dotted decimal notation just like ip addresses the following examples show the binary and decimal notation for 8 bit 16 bit 24 bit and 29 bit subnet masks 171
- Subnet masks can be referred to by the size of the network number part the bits with a 1 value for example an 8 bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes 171
- Table 46 subnet masks 171
- Table 47 maximum host numbers 171
- The size of the network number determines the maximum number of possible hosts you can have on your network the larger the number of network number bits the smaller the number of remaining host id bits 171
- 2 or 254 possible hosts 172
- Appendix c ip addresses and subnetting 172
- Figure 95 subnetting example before subnetting 172
- In this example the company network address is 192 68 the first three octets of the address 192 68 are the network number and the remaining octet is the host id allowing a maximum of 172
- Last octet binary 172
- Last octet decimal 172
- Nwa1100 n user s guide 172
- Subnet mask alternative notation 172
- Subnetting 172
- Table 48 alternative subnet mask notation 172
- The borrowed host id bit can have a value of either 0 or 1 allowing two subnets 192 68 25 and 192 68 28 25 172
- The following figure shows the company network before subnetting 172
- The following table shows some possible subnet masks using both notations 172
- You can borrow one of the host id bits to divide the network 192 68 into two separate sub networks the subnet mask is now 25 bits 255 55 55 28 or 25 172
- You can use subnetting to divide one network into multiple sub networks in the following example a network administrator creates two sub networks to isolate a group of servers from the rest of the company network for security reasons 172
- Example four subnets 173
- Appendix c ip addresses and subnetting 174
- Example eight subnets 174
- Ip subnet mask network number last octet bit value 174
- Nwa1100 n user s guide 174
- Similarly use a 27 bit mask to create eight subnets 000 001 010 011 100 101 110 and 111 174
- Table 49 subnet 1 continued 174
- Table 50 subnet 2 174
- Table 51 subnet 3 174
- Table 52 subnet 4 174
- Appendix c ip addresses and subnetting 175
- Broadcast address 175
- No borrowed host bits subnet mask no subnets no hosts per subnet 175
- Nwa1100 n user s guide 175
- Subnet planning 175
- Subnet subnet address first address last address 175
- Table 53 eight subnets 175
- Table 54 24 bit network number subnet planning 175
- Table 55 16 bit network number subnet planning 175
- The following table is a summary for subnet planning on a network with a 16 bit network number 175
- The following table is a summary for subnet planning on a network with a 24 bit network number 175
- The following table shows ip address last octet values for each subnet 175
- Configuring ip addresses 176
- Private ip addresses 176
- Ppendi 177
- Wireless lans 177
- Channel 179
- Rts cts 179
- Fragmentation threshold 180
- Note enabling the rts threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy 180
- Ieee 802 1g wireless lan 181
- Note the wireless devices must use the same preamble mode in order to communicate 181
- Preamble type 181
- Wireless security overview 181
- Ieee 802 x 182
- Note you must enable the same wireless security settings on the nwa and on all wireless clients that you want to associate with it 182
- Radius 182
- Types of eap authentication 183
- Types of radius messages 183
- Dynamic wep key exchange 184
- Eap md5 message digest algorithm 5 184
- Eap tls transport layer security 184
- Eap ttls tunneled transport layer service 184
- Peap protected eap 184
- Appendix d wireless lans 185
- Eap md5 eap tls eap ttls peap leap 185
- Encryption 185
- For added security certificate based authentications eap tls eap ttls and peap use dynamic keys for data encryption they are often deployed in corporate environments but for public deployment a simple user name and password pair is more practical the following table is a comparison of the features of authentication types 185
- If both an ap and the wireless clients support wpa2 and you have an external radius server use wpa2 for stronger data encryption if you don t have an external radius server you should use wpa2 psk wpa2 pre shared key that only requires a single identical password entered into each access point wireless gateway and wireless client as long as the passwords match a wireless client will be granted access to a wlan 185
- If the ap or the wireless clients do not support wpa2 just use wpa or wpa psk depending on whether you have an external radius server or not 185
- If this feature is enabled it is not necessary to configure a default encryption key in the wireless security configuration screen you may still configure and store keys but they will not be used while dynamic wep is enabled 185
- Key differences between wpa or wpa2 and wep are improved data encryption and user authentication 185
- Note eap md5 cannot be used with dynamic wep key exchange 185
- Nwa1100 n user s guide 185
- Select wep only when the ap and or wireless clients do not support wpa or wpa2 wep is less secure than wpa or wpa2 185
- Table 58 comparison of eap authentication types 185
- Tkip uses 128 bit keys that are dynamically generated and distributed by the authentication server aes advanced encryption standard is a block cipher that uses a 256 bit mathematical algorithm 185
- Wi fi protected access wpa is a subset of the ieee 802 1i standard wpa2 ieee 802 1i is a wireless security standard that defines stronger encryption authentication and key management than wpa 185
- Wpa and wpa2 185
- Wpa improves data encryption by using temporal key integrity protocol tkip message integrity check mic and ieee 802 x wpa2 also uses tkip when required for compatibility reasons but offers stronger encryption than tkip with advanced encryption standard aes in the counter mode with cipher block chaining message authentication code protocol ccmp 185
- User authentication 186
- Wireless client wpa supplicants 186
- Wpa 2 psk application example 187
- Wpa 2 with radius application example 187
- An antenna couples rf signals onto air a transmitter within a wireless device sends an rf signal to the antenna which propagates the signal through the air the antenna also operates in reverse by capturing rf signals from the air 188
- Antenna overview 188
- Appendix d wireless lans 188
- Authentication method key management protocol 188
- Encryptio n method 188
- Enter manual key ieee 802 x 188
- Figure 102 wpa 2 psk authentication 188
- Nwa1100 n user s guide 188
- Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type mac address filters are not dependent on how you configure these security features 188
- Security parameters summary 188
- Table 59 wireless security relational matrix 188
- The ap and wireless clients use the tkip or aes encryption process the pmk and information exchanged in a handshake to create temporal encryption keys they use these keys to encrypt data exchanged between them 188
- Antenna characteristics 189
- Antenna gain 189
- Frequency 189
- Positioning antennas 189
- Radiation pattern 189
- Types of antennas for wlan 189
- Ppendi 191
- Text file based auto configuration 191
- Troubleshooting via snmp 192
- Verifying your configuration file upload via snmp 192
- Open software announcements 193
- Ppendi 193
- Customer support 223
- Ppendi 223
- Austria 224
- Belarus 224
- Europe 224
- Malaysia 224
- Pakistan 224
- Philipines 224
- Singapore 224
- Taiwan 224
- Thailand 224
- Vietnam 224
- Belgium 225
- Bulgaria 225
- Denmark 225
- Estonia 225
- Finland 225
- France 225
- Germany 225
- Hungary 225
- Latvia 225
- Lithuania 226
- Netherlands 226
- Norway 226
- Poland 226
- Romania 226
- Russia 226
- Slovakia 226
- Sweden 226
- Switzerland 226
- Argentina 227
- Ecuador 227
- Latin america 227
- Middle east 227
- North america 227
- Turkey 227
- Ukraine 227
- Africa 228
- Australia 228
- Oceania 228
- South africa 228
- Legal information 229
- Ppendi 229
- Appendix h legal information 230
- Declaration of conformity with regard to eu directive 1999 5 ec r tte directive 230
- European union 230
- Ic radiation exposure statement 230
- Notices 230
- Nwa1100 n user s guide 230
- Registration 230
- Regulatory information 230
- Viewing certifications 230
- Zyxel limited warranty 230
- 注意 230
- Appendix h legal information 231
- National restrictions 231
- Nwa1100 n user s guide 231
- Appendix h legal information 232
- Nwa1100 n user s guide 232
- Appendix h legal information 233
- List of national codes 233
- Nwa1100 n user s guide 233
- Safety warnings 233
- Appendix h legal information 234
- Environmental product declaration 234
- Nwa1100 n user s guide 234
- Numbers 235
Похожие устройства
- Zyxel NWA1100-N Инструкция по установке
- Zyxel NWA1100-N Технические характеристики
- Zyxel NWA1100-NH Инструкция по эксплуатации
- Zyxel NWA1100-NH Инструкция по установке
- Zyxel NWA1100-NH Технические характеристики
- Zyxel NWA1300-NJ Инструкция по эксплуатации
- Zyxel NWA1300-NJ Технические характеристики
- HP pavilion x360 11-n051er, j1t48ea Инструкция по эксплуатации
- Zyxel NWA1300-NJ Инструкция по установке
- HP envy 15-k052sr, g7x79ea Инструкция по эксплуатации
- Zyxel NWA5560-N Инструкция по эксплуатации
- Zyxel NWA5560-N Технические характеристики
- HP pavilion 15-p004sr, g7w82ea Инструкция по эксплуатации
- Zyxel NWA3160-N Инструкция по эксплуатации
- Zyxel NWA3160-N Инструкция по установке
- Zyxel NWA3160-N Технические характеристики
- Zyxel NWA3160-N Справочник командного интерфейса
- HP pavilion 17-f009sr, g7y09ea Инструкция по эксплуатации
- Zyxel NWA3560-N Инструкция по эксплуатации
- Zyxel NWA3560-N Инструкция по установке
Скачать
Случайные обсуждения