Zyxel NWA1100-NH [87/208] Lan and vlan
![Zyxel NWA1100-NH [87/208] Lan and vlan](/views2/1169176/page87/bg57.png)
NWA1000 Series User’s Guide 87
CHAPTER 7
LAN and VLAN
7.1 LAN Overview
This chapter describes how you can configure the IP address of your NWA.
The Internet Protocol (IP) address identifies a device on a network. Every networking device
(including computers, servers, routers, printers, etc.) needs an IP address to communicate across
the network. These networking devices are also known as hosts.
Figure 41 IPv4 Setup
The figure above illustrates one possible setup of your NWA. The gateway IPv4 address is
192.168.1.1 and the IPv4 address of the NWA is 192.168.1.2 (default). The gateway and the device
must belong in the same subnet mask to be able to communicate with each other.
7.2 What You Can Do in the LAN IP Screen
Use the LAN IP screen to configure the IP address of your NWA (see Section 7.6 on page 90).
7.3 What You Need to Know
The Ethernet parameters of the NWA are preset in the factory with the following values:
1 IP address of 192.168.1.2
2 Subnet mask of 255.255.255.0 (24 bits)
Содержание
- Default login details 1
- Nwa 1100 nh 1121 ni 1123 ni 1123 ac 1
- Nwa1000 series 1
- Quick start guide 1
- User s guide 1
- Wlan poe access points 1
- Important 2
- Keep this guide for future reference 2
- Read carefully before use 2
- Related documentation 2
- Contents overview 3
- Technical reference 5 3
- User s guide 3
- Chapter 1 introducing the nwa 4
- Chapter 2 introducing the web configurator 8 4
- Chapter 3 dashboard 4 4
- Contents overview 4
- Part i user s guide 8 4
- Table of contents 4
- Chapter 4 tutorial 8 5
- Chapter 5 monitor 6 5
- Chapter 6 wireless lan 1 5
- Part ii technical reference 45 5
- Chapter 7 lan and vlan 7 6
- Chapter 8 system 2 6
- Chapter 9 log settings 05 6
- Appendix a setting up your computer s ip address 22 7
- Appendix b pop up windows javascript and java permissions 50 7
- Appendix c ip addresses and subnetting 61 7
- Appendix d ipv6 69 7
- Appendix e wireless lans 78 7
- Appendix f customer support 92 7
- Appendix g legal information 98 7
- Chapter 10 maintenance 09 7
- Chapter 11 troubleshooting 117 7
- Index 04 7
- User s guide 8
- Dual band 9
- Introducing the nwa 9
- Mbssid 10
- Wireless modes 10
- Note the nwa1123 ni or nwa1123 ac is a dual band ap which contains two different types of wireless radios to transmit at 2 ghz and 5 ghz bands separately and simultaneously if one of the nwa1123 ni wireless radio is set to work in client mode the other radio will be disabled automatically 11
- Wireless client 11
- Repeater 13
- Root ap 13
- Ways to manage the nwa 14
- Configuring your nwa s security features 15
- Control access to your device 15
- Good habits for managing the nwa 15
- Wireless security 15
- Hardware connections 16
- Chapter 1 introducing the nwa 17
- Led color status description 17
- Nwa1000 series user s guide 17
- Table 2 led continued 17
- Accessing the web configurator 18
- Introducing the web configurator 18
- Overview 18
- Note if you do not change the password the following screen appears every time you login 19
- Methods of restoring factory defaults 20
- Resetting the nwa 20
- Navigating the web configurator 21
- Title bar 21
- Chapter 2 introducing the web configurator 22
- Link tab function 22
- Navigation panel 22
- Nwa1000 series user s guide 22
- Table 3 navigation panel summary 22
- Use the menu items on the navigation panel to open screens to configure nwa features the following tables describe each menu item 22
- Main window 23
- Dashboard 24
- The dashboard screen 24
- Chapter 3 dashboard 26
- Label description 26
- Nwa1000 series user s guide 26
- Table 4 the dashboard screen 26
- The following table describes the labels in this screen 26
- Chapter 3 dashboard 27
- Label description 27
- Nwa1000 series user s guide 27
- Table 4 the dashboard screen continued 27
- Choosing the wireless mode 28
- Further reading 28
- How to configure multiple wireless networks 28
- How to configure the wireless lan 28
- Tutorial 28
- Configure the ssid profiles 30
- Mbssid 31
- Configure the standard network 32
- Configure the voip network 33
- Configure the guest network 35
- Nwa setup in ap and wireless client modes 37
- Scenario 37
- Testing the wireless networks 37
- Configuring the nwa in mbssid or root ap mode 38
- Configuring the nwa in wireless client mode 41
- Mac filter setup 43
- Testing the connection and troubleshooting 44
- Technical reference 45
- Monitor 46
- Overview 46
- View logs 46
- What you can do 46
- Chapter 5 monitor 47
- Figure 15 logs 47
- Label description 47
- Nwa1000 series user s guide 47
- Statistics 47
- Table 6 logs 47
- The following table describes the labels in this screen 47
- Use this screen to view read only information including 802 1 mode channel id retry count and fcs error count also provided is the poll interval the poll interval field is configurable and is used for refreshing the screen 47
- Association list 48
- Chapter 5 monitor 48
- Figure 16 statistics 48
- Label description 48
- Nwa1000 series user s guide 48
- Statistics the following screen pops up 48
- Table 7 statistics 48
- The following table describes the labels in this screen 48
- View the wireless devices that are currently associated with the nwa in the association list screen association means that a wireless client for example your network or computer with a wireless network card has connected successfully to the ap or wireless router using the same ssid channel and security settings 48
- Channel usage 49
- Chapter 5 monitor 50
- Figure 18 channel usage 50
- Label description 50
- Nwa1000 series user s guide 50
- Table 9 channel usage 50
- The following table describes the labels in this screen 50
- Wait a moment while the nwa compiles the information 50
- Overview 51
- What you can do in this chapter 51
- Wireless lan 51
- Operating mode 52
- What you need to know 52
- Channel 53
- Mbssid 53
- Wireless mode 53
- Wireless security 53
- Note to guarantee 802 1n wireless speed please only use wpa2 or wpa2 psk security mode other security modes may degrade the wireless speed performance to 802 1g 54
- User authentication 54
- Encryption 55
- Passphrase 55
- Radius 55
- Wireless settings screen 56
- Root ap mode 57
- Chapter 6 wireless lan 58
- Label description 58
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 58
- Note repeater security is independent of the security settings between the nwa and any wireless clients 58
- Nwa1000 series user s guide 58
- Wireless settings root ap continued 58
- Chapter 6 wireless lan 59
- Label description 59
- Note you can only configure none or wpa2 psk security mode for the ssid used by a repeater connection 59
- Nwa1000 series user s guide 59
- Wireless settings root ap continued 59
- Chapter 6 wireless lan 60
- Label description 60
- Note you can set the nwa to use up to four mcs rates at a time 60
- Nwa1000 series user s guide 60
- Wireless settings root ap continued 60
- Repeater mode 61
- Chapter 6 wireless lan 62
- Label description 62
- Note repeater security is independent of the security settings between the nwa and any wireless clients 62
- Note you can only configure none or wpa2 psk security mode for the ssid used by a repeater connection 62
- Nwa1000 series user s guide 62
- Wireless settings repeater continued 62
- Chapter 6 wireless lan 63
- Label description 63
- Note you can set the nwa to use up to four mcs rates at a time 63
- Nwa1000 series user s guide 63
- Wireless settings repeater continued 63
- Wireless client mode 64
- Chapter 6 wireless lan 65
- Label description 65
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 65
- Nwa1000 series user s guide 65
- Wireless settings wireless client continued 65
- Chapter 6 wireless lan 66
- Label description 66
- Nwa1000 series user s guide 66
- Wireless settings wireless client continued 66
- Mbssid mode 67
- Chapter 6 wireless lan 68
- Label description 68
- Note if you are configuring the nwa from a computer connected to the wireless lan and you change the nwa s ssid or security settings you will lose your wireless connection when you press apply to confirm you must then change the wireless settings of your computer to match the nwa s new settings 68
- Nwa1000 series user s guide 68
- Wireless settings mbssid continued 68
- Chapter 6 wireless lan 69
- Label description 69
- Note you can set the nwa to use up to four mcs rates at a time 69
- Nwa1000 series user s guide 69
- Wireless settings mbssid continued 69
- Chapter 6 wireless lan 70
- Nwa1000 series user s guide 70
- Ssid screen 70
- Ssid to display the screen as shown 70
- The following table describes the labels in this screen 70
- Chapter 6 wireless lan 71
- Configuring ssid 71
- Figure 27 ssid edit 71
- Nwa1000 series user s guide 71
- Ssid screen click edit next to the ssid profile you want to configure to display the following screen 71
- Table 16 ssid edit 71
- The following table describes the labels in this screen 71
- Chapter 6 wireless lan 72
- Note when you configure an ssid profile s qos settings the nwa applies the same qos setting to all of the profile s traffic 72
- Nwa1000 series user s guide 72
- Table 16 ssid edit continued 72
- Use this screen to choose the security mode for your nwa 72
- Wireless security screen 72
- Note you must enable the same wireless security settings on the nwa and on all wireless clients that you want to associate with it 73
- Chapter 6 wireless lan 74
- Figure 30 security wep 74
- Label description 74
- Nwa1000 series user s guide 74
- Security wep 74
- Table 17 security wep 74
- The following table describes the labels in this screen 74
- Use this screen to use wep as the security mode for your nwa select wep in the security mode field to display the following screen 74
- Access point 75
- Chapter 6 wireless lan 75
- Figure 31 security wpa2 mix for access point 75
- Label description 75
- Nwa1000 series user s guide 75
- Security wpa2 wpa2 mix 75
- Table 17 security wep continued 75
- Table 18 security wpa2 mix for access point 75
- The following table describes the labels in this screen 75
- Use this screen to employ wpa2 as the security mode for your nwa that is in root ap mbssid or repeater operating mode select wpa2 or wpa2 mix in the security mode field to display the following screen 75
- Wireless settings screen 75
- Chapter 6 wireless lan 76
- Figure 32 security wpa2 for wireless client 76
- Label description 76
- Note if wireless station authentication is done using a radius server the reauthentication timer on the radius server has priority 76
- Nwa1000 series user s guide 76
- Table 18 security wpa2 mix for access point continued 76
- Table 19 security wpa2 for wireless client 76
- The following table describes the labels in this screen 76
- Use this screen to employ wpa2 as the security mode for your nwa that is in wireless client operating mode select wpa2 in the security mode field to display the following screen 76
- Wireless client 76
- Chapter 6 wireless lan 77
- Figure 33 security wpa2 psk or wpa2 psk mix 77
- If wireless station authentication is done using a radius server the reauthentication timer on the radius server has priority 77
- Label description 77
- Nwa1000 series user s guide 77
- Security wpa2 psk wpa2 psk mix 77
- Table 19 security wpa2 for wireless client continued 77
- Table 20 security wpa2 psk or wpa2 psk mix 77
- The following table describes the labels not previously discussed 77
- Use this screen to employ wpa2 psk or wpa2 psk mix as the security mode of your nwa select wpa2 psk or wpa2 psk mix in the security mode field to display the following screen 77
- Radius screen 78
- Chapter 6 wireless lan 79
- Label description 79
- Nwa1000 series user s guide 79
- Radius 79
- Select a profile you want to configure and click edit 79
- The following table describes the labels in this screen 79
- Chapter 6 wireless lan 80
- In the following example layer 2 isolation is enabled on the nwa to allow a guest wireless client a to access the main network router b the router provides access to the internet and the network printer c while preventing the client from accessing other computers and servers on the 80
- Label description 80
- Layer 2 isolation 80
- Layer 2 isolation is used to prevent wireless clients associated with your nwa from communicating with other wireless clients aps computers or routers in a network 80
- Nwa1000 series user s guide 80
- Radius continued 80
- Layer 2 isolation screen 81
- Note intra bss traffic blocking is activated when you enable layer 2 isolation 81
- Chapter 6 wireless lan 82
- Every ethernet device has a unique mac media access control address the mac address is assigned at the factory and consists of six pairs of hexadecimal characters for example 00 a0 c5 00 00 02 you need to know the mac address of each device to configure mac filtering on the nwa 82
- Label description 82
- Layer 2 isolation 82
- Mac filter screen 82
- Note you need to know the mac address of each wireless client ap computer or router that you want to allow to communicate with the nwa s wireless clients 82
- Nwa1000 series user s guide 82
- The following table describes the labels in this screen 82
- Additional wireless terms 84
- Chapter 6 wireless lan 84
- Label description 84
- Mac filter 84
- Nwa1000 series user s guide 84
- Table 24 additional wireless terms 84
- Technical reference 84
- Term description 84
- The following table describes the labels in this screen 84
- This section provides technical background information about the topics covered in this chapter refer to appendix e on page 178 for further readings on wireless lan 84
- Chapter 6 wireless lan 85
- Nwa1000 series user s guide 85
- On aps without wmm qos all traffic streams are given the same access priority to the wireless network if the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity then the new traffic stream reduces the throughput of the other traffic streams 85
- Table 25 wmm qos priorities 85
- Term description 85
- The following table describes the wmm qos priority levels that the nwa uses 85
- The nwa uses wmm qos to prioritize traffic streams according to the ieee 802 q or dscp information in each packet s header the nwa automatically determines the priority to use for an individual traffic stream this prevents reductions in data transmission for applications that are sensitive to latency and jitter variations in delay 85
- Wmm qos 85
- Wmm qos priorities 85
- Wmm qos prioritizes wireless traffic according to the delivery requirements of the individual and applications wmm qos is a part of the ieee 802 1e qos enhancement to certified wi fi wireless networks 85
- Wmm wi fi multimedia qos quality of service ensures quality of service in wireless networks it controls wlan transmission priority on packets to be transmitted over the wireless network 85
- Security mode guideline 86
- Lan and vlan 87
- Lan overview 87
- What you can do in the lan ip screen 87
- What you need to know 87
- Global address 88
- Ipv6 addressing 88
- Link local address 88
- Prefix and prefix length 88
- Ieee 802 q tag 89
- Introduction to vlans 89
- Vlan overview 89
- What you need to know 89
- Lan ip screen 90
- Chapter 7 lan and vlan 91
- Label description 91
- Nwa1000 series user s guide 91
- Table 27 lan ip continued 91
- Overview 92
- System 92
- What you can do in this chapter 92
- Telnet 93
- What you need to know 93
- Remote management limitations 94
- Snmp v3 and security 94
- Certificate 95
- Www screen 95
- Certificates screen 96
- Chapter 8 system 96
- Label description 96
- Nwa1000 series user s guide 96
- The following table describes the labels in this screen 96
- Use this screen to delete or import certificates 96
- Www the following screen shows 96
- Telnet screen 97
- Chapter 8 system 98
- Label description 98
- Nwa1000 series user s guide 98
- Telnet 98
- The following table describes the labels in this screen 98
- Snmp screen 99
- Chapter 8 system 100
- Label description 100
- Nwa1000 series user s guide 100
- The following table describes the labels in this screen 100
- Chapter 8 system 101
- Ftp screen 101
- Label description 101
- Nwa1000 series user s guide 101
- Snmp continued 101
- Use this screen to upload and download the nwa s firmware using ftp to use this feature your computer must have an ftp client 101
- Chapter 8 system 102
- Ftp the following screen displays 102
- Label description 102
- Managed devices in an smnp managed network contain object variables or managed objects that define each piece of information to be collected about a device examples of variables include such 102
- Nwa1000 series user s guide 102
- Technical reference 102
- The following table describes the labels in this screen 102
- This section provides some technical background information about the topics covered in this chapter 102
- Certification authorities 103
- Private public certificates 103
- Supported mibs 103
- Checking the fingerprint of a certificate on your computer 104
- Log settings 105
- Overview 105
- What you can do in this chapter 105
- Alerts and logs 106
- Enabling syslog logging 106
- Log settings screen 106
- Receiving logs via e mail 106
- What you need to know 106
- Chapter 9 log settings 108
- Label description 108
- Nwa1000 series user s guide 108
- Table 33 log settings continued 108
- Maintenance 109
- Overview 109
- What you can do in this chapter 109
- General screen 110
- What you need to know 110
- Chapter 10 maintenance 111
- Label descriptions 111
- Nwa1000 series user s guide 111
- Password 111
- Password screen 111
- Password the following screen displays 111
- The following table describes the labels in this screen 111
- Chapter 10 maintenance 112
- Label description 112
- Nwa1000 series user s guide 112
- The following table describes the labels in this screen 112
- Time screen 112
- Time the following screen displays 112
- Chapter 10 maintenance 113
- Firmware upgrade 113
- Firmware upgrade follow the instructions in this section to upload firmware to your nwa 113
- Firmware upgrade screen 113
- Label description 113
- Nwa1000 series user s guide 113
- Time continued 113
- Configuration file screen 114
- Do not turn off the nwa while firmware upload is in progress 114
- Backup configuration 115
- Do not turn off the nwa while configuration file upload is in progress 115
- Restore configuration 115
- Back to factory defaults 116
- Restart screen 116
- Power hardware connections and leds 117
- Troubleshooting 117
- I cannot see or access the login screen in the web configurator 118
- I forgot the ip address for the nwa 118
- I forgot the password 118
- Nwa access and login 118
- I can see the login screen but i cannot log in to the nwa 119
- I cannot access the internet through the nwa 119
- I cannot use ftp to upload new firmware 119
- Internet access 119
- I cannot access the internet anymore i had access to the internet with the nwa but my internet connection is not available anymore 120
- I cannot access the nwa or ping any computer from the wlan 120
- The internet connection is slow or intermittent 120
- Wireless lan 120
- Ppendi 122
- Setting up your computer s ip address 122
- Verifying settings 125
- Windows vista 126
- Note during this procedure click continue whenever windows displays a screen saying that it needs your permission to continue 127
- Verifying settings 129
- Windows 7 130
- Note during this procedure click continue whenever windows displays a screen saying that it needs your permission to continue 131
- Verifying settings 133
- Mac os x 10 and 10 134
- Mac os x 10 and 10 137
- Verifying settings 137
- Linux ubuntu 8 gnome 140
- Note make sure you are logged in as the root administrator 140
- Verifying settings 140
- Linux opensuse 10 kde 144
- Note make sure you are logged in as the root administrator 144
- Verifying settings 144
- Verifying settings 148
- Pop up windows javascript and java permissions 150
- Ppendi 150
- Enable pop up blockers with exceptions 151
- Javascript 153
- Java permissions 155
- Java sun 156
- Mozilla firefox 157
- Allowing pop ups 159
- Enabling java 159
- Ip addresses and subnetting 161
- Ppendi 161
- Subnet masks 162
- An ip address with host ids of all zeros is the ip address of the network 192 68 with a 24 bit subnet mask for example an ip address with host ids of all ones is the broadcast address for that network 192 68 55 with a 24 bit subnet mask for example 163
- Appendix c ip addresses and subnetting 163
- As these two ip addresses cannot be used for individual hosts calculate the maximum number of possible hosts in a network as follows 163
- Binary 163
- Decimal 1st octet 163
- For example 192 25 is equivalent to saying 192 with subnet mask 255 55 55 28 163
- Nd octet 163
- Network size 163
- Notation 163
- Nwa1000 series user s guide 163
- Rd octet 4th octet 163
- Since the mask is always a continuous number of ones beginning from the left followed by a continuous number of zeros for the remainder of the 32 bit mask you can simply specify the number of ones instead of writing the value of each octet this is usually specified by writing a followed by the number of bits in the mask after the address 163
- Subnet mask host id size maximum number of hosts 163
- Subnet masks are expressed in dotted decimal notation just like ip addresses the following examples show the binary and decimal notation for 8 bit 16 bit 24 bit and 29 bit subnet masks 163
- Subnet masks can be referred to by the size of the network number part the bits with a 1 value for example an 8 bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes 163
- Table 40 subnet masks 163
- Table 41 maximum host numbers 163
- The size of the network number determines the maximum number of possible hosts you can have on your network the larger the number of network number bits the smaller the number of remaining host id bits 163
- 2 or 254 possible hosts 164
- Appendix c ip addresses and subnetting 164
- Figure 87 subnetting example before subnetting 164
- In this example the company network address is 192 68 the first three octets of the address 192 68 are the network number and the remaining octet is the host id allowing a maximum of 164
- Last octet binary 164
- Last octet decimal 164
- Nwa1000 series user s guide 164
- Subnet mask alternative notation 164
- Subnetting 164
- Table 42 alternative subnet mask notation 164
- The borrowed host id bit can have a value of either 0 or 1 allowing two subnets 192 68 25 and 192 68 28 25 164
- The following figure shows the company network before subnetting 164
- The following table shows some possible subnet masks using both notations 164
- You can borrow one of the host id bits to divide the network 192 68 into two separate sub networks the subnet mask is now 25 bits 255 55 55 28 or 25 164
- You can use subnetting to divide one network into multiple sub networks in the following example a network administrator creates two sub networks to isolate a group of servers from the rest of the company network for security reasons 164
- Example four subnets 165
- Appendix c ip addresses and subnetting 166
- Example eight subnets 166
- Ip subnet mask network number last octet bit value 166
- Nwa1000 series user s guide 166
- Similarly use a 27 bit mask to create eight subnets 000 001 010 011 100 101 110 and 111 166
- Table 43 subnet 1 continued 166
- Table 44 subnet 2 166
- Table 45 subnet 3 166
- Table 46 subnet 4 166
- Appendix c ip addresses and subnetting 167
- Broadcast address 167
- No borrowed host bits subnet mask no subnets no hosts per subnet 167
- Nwa1000 series user s guide 167
- Subnet planning 167
- Subnet subnet address first address last address 167
- Table 47 eight subnets 167
- Table 48 24 bit network number subnet planning 167
- Table 49 16 bit network number subnet planning 167
- The following table is a summary for subnet planning on a network with a 16 bit network number 167
- The following table is a summary for subnet planning on a network with a 24 bit network number 167
- The following table shows ip address last octet values for each subnet 167
- Configuring ip addresses 168
- Private ip addresses 168
- Ppendi 169
- Global address 170
- Loopback address 170
- Multicast address 170
- Unspecified address 170
- Eui 64 171
- Interface id 171
- Stateless autoconfiguration 171
- Subnet masking 171
- Dhcp relay agent 172
- Dhcpv6 172
- Identity association 172
- Rebind 172
- Renew rebind 172
- Renew to s1 172
- Icmpv6 173
- Ipv6 cache 173
- Neighbor discovery protocol ndp 173
- Prefix delegation 173
- Mld messages 174
- Multicast listener discovery 174
- Example enabling dhcpv6 on windows xp 175
- Example enabling ipv6 on windows xp 2003 vista 175
- Example enabling ipv6 on windows 7 176
- Ppendi 178
- Wireless lans 178
- Channel 180
- Rts cts 180
- Note enabling the rts threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy 181
- Preamble type 181
- Note the wireless devices must use the same preamble mode in order to communicate 182
- Wireless lan standards 182
- Wireless security overview 182
- Ieee 802 x 183
- Note you must enable the same wireless security settings on the nwa and on all wireless clients that you want to associate with it 183
- Radius 183
- Eap md5 message digest algorithm 5 184
- Types of eap authentication 184
- Types of radius messages 184
- Dynamic wep key exchange 185
- Eap tls transport layer security 185
- Eap ttls tunneled transport layer service 185
- Note eap md5 cannot be used with dynamic wep key exchange 185
- Peap protected eap 185
- Appendix e wireless lans 186
- Eap md5 eap tls eap ttls peap leap 186
- Encryption 186
- For added security certificate based authentications eap tls eap ttls and peap use dynamic keys for data encryption they are often deployed in corporate environments but for public deployment a simple user name and password pair is more practical the following table is a comparison of the features of authentication types 186
- If both an ap and the wireless clients support wpa2 and you have an external radius server use wpa2 for stronger data encryption if you don t have an external radius server you should use wpa2 psk wpa2 pre shared key that only requires a single identical password entered into each access point wireless gateway and wireless client as long as the passwords match a wireless client will be granted access to a wlan 186
- Key differences between wpa2 and wep are improved data encryption and user authentication 186
- Nwa1000 series user s guide 186
- Select wep only when the ap and or wireless clients do not support wpa2 wep is less secure than wpa2 186
- Table 57 comparison of eap authentication types 186
- The radius server distributes a pairwise master key pmk key to the ap that then sets up a key hierarchy and management system using the pmk to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the ap and the wireless clients this all happens in the background automatically 186
- Tkip uses 128 bit keys that are dynamically generated and distributed by the authentication server aes advanced encryption standard is a block cipher that uses a 256 bit mathematical algorithm called rijndael they both include a per packet key mixing function a message integrity check mic named michael an extended initialization vector iv with sequencing rules and a re keying mechanism 186
- Wpa2 ieee 802 1i is a wireless security standard that defines stronger encryption authentication and key management 186
- Wpa2 regularly change and rotate the encryption keys so that the same encryption key is never used twice 186
- Wpa2 uses tkip when required for compatibility reasons but offers stronger encryption than tkip with advanced encryption standard aes in the counter mode with cipher block chaining message authentication code protocol ccmp 186
- User authentication 187
- Wireless client wpa2 supplicants 187
- Wpa2 with radius application example 187
- Wpa2 psk application example 188
- An antenna couples rf signals onto air a transmitter within a wireless device sends an rf signal to the antenna which propagates the signal through the air the antenna also operates in reverse by capturing rf signals from the air 189
- Antenna overview 189
- Appendix e wireless lans 189
- Authentication method key management protocol 189
- Encryptio n method 189
- Enter manual key ieee 802 x 189
- Figure 94 wpa2 psk authentication 189
- Nwa1000 series user s guide 189
- Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type mac address filters are not dependent on how you configure these security features 189
- Security parameters summary 189
- Table 58 wireless security relational matrix 189
- The ap and wireless clients use the tkip or aes encryption process the pmk and information exchanged in a handshake to create temporal encryption keys they use these keys to encrypt data exchanged between them 189
- Antenna characteristics 190
- Antenna gain 190
- Frequency 190
- Positioning antennas 190
- Radiation pattern 190
- Types of antennas for wlan 190
- Customer support 192
- Ppendi 192
- Austria 193
- Belarus 193
- Europe 193
- Malaysia 193
- Pakistan 193
- Philipines 193
- Singapore 193
- Taiwan 193
- Thailand 193
- Vietnam 193
- Belgium 194
- Bulgaria 194
- Denmark 194
- Estonia 194
- Finland 194
- France 194
- Germany 194
- Hungary 194
- Latvia 194
- Lithuania 195
- Netherlands 195
- Norway 195
- Poland 195
- Romania 195
- Russia 195
- Slovakia 195
- Sweden 195
- Switzerland 195
- Argentina 196
- Ecuador 196
- Latin america 196
- Middle east 196
- North america 196
- Turkey 196
- Ukraine 196
- Africa 197
- Australia 197
- Oceania 197
- South africa 197
- Legal information 198
- Ppendi 198
- Appendix g legal information 199
- Erp energy related products declaration of conformity 199
- Ic radiation exposure statement 199
- Notices 199
- Nwa1000 series user s guide 199
- Viewing certifications 199
- Zyxel limited warranty 199
- 注意 199
- Appendix g legal information 200
- Declaration of conformity with regard to eu directive 1999 5 ec r tte directive 200
- European union 200
- Nwa1000 series user s guide 200
- Open source licenses 200
- Registration 200
- Regulatory information 200
- Appendix g legal information 201
- National restrictions 201
- Nwa1000 series user s guide 201
- Appendix g legal information 202
- List of national codes 202
- Nwa1000 series user s guide 202
- Safety warnings 202
- Environmental product declaration 203
Похожие устройства
- Zyxel NWA1100-NH Инструкция по установке
- Zyxel NWA1100-NH Технические характеристики
- Zyxel NWA1300-NJ Инструкция по эксплуатации
- Zyxel NWA1300-NJ Технические характеристики
- HP pavilion x360 11-n051er, j1t48ea Инструкция по эксплуатации
- Zyxel NWA1300-NJ Инструкция по установке
- HP envy 15-k052sr, g7x79ea Инструкция по эксплуатации
- Zyxel NWA5560-N Инструкция по эксплуатации
- Zyxel NWA5560-N Технические характеристики
- HP pavilion 15-p004sr, g7w82ea Инструкция по эксплуатации
- Zyxel NWA3160-N Инструкция по эксплуатации
- Zyxel NWA3160-N Инструкция по установке
- Zyxel NWA3160-N Технические характеристики
- Zyxel NWA3160-N Справочник командного интерфейса
- HP pavilion 17-f009sr, g7y09ea Инструкция по эксплуатации
- Zyxel NWA3560-N Инструкция по эксплуатации
- Zyxel NWA3560-N Инструкция по установке
- Zyxel NWA3560-N Технические характеристики
- Zyxel NWA3560-N Справочник командного интерфейса
- Zyxel NWA3550-N Инструкция по эксплуатации
Скачать
Случайные обсуждения