NXC-8160 Business WLAN Controller User’s Guide Version 1.0 6/2007 Edition 1 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NXC-8160 using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. 1 " Warnings tell you about things that could harm you or your device. Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NXC-8160 wireless switch may be referred to as the “NXC-8160”, the “WLAN controller” or the “system” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons.
Safety Warnings Safety Warnings 1 For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings • Antenna Warning! This device meets ETSI and FCC certification requirements when using the included antenna(s). Only use the included antenna(s). • If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged. This product is recyclable. Dispose of it properly.
Safety Warnings 8 NXC-8160 User’s Guide
Contents Overview Contents Overview Introduction ............................................................................................................................ 21 Getting to Know Your NXC-8160 ............................................................................................... 23 Introducing the Web Configurator .............................................................................................. 27 Web Configurator ........................................................
Contents Overview 10 NXC-8160 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 4 Safety Warnings........................................................................................................................ 6 Contents Overview .......................................................
Table of Contents Chapter 3 LAN Screen.............................................................................................................................. 35 3.1 LAN and WAN ..................................................................................................................... 35 3.2 IP Address and Subnet Mask .............................................................................................. 35 3.2.1 Private IP Addresses ..................................................
Table of Contents Chapter 7 Access Points Screen ............................................................................................................ 67 Chapter 8 Maintenance Screen ............................................................................................................... 69 8.1 Maintenance Overview ........................................................................................................ 69 8.2 Configuring Syslog & Monitor ........................................
Table of Contents 14 NXC-8160 User’s Guide
List of Figures List of Figures Figure 1 Wireless Internet Access ......................................................................................................... 24 Figure 2 Backup NXC-8160 ................................................................................................................... 24 Figure 3 Front Panel ............................................................................................................................... 25 Figure 4 Status Screen .................
List of Figures Figure 39 Windows XP: Advanced TCP/IP Properties ........................................................................... 94 Figure 40 Windows XP: Internet Protocol (TCP/IP) Properties .............................................................. 95 Figure 41 Windows Vista: Start Menu ..................................................................................................... 96 Figure 42 Windows Vista: Control Panel ..............................................................
List of Figures Figure 82 RTS/CTS ............................................................................................................................. 130 Figure 83 WPA(2) with RADIUS Application Example ......................................................................... 137 Figure 84 WPA(2)-PSK Authentication .................................................................................................
List of Figures 18 [Document Title]
List of Tables List of Tables Table 1 Front Panel LEDs (Lights) ......................................................................................................... 26 Table 2 Title Bar: Web Configurator Icon ............................................................................................... 28 Table 3 Web Configurator Status Screen .............................................................................................. 29 Table 4 Screens Summary .....................................
List of Tables Table 39 24-bit Network Number Subnet Planning ...............................................................................115 Table 40 16-bit Network Number Subnet Planning ...............................................................................115 Table 41 IEEE 802.11g ........................................................................................................................ 131 Table 42 Wireless Security Levels ........................................................
P ART I Introduction Getting to Know Your NXC-8160 (23) Introducing the Web Configurator (27) 21
CHAPTER 1 Getting to Know Your NXC-8160 This chapter introduces the main features and applications of the NXC-8160. 1.1 NXC-8160 Overview The NXC-8160 is a WLAN controller that allows you to connect the NWA-8500 access points (APs) to extend your wireless network. The NXC-8160 centralizes the management of all of the connected APs. You can maintain the APs through the NXC-8160; thus eliminating the need to connect to and configure each AP individually. The AP acts as an antenna of the NXC8160.
Chapter 1 Getting to Know Your NXC-8160 Figure 1 Wireless Internet Access 1.2.2 Backup NXC-8160 To ensure wireless Internet access availability, deploy one NXC-8160 as the main WLAN controller and the other NXC-8160 as the backup. Both NXC-8160s should be in the same network and have the same number of connected access points and use the same wireless settings (such as SSID, channel, IEEE 802.11 mode and security).
Chapter 1 Getting to Know Your NXC-8160 1.3 Ways to Manage the NXC-8160 Use any of the following methods to manage the NXC-8160. • Web Configurator. This is recommended for everyday management of the NXC-8160 using a (supported) web browser. • Command Line Interface. Line commands are mostly used for troubleshooting by service engineers. • SNMP. The device can be monitored by an SNMP manager. See the SNMP chapter in this User’s Guide. 1.
Chapter 1 Getting to Know Your NXC-8160 The following table describes the lights on the NXC-8160. Table 1 Front Panel LEDs (Lights) LED COLOR POWER Green Red STATUS DESCRIPTION Off The NXC-8160 is turned off. On The NXC-8160 is ready and running. Flashing The NXC-8160 is restarting. On The power to the NXC-8160 is too low. Off The LAN is not connected. On The NXC-8160 has a successful LAN connection. Flashing The LAN is sending or receiving packets.
CHAPTER 2 Introducing the Web Configurator This chapter describes how to access the NXC-8160 web configurator and provides an overview of its screens. 2.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy NXC-8160 setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions. The recommended screen resolution is 1024 by 768 pixels.
Chapter 2 Introducing the Web Configurator Figure 4 Status Screen A B D C As illustrated above, the main screen is divided into these parts: • • • • A - title bar B - main window C - status bar D - navigation panel 2.3.1 Title Bar The title bar provides a icon in the upper right corner. The icon provide the following function. Table 2 Title Bar: Web Configurator Icon ICON DESCRIPTION About: Click this icon to open a screen where you can view the firmware version. 2.3.
Chapter 2 Introducing the Web Configurator Figure 5 Web Configurator Status Screen The following table describes the labels in this screen. Table 3 Web Configurator Status Screen LABEL DESCRIPTION Refresh Interval Select a number of seconds or None from the drop-down list box to update all screen statistics automatically at the end of every time interval or to not update the screen statistics. Refresh Now Click this button to update the status screen statistics immediately.
Chapter 2 Introducing the Web Configurator Table 3 Web Configurator Status Screen (continued) LABEL DESCRIPTION 802.11 Mode This shows the wireless standard (IEEE 802.11a, b or g) you configured for the radio (wireless transmissions of signals). If Radio 2 is disabled, this displays Inactive. Channel This shows the channel number you configured for the radio. SSIDs (vlan) This shows the SSID (Service Set IDentity) and the VLAN ID number (if configured) for the radio.
Chapter 2 Introducing the Web Configurator Figure 6 Web Configurator About Screen The following table describes the read-only fields in this screen. Table 5 Web Configurator About Screen LABEL DESCRIPTION ZyXELFS This field displays the firmware version number and the date created. AppsFS This field displays the firmware version number and the date created. RootFs This field displays the date and time when RootFs (used as a placeholder inside the firmware kernel) was built.
Chapter 2 Introducing the Web Configurator 32 NXC-8160 User’s Guide
P ART II Web Configurator LAN Screen (35) Wireless LAN (47) 33
CHAPTER 3 LAN Screen This chapter describes how to configure LAN settings. 3.1 LAN and WAN A network is a shared communication system to which many computers are attached. The Local Area Network (LAN) includes the computers and networking devices (such as the NXC-8160) in your home or office that you connect to a modem or router’s LAN ports. The Wide Area Network (WAN) is another network (most likely the Internet) that you connect to a modem or router. The LAN and the WAN are two separate networks.
Chapter 3 LAN Screen you are told otherwise. If you select 192.168.1.0 as the network number; it covers 254 individual addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other words, the first three numbers specify the network number while the last number identifies an individual computer on that network. Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.
Chapter 3 LAN Screen 3.3 VLAN A VLAN (Virtual Local Area Network) allows a physical network to be partitioned into multiple logical networks. Stations on a logical network can belong to more than one group. Only stations within the same group can talk to each other. With VLAN, a device cannot directly talk to or hear from devices that are not in the same group(s) unless such traffic first goes through a router.
Chapter 3 LAN Screen VLAN 201 Port 2, 4, 5 SSID x VLAN 301 Port 3, 4, 5 SSID y This way, the device connected to port 1 on switch A can configure the NXC-8160. Wireless clients connected to SSID x or y cannot manage the NXC-8160 itself, but they can communicate with port 2 or 3 on switch A and access the Internet. Wireless clients connected to SSID x cannot talk to wireless clients connected to SSID y.
Chapter 3 LAN Screen Figure 9 LAN The following table describes the labels in this screen. Table 6 LAN LABEL DESCRIPTION LAN You can pre-configure two LAN IP addresses, but only one is in use at a time. 192.168.1.10 is the default IP address. IP Address Type the IP address of your NXC-8160 in dotted decimal notation. IP Subnet Mask Enter the subnet mask that specifies the network number portion of an IP address.
Chapter 3 LAN Screen 40 NXC-8160 User’s Guide
CHAPTER 4 Centralized Configuration This chapter describes centralized configuration. 4.1 Introduction to Centralized Configuration Centralized configuration allows you to configure multiple WLAN controllers through one controller, called the master controller. The controllers must be able to communicate with one another.
Chapter 4 Centralized Configuration Unlike Telnet or FTP, which transmit data in plaintext (clear or unencrypted text), SSH is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network. In the following figure, computer A on the Internet uses SSH to securely connect to the NXC-8160 for a management session.
Chapter 4 Centralized Configuration 1 Host Identification The SSH client sends a connection request to the SSH server. The server identifies itself with a host key. The client encrypts a randomly generated session key with the host key and server key and sends the result back to the server. The client automatically saves any new server public keys. In subsequent connections, the server public key is checked against the saved version on the client computer.
Chapter 4 Centralized Configuration The following table describes the labels in this screen. Table 8 Centralized Configuration (Member) LABEL DESCRIPTION Master Controller Clear the check box to have the NXC-8160 act as a member. You can manage the member controllers through the master controller. Save Click Save to save your customized settings in this section.
Chapter 4 Centralized Configuration Table 9 Centralized Configuration (Master) LABEL DESCRIPTION Generate New SSH Keys Click the Save button next to Generate New SSH Keys to have the NXC-8160 create a SSH key which is to be used to identify the NXC-8160 for SSH connections. Retrieve Public SSH Key Click the Save button next to Retrieve Public SSH Key to download and save a public key on your computer, so that you can upload the key to a member.
Chapter 4 Centralized Configuration 46 NXC-8160 User’s Guide
CHAPTER 5 Wireless LAN This chapter discusses how to configure wireless LAN on the NXC-8160. 5.1 Wireless LAN Introduction A wireless LAN can be as simple as two computers with wireless LAN adapters communicating in a peer-to-peer network or as complex as a number of computers with wireless LAN adapters communicating through access points which bridge network traffic to the wired LAN. " See the WLAN appendix for more detailed information on WLANs.
Chapter 5 Wireless LAN In this wireless network, devices A and B are called wireless clients. The wireless clients use the access point (AP) which is connected to a WLAN controller to interact with other devices (such as the printer) or with the Internet. Your NXC-8160 is the WLAN controller. Every wireless network must follow these basic guidelines. • Every wireless client in the same wireless network must use the same SSID. The SSID is the name of the wireless network. It stands for Service Set IDentity.
Chapter 5 Wireless LAN Unauthorized devices can still see the information that is sent in the wireless network, even if they cannot use the wireless network. Furthermore, there are ways for unauthorized wireless users to get a valid user name and password. Then, they can use that user name and password to use the wireless network. Local user databases also have an additional limitation that is explained in the next section. 5.2.
Chapter 5 Wireless LAN Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every wireless client in the wireless network must have the same key. 5.2.4 Additional Installation Requirements for Using 802.1x • A computer with an IEEE 802.11 compatible wireless LAN card. • A computer equipped with a web browser (with JavaScript enabled) and/or Telnet. • A wireless station must be running IEEE 802.1x-compliant software.
Chapter 5 Wireless LAN Figure 16 WLAN NXC-8160 User’s Guide 51
Chapter 5 Wireless LAN The following table describes the labels in this screen. Table 11 WLAN LABEL DESCRIPTION Regulatory Domain Country/ Regulatory Domain Select the country where the NXC-8160 is located. WLAN Configuration The NXC-8160 supports two radios at the same time. That means you can have two separate wireless networks on the NXC-8160. They can be in the same or different 802.11 mode. Select the radio (Radio 1, Radio 2) you want to configure in this screen. Channel Options 802.
Chapter 5 Wireless LAN Table 11 WLAN (continued) LABEL DESCRIPTION 1 Mbps ~ 54 Mbps This is the data rate at which the NXC-8160 can transmit. Select Adapt to allow the NXC-8160 to switch between and send traffic to wireless clients at the specified rates after you select Enable Rate Adaption. If you select Disabled, the Adapt check box is grayed out and the rate will not be available for rate adaption even if you have selected it.
Chapter 5 Wireless LAN Figure 17 WLAN > SSID Table The following table describes the labels in this screen. Table 12 WLAN > SSID Table LABEL DESCRIPTION SSID Name This displays the SSIDs available on the NXC-8160. Enter a new descriptive name (up to 32 printable English keyboard characters) to replace an existing one. Save Click Save to save your customized settings. Cancel Click Cancel to exit this screen without saving. 5.
Chapter 5 Wireless LAN Figure 18 SSID & Security The following table describes the labels in this screen. Table 14 SSID & Security LABEL DESCRIPTION SSID Choose SSID Select an SSID for which you want to configure the wireless and wireless security settings. SSID Options Allow Default SSID Select Enable to allow a wireless client to connect to a service set on the NXC8160 even when the wireless client is trying to connect to “any” network.
Chapter 5 Wireless LAN Table 14 SSID & Security (continued) LABEL DESCRIPTION Allow Inter-Ess Forward An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This type of wireless LAN topology is called an Infrastructure WLAN. Select Enable to allow wireless clients using different SSIDs to communicate with each other. Traffic between them will not go through the NXC-8160.
Chapter 5 Wireless LAN Figure 19 SSID & Security: None The following table describes the wireless LAN security labels in this screen. Table 15 SSID & Security: None LABEL DESCRIPTION Security Mode Select None to allow wireless clients to communicate with the access points without any data encryption. 5.5.2 Static WEP Static WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the wireless clients must use the same WEP key to encrypt and decrypt data.
Chapter 5 Wireless LAN Figure 20 SSID & Security: WEP The following table describes the labels in this screen. Table 16 SSID & Security: WEP LABEL DESCRIPTION Security Mode Select WEP64 or WEP128 from the drop-down list. 58 WEP Keys WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized wireless stations from accessing data transmitted over the wireless network. Transmission Keys The WEP keys are used to encrypt data.
Chapter 5 Wireless LAN 5.5.3 Static WEP + IEEE 802.1x (LEAP) Select WEP64 & 802.1x (LEAP) or WEP128 & 802.1x (LEAP) in the Security Mode field to display the following screen. Figure 21 SSID & Security: Static WEP + IEEE 802.1x (LEAP) The following table describes the labels in this screen. Table 17 SSID & Security: Static WEP + IEEE 802.1x (LEAP) LABEL DESCRIPTION Security Mode Select WEP64 & 802.1x (LEAP) or WEP128 & 802.1x (LEAP) from the drop-down list.
Chapter 5 Wireless LAN Table 17 SSID & Security: Static WEP + IEEE 802.1x (LEAP) (continued) LABEL DESCRIPTION Transmission Keys The WEP keys are used to secure your data from eavesdropping by unauthorized wireless users. Both the NXC-8160 and the wireless clients must use the same WEP key for data transmission. You can configure up to four keys, but only one key can be activated at any one time. Select a WEP key to use for data encryption. The default key is key 1.
Chapter 5 Wireless LAN Figure 22 SSID & Security: WPA-PSK The following table describes the labels in this screen. Table 18 SSID & Security: WPA-PSK LABEL DESCRIPTION Security Mode Select WPA-PSK from the drop-down list. WPA WPA-PSK The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials. Select ASCII or HEX as the key input method and enter the key in the field provided.
Chapter 5 Wireless LAN Figure 23 SSID & Security: WPA The following table describes the labels in this screen. Table 19 SSID & Security: WPA LABEL DESCRIPTION Security Mode Select WPA from the drop-down list. WPA/RADIUS 62 Rekey Interval This is the rate at which the RADIUS server sends a new group key out to all clients. The re-keying process is the WPA equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a periodic basis.
CHAPTER 6 Advanced Screen This chapter describes how to configure switch redundancy and SNMP settings. 6.1 SNMP Simple Network Management Protocol is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your NXC-8160 supports SNMP agent functionality, which allows a manager station to manage and monitor the NXC-8160 through the network. The NXC-8160 supports SNMP version one (SNMPv1).
Chapter 6 Advanced Screen The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects. SNMP allows a manager and agents to communicate for the purpose of accessing these objects. SNMP itself is a simple request/response protocol based on the manager/agent model.
Chapter 6 Advanced Screen Figure 25 Advanced The following table describes the labels in this screen. Table 21 Advanced LABEL DESCRIPTION Redundancy Redundancy Status Select Enabled to turn on redundancy between a pair of NXC-8160s. You can deploy one NXC-8160 as the main controller and the other as the backup one. Otherwise, select Disabled.
Chapter 6 Advanced Screen Table 21 Advanced LABEL DESCRIPTION Save Click Save to save your customized settings in this section. Reset Click Reset to begin configuring this section of the screen afresh. SNMP 66 Enable Traps Select the check box to enable sending of SNMP traps to a station. Community Type the trap community, which is the password sent with each trap to the SNMP manager. The default is public and allows all requests.
CHAPTER 7 Access Points Screen Click Access Points to display the screen as shown. This screen allows you to view the status of the access points (APs) connected to the NXC-8160. You can also use this screen to set the NXC-8160 not to supply power to an AP. Figure 26 Access Points The following table describes the labels in this screen.
Chapter 7 Access Points Screen 68 NXC-8160 User’s Guide
CHAPTER 8 Maintenance Screen This chapter displays information on the maintenance screens. 8.1 Maintenance Overview The maintenance screens can help you view the configuration, upload new firmware, manage configuration, configure the NXC-8160’s time and restart your NXC-8160.
Chapter 8 Maintenance Screen The following table describes the labels in this screen. Table 23 Access Points LABEL DESCRIPTION Show Configuration Click the Configuration file link to display the NXC-8160’s currect configuration settings. You can right-click the link and select Save Target As... to back up your configuration to an XML file on your computer. The backup configuration file will be useful in case you need to return to your previous settings.
Chapter 8 Maintenance Screen Figure 28 Syslog & Monitor The following table describes the labels in this screen. Table 24 Syslog & Monitor LABEL DESCRIPTION Enable Syslog Select the check box to activate syslog logging. Syslog logging sends a system log to an external syslog server. Syslog Server IP Address Enter the server name or IP address of the syslog server. Syslog Interval (sec) Specify the time interval in seconds (from 1 to 99999) at which the NXC-8160 sends the system logs to the server.
Chapter 8 Maintenance Screen 72 NXC-8160 User’s Guide
CHAPTER 9 Password This chapter displays information on the password screen. 9.1 Configuring Password Click Password to open the following screen. Use this screen to change the NXC-8160’s management password. Figure 29 Password The following table describes the labels in this screen. Table 25 Password LABEL DESCRIPTION Select the user name (admin, operator, or root) you want to configure in this screen. To access the web configurator, use the admin user name.
Chapter 9 Password Table 25 Password 74 LABEL DESCRIPTION New Password Type your new system password (at least 5 alphanumeric characters). Note that as you type a password, the screen displays a (*) for each character you type. Retype to Confirm Type the new password again for confirmation. Apply Click Save to save your changes back to the NXC-8160. Reset Click Reset to begin configuring this screen afresh.
P ART III Troubleshooting and Specifications Troubleshooting (77) Product Specifications (81) 75
CHAPTER 10 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NXC-8160 Access and Login • Internet Access 10.1 Power, Hardware Connections, and LEDs V The NXC-8160 does not turn on. None of the LEDs turn on. 1 Make sure the NXC-8160 is turned on. 2 Make sure you are using the power cord included with the NXC-8160.
Chapter 10 Troubleshooting 10.2 NXC-8160 Access and Login V I forgot the LAN IP address for the NXC-8160. 1 The default LAN IP address is 192.168.1.10. 2 If this does not work or you changed the IP address and have forgotten it, you have to contact your vendor. V I forgot the password. 1 The default password is default. 2 If this does not work or you changed the password and have forgotten it, you have to contact your vendor. V I cannot see or access the Login screen in the web configurator.
Chapter 10 Troubleshooting • If you disconnect your computer from one device and connect it to another device that has the same IP address, your computer’s ARP (Address Resolution Protocol) table may contain an entry that maps the management IP address to the previous device’s MAC address. In Windows, use arp -d at the command prompt to delete all entries in your computer’s ARP table. V I can see the Login screen, but I cannot log in to the NXC-8160.
Chapter 10 Troubleshooting 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.5 on page 25. 2 Make sure the NXC-8160 is connected to a network that has Internet access. 3 Make sure the wireless and wireless security settings in the wireless client are the same as the settings in the NXC-8160. 4 Make sure the wireless adapter on the wireless client is working properly.
CHAPTER 11 Product Specifications The following tables summarize the NXC-8160’s hardware and firmware features. Table 26 Hardware Specifications Dimensions 430 (W) x 240 (D) x 45 (H) mm Weight 3 Kg Power Specification 100 - 240 VAC/2A max. Supply 15 W power to each WLAN port Ethernet Interface LAN One auto-negotiating, auto MDI/MDI-X 10/100 Mbps RJ-45 Ethernet port WLAN Eight 100 Mbps RJ-45 Fast Ethernet (IEEE 802.3u) ports which are compliant with the IEEE 802.
Chapter 11 Product Specifications Table 27 Firmware Specifications FEATURE DESCRIPTION Configuration Backup & Restoration Make a copy of the NXC-8160’s configuration. You can put it back on the NXC-8160 later if you decide to revert back to an earlier configuration. IP Multicast IP multicast is used to send traffic to a specific group of computers. The NXC-8160 supports versions 1 and 2 of IGMP (Internet Group Management Protocol) used to join multicast groups (see RFC 2236).
Chapter 11 Product Specifications Table 29 Ethernet Cable Pin Assignments WAN / LAN ETHERNET CABLE PIN LAYOUT 1 IRD + 1 OTD + 1 IRD + 1 IRD + 2 IRD - 2 OTD - 2 IRD - 2 IRD - 3 OTD + 3 IRD + 3 OTD + 3 OTD + 6 OTD - 6 IRD - 6 OTD - 6 OTD - NXC-8160 User’s Guide 83
Chapter 11 Product Specifications 84 NXC-8160 User’s Guide
P ART IV Appendices and Index " The appendices provide general information. Some details may not apply to your NXC-8160.
APPENDIX A Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP/Vista, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer. Windows 3.1 requires the purchase of a third-party TCP/IP application package.
Appendix A Setting up Your Computer’s IP Address Figure 31 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add. 2 Select Adapter and then click Add. 3 Select the manufacturer and model of your network adapter and then click OK.
Appendix A Setting up Your Computer’s IP Address Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically. • If you have a static IP address, select Specify an IP address and type your information into the IP Address and Subnet Mask fields. Figure 32 Windows 95/98/Me: TCP/IP Properties: IP Address 3 Click the DNS Configuration tab.
Appendix A Setting up Your Computer’s IP Address Figure 33 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add. 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your NXC-8160 and restart your computer when prompted.
Appendix A Setting up Your Computer’s IP Address Figure 34 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 35 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties.
Appendix A Setting up Your Computer’s IP Address Figure 36 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 37 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). • If you have a dynamic IP address click Obtain an IP address automatically.
Appendix A Setting up Your Computer’s IP Address Figure 38 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: • In the IP Settings tab, in IP addresses, click Add. • In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add.
Appendix A Setting up Your Computer’s IP Address Figure 39 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
Appendix A Setting up Your Computer’s IP Address Figure 40 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT). 11 Turn on your NXC-8160 and restart your computer (if prompted).
Appendix A Setting up Your Computer’s IP Address Figure 41 Windows Vista: Start Menu 2 In the Control Panel, double-click Network and Internet. Figure 42 Windows Vista: Control Panel 3 Click Network and Sharing Center. Figure 43 Windows Vista: Network And Internet 4 Click Manage network connections.
Appendix A Setting up Your Computer’s IP Address 5 Right-click Local Area Connection and then click Properties. " During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. Figure 45 Windows Vista: Network and Sharing Center 6 Select Internet Protocol Version 4 (TCP/IPv4) and click Properties.
Appendix A Setting up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens (the General tab). • If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced.
Appendix A Setting up Your Computer’s IP Address Figure 48 Windows Vista: Advanced TCP/IP Properties 9 In the Internet Protocol Version 4 (TCP/IPv4) Properties window, (the General tab): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
Appendix A Setting up Your Computer’s IP Address Figure 49 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 10 Click OK to close the Internet Protocol Version 4 (TCP/IPv4) Properties window. 11 Click Close to close the Local Area Connection Properties window. 12 Close the Network Connections window. 13 Turn on your NXC-8160 and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
Appendix A Setting up Your Computer’s IP Address Figure 50 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 51 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: • From the Configure box, select Manually.
Appendix A Setting up Your Computer’s IP Address • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your NXC-8160 in the Router address box. 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration. 7 Turn on your NXC-8160 and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the TCP/IP Control Panel window.
Appendix A Setting up Your Computer’s IP Address Figure 53 Macintosh OS X: Network 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your NXC-8160 in the Router address box. 5 Click Apply Now and close the window. 6 Turn on your NXC-8160 and restart your computer (if prompted).
Appendix A Setting up Your Computer’s IP Address " Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE. 1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network. Figure 54 Red Hat 9.0: KDE: Network Configuration: Devices 2 Double-click on the profile of the network card you wish to configure.
Appendix A Setting up Your Computer’s IP Address • If you have a dynamic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address, click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields. 3 Click OK to save the changes and close the Ethernet Device General screen. 4 If you know your DNS server IP address(es), click the DNS tab in the Network Configuration screen.
Appendix A Setting up Your Computer’s IP Address Figure 58 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp USERCTL=no PEERDNS=yes TYPE=Ethernet • If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask. The following example shows an example where the static IP address is 192.168.1.10 and the subnet mask is 255.255.255.0.
Appendix A Setting up Your Computer’s IP Address Verifying Settings Enter ifconfig in a terminal screen to check your TCP/IP properties. Figure 62 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.
Appendix A Setting up Your Computer’s IP Address 108 NXC-8160 User’s Guide
APPENDIX B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix B IP Addresses and Subnetting Figure 63 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation). The term “subnet” is short for “subnetwork”. A subnet mask has 32 bits.
Appendix B IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 31 Subnet Masks BINARY DECIMAL 1ST OCTET 2ND OCTET 3RD OCTET 4TH OCTET 8-bit mask 11111111 00000000 00000000 00000000 255.0.0.0 16-bit mask 11111111 11111111 00000000 00000000 255.255.0.0 24-bit mask 11111111 11111111 11111111 00000000 255.255.255.
Appendix B IP Addresses and Subnetting Table 33 Alternative Subnet Mask Notation (continued) SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.192 /26 1100 0000 192 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.252 /30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub-networks.
Appendix B IP Addresses and Subnetting Figure 65 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.128 is its broadcast address.
Appendix B IP Addresses and Subnetting Table 35 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.64 Lowest Host ID: 192.168.1.65 Broadcast Address: 192.168.1.127 Highest Host ID: 192.168.1.126 Table 36 Subnet 3 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1.
Appendix B IP Addresses and Subnetting Table 38 Eight Subnets (continued) SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 39 24-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.255.128 (/25) 2 126 2 255.
Appendix B IP Addresses and Subnetting Table 40 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
Appendix B IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix B IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
APPENDIX C Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). " Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 70 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 71 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 73 Internet Options: Security 2 3 4 5 6 122 Click the Custom Level... button. Scroll down to Scripting.
Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 74 Security Settings - Java Scripting Java Permissions 1 2 3 4 5 From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. Click OK to close the window.
Appendix C Pop-up Windows, JavaScripts and Java Permissions JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 77 Mozilla Firefox: Tools > Options Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScripts and Java Permissions 126 NXC-8160 User’s Guide
APPENDIX D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix D Wireless LANs Figure 80 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN. The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate neighborhood.
Appendix D Wireless LANs Figure 81 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a channel different from an adjacent AP (access point) to reduce interference. Interference occurs when radio signals from different access points overlap causing interference and degrading performance.
Appendix D Wireless LANs Figure 82 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations. RTS/CTS is designed to prevent collisions due to hidden nodes.
Appendix D Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver. Short and long refer to the length of the synchronization field in a packet.
Appendix D Wireless LANs Wireless security methods available on the NXC-8160 are data encryption, wireless client authentication, restricting access by device MAC address and hiding the NXC-8160 identity. The following figure shows the relative effectiveness of these wireless security methods available on your NXC-8160. Table 42 Wireless Security Levels SECURITY LEVEL SECURITY TYPE Least Secure Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.
Appendix D Wireless LANs Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server.
Appendix D Wireless LANs For EAP-TLS authentication type, you must first have a wired connection to the network and obtain the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs) can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client.
Appendix D Wireless LANs Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen.
Appendix D Wireless LANs Encryption Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA and WPA2 use Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server.
Appendix D Wireless LANs Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicant is the WPA patch for Windows XP, Funk Software's Odyssey client. The Windows XP patch is a free download that adds WPA capability to Windows XP's built-in "Zero Configuration" wireless client. However, you must run Windows XP to use it.
Appendix D Wireless LANs 3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over the network, but is derived from the PSK and the SSID. 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them.
Appendix D Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.
Appendix D Wireless LANs Positioning Antennas In general, antennas should be mounted as high as practically possible and free of obstructions. In point-to–point application, position both antennas at the same height and in a direct line of sight to each other to attain the best performance. For omni-directional antennas mounted on a table, desk, and so on, point the antenna up. For omni-directional antennas mounted on a wall or ceiling, point the antenna down.
APPENDIX E Legal Information Copyright Copyright © 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix E Legal Information If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: 1 Reorient or relocate the receiving antenna. 2 Increase the separation between the equipment and the receiver. 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Appendix E Legal Information Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
Appendix E Legal Information 144 NXC-8160 User’s Guide
Appendix F Customer Support APPENDIX F W E B : Customer Support Please have the following information ready when you contact customer support. Required Information • • • • Product model and serial number. Warranty Information. Date that you received your device. Brief description of the problem and the steps you took to solve it. “+” is the (prefix) number you dial to make an international telephone call. Corporate Headquarters (Worldwide) • • • • • • • Support E-mail: support@zyxel.com.
Appendix F Customer Support • Fax: +420-241-091-359 • Web: www.zyxel.cz • Regular Mail: ZyXEL Communications, Czech s.r.o., Modranská 621, 143 01 Praha 4 Modrany, Ceská Republika Denmark • • • • • • Support E-mail: support@zyxel.dk Sales E-mail: sales@zyxel.dk Telephone: +45-39-55-07-00 Fax: +45-39-55-07-07 Web: www.zyxel.dk Regular Mail: ZyXEL Communications A/S, Columbusvej, 2860 Soeborg, Denmark Finland • • • • • • Support E-mail: support@zyxel.fi Sales E-mail: sales@zyxel.
Appendix F Customer Support India • • • • • • Support E-mail: support@zyxel.in Sales E-mail: sales@zyxel.in Telephone: +91-11-30888144 to +91-11-30888153 Fax: +91-11-30888149, +91-11-26810715 Web: http://www.zyxel.in Regular Mail: India - ZyXEL Technology India Pvt Ltd., II-Floor, F2/9 Okhla Phase -1, New Delhi 110020, India Japan • • • • • • Support E-mail: support@zyxel.co.jp Sales E-mail: zyp@zyxel.co.jp Telephone: +81-3-6847-3700 Fax: +81-3-6847-3705 Web: www.zyxel.co.
Appendix F Customer Support • Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 928062001, U.S.A. Norway • • • • • • Support E-mail: support@zyxel.no Sales E-mail: sales@zyxel.no Telephone: +47-22-80-61-80 Fax: +47-22-80-61-81 Web: www.zyxel.no Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway Poland • • • • • E-mail: info@pl.zyxel.com Telephone: +48-22-333 8250 Fax: +48-22-333 8251 Web: www.pl.zyxel.com Regular Mail: ZyXEL Communications, ul.
Appendix F Customer Support Sweden • • • • • • Support E-mail: support@zyxel.se Sales E-mail: sales@zyxel.se Telephone: +46-31-744-7700 Fax: +46-31-744-7701 Web: www.zyxel.se Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden Thailand • • • • • • Support E-mail: support@zyxel.co.th Sales E-mail: sales@zyxel.co.th Telephone: +662-831-5315 Fax: +662-831-5395 Web: http://www.zyxel.co.th Regular Mail: ZyXEL Thailand Co., Ltd.
Appendix F Customer Support 150 NXC-8160 User’s Guide
Index Index A D About 30 Access point See also AP. access point 48 Advanced Encryption Standard See AES. AES 136 alternative subnet mask notation 111 antenna directional 139 gain 139 omni-directional 139 AP 48 See also access point.
Index See IANA 116 IP address private 36 L LAN 38 local (user) database 48 and encryption 49 M maintenance 69 Management Information Base. See MIB. managing the device good habits 25 using Telnet. See command interface. using the command interface. See command interface.
Index U user authentication 48 local (user) database 48 RADIUS server 48 weaknesses 49 Username Default 27 V wireless client supplicant 137 with RADIUS application example 137 WPA2 135 user authentication 136 vs WPA2-PSK 136 wireless client supplicant 137 with RADIUS application example 137 WPA2-Pre-Shared Key 135 WPA2-PSK 135, 136 application example 137 WPA-PSK 135, 136 application example 137 Virtual Local Area Network see VLAN VLAN 37 VLAN tagging 37 W warranty 143 note 143 web configurator 27 WEP
Index 154 NXC-8160 User’s Guide
Index NXC-8160 User’s Guide 155
Index 156 NXC-8160 User’s Guide
Index NXC-8160 User’s Guide 157
Index 158 NXC-8160 User’s Guide
Index NXC-8160 User’s Guide 159
Index 160 NXC-8160 User’s Guide