P-2812HNU(L)-Fx 802.11n Wireless VDSL2 VoIP Combo WAN IAD (Green Product) Support Notes March 2011 Edition 1.0 All contents copyright (c) 2011 ZyXEL Communications Corporation.
Content General Application Notes .............................................................................................5 Why use the P-2812HNU(L)-Fx?........................................................................5 Key Application Scenario................................................................................................8 Access Application Notes .............................................................................................11 Web GUI...............................
What can we do with the device? ..................................................................66 Does device support dynamic IP addressing? ................................................66 What is the difference between the internal IP and the real IP from my ISP? ...........................................................................................................................66 How does e-mail work through the device? ..................................................
How many Access Points are required in a given area? ................................76 What is Direct-Sequence Spread Spectrum Technology – (DSSS)? ..............76 What is Frequency-hopping Spread Spectrum Technology – (FHSS)? .........76 Do I need the same kind of antenna on both sides of a link?.......................77 What is the 2.4 Ghz Frequency range? ...........................................................77 What is Server Set ID (SSID)? .........................................................
General Application Notes This support note is applied for two different products types P-2812HNU-Fx and P-2812HNUL-Fx, the difference is P-2812HNUL-Fx supports lifeline. P-2812HNU(L)-Fx support note is applied to both P-2812HNU(L)-F1, and P-2812HNU(L)-F3 models. The differences between these two models are: F1 supports Annex A, and F3 supports Annex B. For F1, the DSL line connector is RJ-11, and for F3, the DSL line connector is RJ-45.
without having to change the CPE due to the different physical connection. Dual mode VDSL2/ADSL2+ functionality P-2812HNU(L)-Fx series supports dual-mode functionality that enables service providers to support ATM or PTM on the same device. It offers bi-directional high speed VDSL2, VDSL connection with speed of up to 100/45Mbps in PTM mode and 24/1Mbps ADSL2+, ADSL2 and ADSL connection in ATM mode.
Since PPPoE benefits both Telco’s and ISPs, the P-2812HNU(L)-Fx implements this feature and has tested it thoroughly with PPPoE servers. NAT NAT provides system administrators with an easy solution to create a private IP network for security and IP management. Powered by NAT technology, the P-2812HNU(L)-Fx supports complete NAT mapping and most popular Internet multimedia applications, such as NetMeeting, MSN Messenger, Skype, ICQ, IPTV, QuickTime, Real Player (RSP/RTSP), VoIP SIP ALG, etc.
Key Application Scenario Multi-Service application Scenario The ZyXEL device provides shared Internet Access by connecting the DSL port to the DSL or Modem jack on a splitter or your telephone jack. The P-2812HNU(L)-Fx serves as a home gateway, providing high speed Internet service, VoIP and High Quality IPTV service. All contents copyright (c) 2011 ZyXEL Communications Corporation.
Internet Connection A typical Internet access application of the P-2812HNU(L)-Fx is shown below. For a small office, some components need to be checked before accessing the Internet. Before we begin. The device is shipped with the following factory defaults: 1. IP address = 192.168.1.1, subnet mask = 255.255.255.0 (24 bits). 2. DHCP server enabled with IP pool starting from 192.168.1.33. 3. Default user’s username/password = user/1234. Setting up the PC (Windows OS). 1.
In the Select Network Protocol windows, select Microsoft from the list of manufacturers, then select TCP/IP from the Network Protocols and click OK. 3. TCP/IP Configuration Follow these steps to configure Windows TCP/IP: In the Control Panel/Network window, click the TCP/IP entry to select it and click Properties button. In the TCP/IP Properties window, select obtain an IP address automatically.
Access Application Notes Web GUI The following procedure describes the most typical operation of the device using a browser. The device features an embedded Web server that allows you to use Web browser to configure it. Please make sure there is no Telnet or Console login session before configuring the router using a browser. - Accessing the Prestige Web Please enter the LAN IP address of the Prestige router in the URL location to retrieve the web screen from the device.
3G Backup connection 1. Go to Network Setting> Broadband > 3G Backup. 2. Select the check box Enable 3G Backup. All contents copyright (c) 2011 ZyXEL Communications Corporation.
3. Card Description will show what dongle model is plugged into P-2812HNU(L)-Fx Series . 4. If P-2812HNU(L)-Fx Series supports that dongle, 3G status will read Enable. 5. Fill in the PIN number. 6. Enter the APN string or number. All contents copyright (c) 2011 ZyXEL Communications Corporation.
Application Scenario The following example demonstrates a Triple Play service configuration running Data, VoIP and IPTV. The step by step guide beneath the following scenario illustration will take you through the setup of the WAN Interface, NAT Port forwarding (using FTP service to demonstrate Data service), VoIP configuration (to demonstrate VoIP service), Quality of Service and WLAN setting (to demonstrate WPS setup).
1. Go to Networking Setting > Broadband and select Broadband tag. 2. Change the WAN switch mode to type: ADSL, then click Switch WAN Interface. The system would require rebooting. 3. After restarted, go to Networking Setting > Broadband and select Broadband tag again. 4. Click “Add new WAN Interface” button to create the data WAN interface. 5. In Add New Interface, give this interface a name (e.g. IPTV) and select the ADSL interface Type. 6. Set interface Mode to Routing. 7.
10. Set IP Address to “Obtain an IP Address Automatically”. 11. Enable all Routing Features: select NAT Enable, IGMP Proxy Enable and Apply as Default Gateway. 12. For DNS Server setting, choose “Obtain DNS info Automatically”. 13. Click Apply. 14. Please repeat steps 1–13 to create the second data WAN interface for VoIP, named “VoIP”. Set VCI to 34 and select “CBR” and set cell rate “170” this time. All contents copyright (c) 2011 ZyXEL Communications Corporation.
After completion, you will see two new WAN interfaces as shown in the following screenshot. All contents copyright (c) 2011 ZyXEL Communications Corporation.
IP Multicast Introduction What is the IP Multicast? Traditionally, the IP packets are transmitted in two ways: unicast or broadcast. Multicast is a third way to deliver the IP packets to a group of hosts. Host groups are identified by the class D IP addresses, i.e., those with "1110" as their higher-order bits. In dotted decimal notation, host group addresses range from 224.0.0.0 to 239.255.255.255. Among them, 224.0.0.1 is assigned to the permanent IP hosts group, and 224.0.0.
NAT Introduction What is NAT? NAT (Network Address Translation-NAT RFC 1631) is the translation of an Internet Protocol address used within one network to a different IP address known within another network. One network is designated as the inside network and the other is the outside. Typically, a company maps its local inside network addresses to one or more global outside IP addresses and "unmaps" the global IP addresses on the incoming packets back into local IP addresses.
Data Service FTP Downloading Scenario Topology NAT provides system administrators with an easy solution to create a private IP network for security and IP management. Powered by NAT technology, the P-2812HNU(L)-Fx supports complete NAT mapping and most popular Internet multimedia applications. This feature is best demonstrated with the NAT port forwarding feature implemented in the CPE.
Port Forwarding Configuration a. Create a port forwarding rule for the FTP server. 1. Go to Network Setting> NAT > Port Forwarding and click “add new rule”. 2. Select the Service Name, e.g. “FTP”. 3. Select the WAN Interface, e.g. “EtherWAN1”. 4. Enter the Server IP Address, e.g. “192.168.1.33”. 5. Click Apply. All contents copyright (c) 2011 ZyXEL Communications Corporation.
VoIP Configuration Setting up an SIP Account The VoIP technology sends voice signals over the Internet Protocol. This allows users to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network. The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol that handles setting up, altering and tearing down of voice and multimedia sessions over the Internet.
2. Click on the “SIP Account” tab to configure the SIP account. 3. Click Edit icon for “SIP1” and configure the SIP account. 4. Fill in the SIP number and the account username and password. Leave the Advanced setting unchanged. All contents copyright (c) 2011 ZyXEL Communications Corporation.
After the SIP account is properly configured, the P-2812HNU(L)-Fx will automatically register the configured SIP account with assigned SIP server. If it does not, you can go to the Status page, scroll down to the SIP account status section, and click “Register” to register the SIP account manually. Or you can also click “Unregister” to unregister the SIP account manually. All contents copyright (c) 2011 ZyXEL Communications Corporation.
FXO Lifeline Application Notes This FXO Lifeline application notes section is for P-2812HNUL-Fx only. Here we use P-2812HNUL-F1 as example Usage of FXO Lifeline By using the FXO lifeline function, you can make and receive regular FXO phone calls in coexistence with the VoIP service on the same phone set.
Lifeline configuration To configure the lifeline in P-2812HNUL-Fx, click on FXO Line to display the following screen. You can specify a prefix number in the prefix field. This number will be used to switch from VoIP to the FXO system when you wish to make a call to an FXO destination. For example, when you want to dial out to an FXO destination, you would first pick up the phone, and when you hear a dial tone, you would push in the prefix number as defined in the prefix field.
File Sharing This feature allows sharing files on a USB memory stick or hard drive connected to the P-2812HNU(L)-Fx with other users on the network. The topology shown below allows PC A, B & C to access files on the USB Hard drive. P-2812HNU(L)-Fx 1. Plug a Flash disk into the USB port. 2. Go to Network Setting > Home Networking. 3. Select “Enable” of File Sharing Service(SMB) function. 4. Set the Workgroup name (e.g. Workgroup) 5. Select the Folder for sharing. 6. Click on “Apply”.
7. Go to Network, you can find “Router” is in your group. 8. Simply click “Router”, the contents of the USB hard drive will be displayed. All contents copyright (c) 2011 ZyXEL Communications Corporation.
9. Set security level for shared folder. Go to Network Setting > Home Networking. Click “Add New User” to create file sharing users. 10. Input the user name and password, then click “Apply”. All contents copyright (c) 2011 ZyXEL Communications Corporation.
11. Click the “Edit” icon of the shared folder. 12. Set Access Level to “Security” and move the user account which allowed to access to “Allow Users” box, then “Apply” All contents copyright (c) 2011 ZyXEL Communications Corporation.
13. Then the system would need authentication to access the shared folder. All contents copyright (c) 2011 ZyXEL Communications Corporation.
Media Server Feature Using the media server feature to play media files on a the PC, this section shows you how the media server feature works with the Windows Media Player in windows 7 (if user do not have media player as User Guide suggested) to play music or video from USB disk and NSA-210 which is connecting to the LAN port. P-2812HUN(L)-Fx 1. Go to Network Setting > Home Networking > Media Server. 2. Click on “Enable Media Server”. All contents copyright (c) 2011 ZyXEL Communications Corporation.
3. Run Windows Media Player on PC and go to Organize > Manage libraries > Videos, then click “Add” to add folders to Videos. 4. Select the folder on the shared USB disk that you would like to add to the Videos list, then click “Include folder” and “OK”. All contents copyright (c) 2011 ZyXEL Communications Corporation.
5. Click “Videos” on Windows Media Player, Media Player would search the video files and add to the video library automatically. All contents copyright (c) 2011 ZyXEL Communications Corporation.
6. All the videos on the library are able to play remotely. You can also play the media contents in the NAS210 as well following the same steps. All contents copyright (c) 2011 ZyXEL Communications Corporation.
QoS Support Introduction of QoS Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and to the networking methods used to control the use of bandwidth. QoS allows the ZyXEL Device to group and prioritize application traffic and fine-tune network performance. Without QoS, all traffic data is equally likely to be dropped when the network is congested.
2. Click on “Queue Setup”. 3. You can “Add new Queue” or “Edit” the Queues displayed in the screenshot. The Priority and Weight can be adjusted 4. You can add new Queues for VoIP and IPTV. Click “Add new Queue”, active the new queue, named “VoIP”, set priority as 7 and weight as 15. 5. Again, Click “Add new Queue”, active the new queue, named “Dat_IPTV”, set priority as 5 and weight as 10 All contents copyright (c) 2011 ZyXEL Communications Corporation.
6. Click on the “Class Setup” tab to set up QoS Classifiers 7. Configure the first Class rule for VoIP. Select “VoIP” in “To Queue:” and input a name for it. E.g. “VoIP_test” as follows: 8. Enable the From Interface and set to “Local”, and Ether Type criteria and set them accordingly. 9. Set the Destination IP address to the SIP server’s IP address. All contents copyright (c) 2011 ZyXEL Communications Corporation.
10. Click “Apply”. Now we have completed the Class rule for VoIP service, and the next step is to configure the second class rule for the Data_IPTV service. 11. Click “Add new Classifier” to add the second class rule. 12. Configure the second Class rule as follows: All contents copyright (c) 2011 ZyXEL Communications Corporation.
13. Enable the “From Interface” criteria and set it to “LAN” and Select “Data_IPTV” in “To Queue:”. Then click “Apply”. 14. To make sure the Class rules are correctly configured, you can go to Network Setting > QoS > Monitor. 5. Select 5 sec as the refresh interval time, and monitor the ZyXEL device’s QoS packet statistics. All contents copyright (c) 2011 ZyXEL Communications Corporation.
Wireless Application Notes Wireless Introduction WEP Configuration (Wired Equivalent Privacy) Introduction The 802.11 standard describes the communication that occurs in the wireless LANs. The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from eavesdropping, because the wireless transmissions are easier to intercept than transmissions over wired networks, and wireless is a shared medium.
The WEP has defenses against this attack. To avoid encrypting two cipher texts with the same key stream, an Initialization Vector (IV) is used to augment the shared WEP key (secret key) and produce a different RC4 key for each packet. The IV is also included in the package. The WEP keys (secret key) are available in two types, 64-bits and 128-bits. Many times you will see them referenced as 40-bits and 104-bits instead.
Setting up the Access Point Most access points and clients have the ability to hold up to the 4 WEP keys simultaneously. You need to specify one of the 4 keys as default Key for data encryption. To set up the Access Point, you will need to set one of the following parameters: o 64-bit WEP key (secret key) with 5 characters. o 64-bit WEP key (secret key) with 10 hexadecimal digits. o 128-bit WEP key (secret key) with 13 characters. 128-bit WEP key (secret key) with 26 hexadecimal digits. o IEEE 802.
point-to-point connection characteristics, and of preventing access to that port in case of the failure of authentication process. The IEEE 802.1x authentication is a client-server architecture delivered with the EAPOL (Extensible Authentication Protocol over LAN). The authentication server authenticates each client connected to an Access Point (for Wireless LAN) or switch port (for Ethernet) before accessing any services offered by the Wireless AP. The 802.1x contains tree major components: 1.
The station (i.e. Wireless client) is being authenticated by an authenticator attached on the Wireless network. The supplicant requests access to the LAN services and responds to the requests from the authenticator. The station must be running the 802.1x-compliant client software, such as that offered in the Microsoft Windows XP operating system, Meeting House AEGIS 802.1x client and Odyssey 802.1x client. 3. Authentication Server: The device (i.e.
When the 802.1x is enabled, the authenticator controls the port authorization state by using the following control parameters. The following three authentication control parameters are applied in the Wireless AP. 1. Force Authorized: Disables the 802.1x and causes the port to transit to the authorized state without any authentication exchange required. The port transmits and receives the normal traffic without the 802.1x-based authentication of client. This is the default port control setting.
the authenticator by using the client’s MAC address. While the AP is setup as Auto, only the Wireless client supporting the 802.1x client can access the network. Re-Authentication The administrator can enable the periodic 802.1x client re-authentication and specify how often it occurs. When the re-authentication is time out, the authenticator will send the EAP-Request/Identity to reinitiate authentication process. In the ZyXEL Wireless AP 802.
supports the MD-5 challenge authentication mechanism, but will support the TLS and TTLS in the future. EAPOL Exchange between 802.1x Authenticator and Supplicant The authenticator or supplicant can initiate the authentication. If you enable the 802.1x authentication on the Wireless AP, the authenticator must initiate authentication, when it determines that the Wireless link state transits from down to up. It then sends an EAP-request/identity frame to the 802.1x client to request its identity.
The EAPOL packet contains the following fields: protocol version, packet type, packet body length, and packet body. Most of the fields are obvious. The packet type can have four different values and these values are described as followed: All contents copyright (c) 2011 ZyXEL Communications Corporation.
EAP-Packet: Both the supplicant and authenticator send this packet, when the authentication is taking place. This is the packet that contains either the MD5-Challenge or TLS information required for authentication. EAPOL-Start: This supplicant sends this packet, when it wants to initiate the authentication process. EAPOL-Logoff: The supplicant sends this packet, when it wants to terminate its 802.1x session. EAPOL-Key: This is used for the TLS authentication method.
National Institute of Standards and Technology (NIST) which security is a higher level then WPA, cause it brings AES-base algorithm and Cipher Block Chaining Message Authentication Code Protocol (CCMP) in it and offers stronger encryption then WPA uses (TKIP). WPA2 encryption keys that are used for each client on the network are unique and specific to that client. Eventually, each packet which is sent over the air is encrypted with a unique key.
View all the available wireless networks on your notebook (802.11bg wireless NIC required): All contents copyright (c) 2011 ZyXEL Communications Corporation.
Enter the WPA-PSK pre-shared key. We can see that the notebook is now connected to the WLAN interface of the P-2812HNU(L)-Fx. b. Wireless Setup Hiding the SSID. 1. Go to Network Setting > Wireless LAN > General. 2. Check the Enable Wireless LAN box. 3. Enter the Wireless Network Name (SSID), e.g. “TEST_01”. 4. Check the Hide SSID box All contents copyright (c) 2011 ZyXEL Communications Corporation.
5. Select the Security Mode, e.g. “WPA2-PSK”. 6. Enter the Pre-Shared Key, e.g. “RKW7ENKNM49VW ”. 7. Click Apply. View all the available wireless networks on your notebook: As we can see, we cannot find the SSID “TEST_01”. To connect to “TEST_01”, we need to configure the “Wireless Network Connection Properties” of the notebook WLAN interface: All contents copyright (c) 2011 ZyXEL Communications Corporation.
Go to the “Connection” tab and check “Connect when this network is in range” checkbox. We can then see the notebook connected to the “TEST_01”, even though the SSID is not displayed in the broadcast network list. All contents copyright (c) 2011 ZyXEL Communications Corporation.
All contents copyright (c) 2011 ZyXEL Communications Corporation.
WPS Application Notes What is WPS? Wi-Fi Protected Setup (WPS) is a standard created by the Wi-Fi Alliance for easy and secure establishment of a wireless home/office network. The goal of the WPS protocol is to simplify the process for configuring the security of the wireless network, and thus calling the name Wi-Fi Protected Setup. There are several different methods defined in WPS to simplify the process of configuration.
Note: You must press the other wireless device’s WPS button within 2 minutes of pressing this button. All contents copyright (c) 2011 ZyXEL Communications Corporation.
Maintenance Log Internal Maintenance The P-2812HNU(L)-Fx has the ability to record the events occurring in the CPE in a system log (according to the severity) and maintain this log in itself. At this point, the P-2812HNU(L)-Fx only can logs VoIP service events. a. Activate the Maintenance Log. 1. Go to Maintenance > Log setting. 2. Select “Enable” for Syslog Logging. 3. Insert the parameters, for example the syslog server address. 4. Select the logging conditions according to user’s needs. 5.
b. View the log in the Web GUI. 1. Go to System Monitor > Log. All contents copyright (c) 2011 ZyXEL Communications Corporation.
Maintenance Tools Maintenance Procedure a. Upgrading Firmware. 1. Go to Maintenance > Firmware Upgrade. 2. Click “Browse”. 3. Select the Firmware to upload and click “Open”. 4. Click “Upload”. All contents copyright (c) 2011 ZyXEL Communications Corporation.
b. Backing-up the Configuration. 1. Go to Maintenance > Backup/Restore. 2. Click “Backup”. 3. Click “Save”. 4. Select the directory to save and click “Save”. All contents copyright (c) 2011 ZyXEL Communications Corporation.
c. Upload Configuration. 1. Go to Maintenance > Tools > Configuration. 2. Click “Browse”. 3. Select the configuration file to upload and click Open. All contents copyright (c) 2011 ZyXEL Communications Corporation.
Product FAQ Will the device work with my Internet connection? P-2812HNU(L)-Fx is designed to be compatible with major ISPs utilize ADSL as a broadband service. P-2812HNU(L)-Fx offers Ethernet ports to connect to your computer so the device is placed in the line between the computer and your ISP. If your ISP supports PPPoE you can also use the device, because PPPoE is supported in the device.
Does the device support PPPoE? Yes. The device supports PPPoE. How do I know I am using PPPoE? PPPoE requires a user account to login to the provider's server. If you need to configure a user name and password on your computer to connect to the ISP you are probably using PPPoE. If you are simply connected to the Internet when you turn on your computer, you probably are not. You can also check your ISP or the information sheet given by the ISP.
What can we do with the device? Browse the World Wide Web (WWW), send and receive individual e-mail, and download software. These are just a few of many benefits you can enjoy when you put the whole office on-line with the device. Does device support dynamic IP addressing? The device supports either a static or dynamic IP address from ISP. What is the difference between the internal IP and the real IP from my ISP? Internal IPs is sometimes referred to as virtual IPs.
Suppose your company's e-mail address is mycompany@ispname.com. Jane and John will be able to send "jane" e-mail and through the device using "john" respectively as their e-mail addresses. Again, they will be able to retrieve their individual private and secured e-mail, if they have been assigned the proper access right.
How does the device support TFTP? In addition to the direct console port connection, the device supports the uploading/download of the firmware and configuration file using TFTP (Trivial File Transfer Protocol) over LAN. Can the device support TFTP over WAN? Although TFTP should work over WAN as well, it is not recommended because of the potential data corruption problems. When do I need NAT? a.
What is DDNS? The Dynamic DNS service allows you to alias a dynamic IP address to a static hostname, allowing your computer to be more easily accessed from various locations on the Internet. To use the service, you must first apply an account from several free Web servers such as WWW.DYNDNS.ORG. Without DDNS, we always tell the users to use the WAN IP of the P-2812HNU(L)-Fx to reach our internal server. It is inconvenient for the users if this IP is dynamic.
Wireless FAQ What is a Wireless LAN? Wireless LANs provide all the functionality of wired LANs, without the need for physical connections (wires). Data is modulated onto a radio frequency carrier and transmitted through the ether. Typical bit-rates are 11Mbps and 54Mbps, although in practice data throughput is half of this. Wireless LANs can be formed simply by equipping PC's with wireless NICs. If connectivity to a wired LAN is required an Access Point (AP) is used as a bridging device.
of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure networks of thousands of users that enable roaming over a broad area. What are the disadvantages of Wireless LANs? The speed of Wireless LAN is still relative slower than wired LAN. The most popular wired LAN is operated in 100Mbps, which is almost 10 times of that of Wireless LAN (10Mbps).
The IEEE 802.11 is a wireless LAN industry standard, and the objective of IEEE 802.11 is to make sure that different manufactures' wireless LAN devices can communicate to each other.802.11 provides 1 or 2 Mbps transmission in the 2.4 GHz ISM band using either FHSS or DSSS. What is 802.11b? 802.11b is the first revision of 802.11 standard allowing data rates up to 11Mbps in the 2.4GHz ISM band. Also known as 802.11 High-Rate and Wi-Fi. 802.11b only uses DSSS, the maximum speed of 11Mbps has fallbacks to 5.
What is 802.11g? 802.11g is an extension to 802.11b. 802.11g increases 802.11b's data rates to 54 Mbps and still utilize the 2.4 GHz ISM. Modulation is based upon OFDM (orthogonal frequency division multiplexing) technology. An 802.11b radio card will interface directly with an 802.11g access point (and vice versa) at 11 Mbps or lower depending on range. The range at 54 Mbps is less than for 802.11b operating at 11 Mbps. What is 802.11n? 802.11n supports frequency in both 2.
Wi-Fi certified, and that means that it will work (interoperate) with any brand of Access Point that is also Wi-Fi certified. What types of devices use the 2.4GHz Band? Various spread spectrum radio communication applications use the 2.4 GHz band. This includes WLAN systems (not necessarily of the type IEEE 802.
What are potential factors that may causes interference among WLAN products? Factors of interference: 1. Obstacles: walls, ceilings, furniture… etc. 2. Building Materials: metal door, aluminum studs. 3. Electrical devices: microwaves, monitors, electric motors. Solution: 1. Minimizing the number of walls and ceilings 2. Antenna is positioned for best reception 3. Keep WLAN products away from electrical devices, e.g.: microwaves, monitors, electric motors… etc. 4. Add additional APs if necessary.
What is Infrastructure mode? Infrastructure mode implies connectivity to a wired communications infrastructure. If such connectivity is required the Access Points must be used to connect to the wired LAN backbone. Wireless clients have their configurations set for "infrastructure mode" in order to utilize access points relaying. How many Access Points are required in a given area? This depends on the surrounding terrain, the diameter of the client population, and the number of clients.
their hopping sequences synchronized to create the effect of a single "logical channel". To an unsynchronized receiver an FHSS transmission appears to be short-duration impulse noise. 802.11 may use FHSS or DSSS. Do I need the same kind of antenna on both sides of a link? No. Provided the antenna is optimally designed for 2.4GHz or 5GHz operation. WLAN NICs often include an internal antenna which may provide sufficient reception. What is the 2.
ESSID stands for Extended Service Set Identifier and identifies the wireless LAN. The ESSID of the mobile device must match the ESSID of the AP to communicate with the AP. The ESSID is a 32-character maximum string and is case-sensitive. How do I secure the data across an Access Point's radio link? Enable Wired Equivalency Protocol (WEP) or Wi-Fi Protected Access (WPA) to encrypt the payload of packets sent across a radio link. What is WEP? Wired Equivalent Privacy.
What is a WEP key? A WEP key is a user defined string of characters used to encrypt and decrypt data. A WEP key is a user defined string of characters used to encrypt and decrypt data? 128-bit WEP will not communicate with 64-bit WEP or 256-bit WEP Although 128 bit WEP also uses a 24 bit Initialization Vector, but it uses a 104 bit as secret key. Users need to use the same encryption level in order to make a connection. Can the SSID be encrypted? WEP, the encryption standard for 802.
What are Insertion Attacks? The insertion attacks are based on placing unauthorized devices on the wireless network without going through a security process and review. What is Wireless Sniffer? An attacker can sniff and capture legitimate traffic. Many of the sniffer tools for Ethernet are based on capturing the first part of the connection session, where the data would typically include the username and password. An intruder can masquerade as that user by using this captured information.
Electronics Engineers) standard, which specifies a standard mechanism for authenticating, at the link layer (Layer 2), users' access to IEEE 802 networks such as Ethernet (IEEE 802.3) and Wireless LAN (IEEE 802.11). For IEEE 802.11 WLAN, IEEE 802.1x authentication can be based on username/password or digital certificate. What is the difference between No authentication required, No access allowed and Authentication required? No authentication required—disables 802.
What is RADIUS? RADIUS stands for Remote Authentication Dial-In User Service. RADIUS is a standard that has been implemented into several software packages and networking devices. It allows user information to be sent to a central database running on a RADIUS Server, where it is verified. RADIUS also provides a mechanism for accounting. What is WPA? WPA (Wi-Fi Protected Access) is a subset of the IEEE 802.11i security sepcification draft.