NWA1100-N 802.11b/g/n PoE Access Point Version 1.00 Edition 3, 10/2013 Quick Start Guide User’s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name www.zyxel.
IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system. Every effort has been made to ensure that the information in this manual is accurate. Related Documentation • Quick Start Guide The Quick Start Guide shows how to connect the NWA and access the Web Configurator.
Contents Overview Contents Overview User’s Guide .........................................................................................................................................9 Introducing the NWA ............................................................................................................................... 11 Introducing the Web Configurator ...........................................................................................................20 Status Screens ..............
Table of Contents Table of Contents Contents Overview ..............................................................................................................................3 Table of Contents .................................................................................................................................4 Part I: User’s Guide ........................................................................................... 9 Chapter 1 Introducing the NWA ..................................
Table of Contents 4.1.1 Choosing the Wireless Mode ...................................................................................................27 4.1.2 Wireless LAN Configuration Overview ....................................................................................27 4.1.3 Further Reading .......................................................................................................................28 4.2 How to Configure Multiple Wireless Networks .....................................
Table of Contents 6.3.1 WMM QoS ...............................................................................................................................69 6.3.2 Type Of Service (ToS) .............................................................................................................70 Chapter 7 Wireless Security Screen ...................................................................................................................71 7.1 Overview ..........................................
Table of Contents 11.2 What You Can Do in this Chapter ....................................................................................................94 11.3 What You Need To Know .................................................................................................................94 11.4 General Screen ...............................................................................................................................96 11.4.1 Password Screen .....................................
Table of Contents 15.1 Overview ....................................................................................................................................... 119 15.2 What You Can Do in this Chapter ................................................................................................. 119 15.3 What You Need To Know .............................................................................................................. 119 15.4 Client Information Screen ...........................
P ART I User’s Guide 9
C HAPT ER 1 Introducing the NWA This chapter introduces the main applications and features of the NWA. It also discusses the ways you can manage your NWA. 1.1 Introducing the NWA Your NWA extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. The NWA controls network access with MAC address filtering and RADIUS server authentication. It also provides a high level of network traffic security, supporting IEEE 802.
Chapter 1 Introducing the NWA 1.2.1 Access Point The NWA is an ideal access solution for wireless Internet connection. A typical Internet access application for your NWA is shown as follows. Stations A, B and C can access the wired network through the NWAs. Figure 1 Access Point Application 1.2.2 Bridge / Repeater The NWA can act as a wireless network bridge and establish wireless links with other APs.
Chapter 1 Introducing the NWA At the time of writing, WDS security is compatible with other ZyXEL NWA-series access points only. Refer to your other access point’s documentation for details. Figure 2 Bridge Application Figure 3 Repeater Application 1.2.2.1 Bridge / Repeater Mode Example In the example below, when both NWAs are in bridge mode, they form a WDS (Wireless Distribution System) allowing the computers in LAN 1 to connect to the computers in LAN 2.
Chapter 1 Introducing the NWA Be careful to avoid bridge loops when you enable bridging in the NWA. Bridge loops cause broadcast traffic to circle the network endlessly, resulting in possible throughput degradation and disruption of communications. The following examples show two network topologies that can lead to this problem: • If two or more NWAs (in bridge mode) are connected to the same hub.
Chapter 1 Introducing the NWA When the NWA is in AP+Bridge mode, security between APs (the Wireless Distribution System or WDS) is independent of the security between the wireless stations and the AP. If you do not enable WDS security, traffic between APs is not encrypted. When WDS security is enabled, both APs must use the same pre-shared key. See Section 5.4.3 on page 58 for more details. Unless specified, the term “security settings” refers to the traffic between the wireless stations and the NWA.
Chapter 1 Introducing the NWA 1.2.5 Multi SSID A Basic Service Set (BSS) is the set of devices forming a single wireless network (usually an access point and one or more wireless clients). The Service Set IDentifier (SSID) is the name of a BSS. In Multi SSID mode, the NWA provides multiple virtual APs, each forming its own BSS and using its own individual SSID profile. You can configure up to eight SSID profiles, and have up to four active at any one time.
Chapter 1 Introducing the NWA • Web Configurator. This is recommended for everyday management of the NWA using a (supported) web browser. • Command Line Interface. Line commands are mostly used for troubleshooting by service engineers. • FTP (File Transfer Protocol) for firmware upgrades. • SNMP (Simple Network Management Protocol). The device can be monitored by an SNMP manager. 1.4 Configuring Your NWA’s Security Features Your NWA comes with a variety of security features.
Chapter 1 Introducing the NWA 1.5 Good Habits for Managing the NWA Do the following things regularly to make the NWA more secure and to manage it more effectively. 1.6 Hardware Connections See your Quick Start Guide for information on making hardware connections. 1.7 LEDs Figure 10 LEDs Table 1 LEDs LABEL LED 1 SYS 2 18 WLAN COLOR STATUS DESCRIPTION Green On The NWA is receiving power and ready for use. Red Flashing There is system error and the NWA cannot boot up.
Chapter 1 Introducing the NWA Table 1 LEDs (continued) LABEL LED COLOR 3 ETHERNET Green Yellow NWA1100-N User’s Guide STATUS DESCRIPTION On The NWA has a 10/100 Mbps Ethernet connection. Blinking The NWA has a 10/100 Mbps Ethernet connection and is sending or receiving data. On The NWA has a 1000 Mbps Ethernet connection. Blinking The NWA has a 1000 Mbps Ethernet connection and is sending/receiving data. Off The NWA does not have an Ethernet connection.
C HAPT ER 2 Introducing the Web Configurator This chapter describes how to access the NWA’s web configurator and provides an overview of its screens. 2.1 Accessing the Web Configurator 1 Make sure your hardware is properly connected and prepare your computer or computer network to connect to the NWA (refer to the Quick Start Guide). 2 Launch your web browser. 3 Type "192.168.1.2" as the URL (default). The login screen appears.
Chapter 2 Introducing the Web Configurator default configuration file. This means that you will lose all the settings you previously configured. The password will be reset to “1234”. Figure 12 The RESET Button 2.2.1 Methods of Restoring Factory-Defaults You can erase the current configuration and restore factory defaults in two ways: Use the RESET button to upload the default configuration file. Hold this button in for about 10 seconds (the lights will begin to blink).
Chapter 2 Introducing the Web Configurator Check the status bar at the bottom of the screen when you click Apply or OK to verify that the configuration has been updated. Figure 13 Status Screen of the Web Configurator • Click the links on the left of the screen to configure advanced features such as WIRELESS (Wireless Settings, Multi-SSID, Security, RADIUS, MAC Filter), AP IP, SYSTEM (General, Password and Time), REMOTE MGNT (Telnet, FTP, WWW and SNMP), CERTIFICATES, and LOGS (View Log and Log Settings).
C HAPT ER 3 Status Screens The Status screens display when you log into the NWA, or click Status in the navigation menu. Use the Status screens to look at the current status of the device, system resources, and interfaces. The Status screens also provide detailed information about system statistics, associated wireless clients, and logs. 3.1 The Status Screen Use this screen to get a quick view of system, Ethernet, WLAN and other information regarding your NWA. Click Status.
Chapter 3 Status Screens Table 2 The Status Screen (continued) LABEL DESCRIPTION Device Name This field displays the NWA system name. It is used for identification. You can change this in the System > General screen’s Device Name field. WLAN Operating Mode This field displays the current operating mode of the first wireless module (Access Point, Bridge/Repeater, AP+Bridge, Wireless Client, or Multi SSID). You can change the operating mode in the Wireless > Wireless Settings screen.
Chapter 3 Status Screens Table 2 The Status Screen (continued) LABEL Rate DESCRIPTION For the LAN port this displays Auto or the port speed and duplex setting that you configured in the System > General screen. For the WLAN interface, it displays the downstream and upstream transmission rate or N/A if the interface is not in use. SSID Status This is not available when the WLAN Operating Mode is Wireless Client. Interface This column displays each of the NWA’s wireless interfaces.
Chapter 3 Status Screens Table 3 System Status: Statistics (continued) 26 LABEL DESCRIPTION TX PKT This is the number of transmitted packets on this port. Retry Count This is the total number of retries for transmitted packets (TX). FCS Error Count This is the ratio percentage showing the total number of checksum error of received packets (RX) over total RX. Poll Interval Enter the time interval for refreshing statistics.
C HAPT ER 4 Tutorial This chapter first provides an overview of how to configure the wireless LAN on your NWA, and then gives step-by-step guidelines showing how to configure your NWA for some example scenarios. 4.1 How to Configure the Wireless LAN This section illustrates how to choose which wireless operating mode to use on the NWA and how to set up the wireless LAN in each wireless mode. See Section 4.1.3 on page 28 for links to more information on each step. 4.1.
Chapter 4 Tutorial (see your Quick Start Guide for information on setting up your NWA and accessing the Web Configurator). Select the WLAN Adaptor you want to configure. Select Operation Mode. Access Point Bridge / Repeater AP + Bridge Wireless Client Select Wireless Mode, SSID Profile, and Channel. Select Wireless Mode, SSID Profile, and Channel. Select Wireless Mode, SSID Profile, and Channel. Select the AP you want to connect to. Configure RADIUS authentication (optional).
Chapter 4 Tutorial 4.2 How to Configure Multiple Wireless Networks In this example, you have been using your NWA as an access point for your office network (See your Quick Start Guide for information on how to set up your NWA in Access Point mode). Now your network is expanding and you want to make use of the Multi-SSID feature (see Multi SSID on page 50) to provide multiple wireless networks. Each wireless network will cater to a different type of user.
Chapter 4 Tutorial The standard network (SSID01) has access to all resources. The VoIP network (VoIP_SSID) has access to all resources and a high QoS priority. The guest network (Guest_SSID) has a low QoS priority and prevents visitors in this network from communicating with one another. 4.2.1 Configure the SSID Profiles 30 1 Log in to the NWA (see Section 2.1 on page 20). Click Wireless > Multi SSID. The Multi SSID screen appears. 2 Select the Profile1 radio button and click Edit.
Chapter 4 Tutorial 4.2.1.1 Multi SSID 1 Go to Wireless > Wireless Settings. Select Multi SSID from the Operating Mode drop-down list box. 2 SSID01 is the standard network, so select SSID01 as the first profile. It is always active. 3 Select VoIP_SSID as the second profile, and Guest_SSID as the third profile. Select the corresponding Active check-boxes. 4 Click Apply to save your settings. Now the three SSIDs are activated.
Chapter 4 Tutorial 4.2.2 Configure the Standard Network 1 Click Wireless > Multi SSID. Select SSID01 and click Edit. 2 Set the SSID to SSID01. Select SecProfile1 as SSID01’s security profile. Select the Hidden SSID checkbox as you want only authorized company employees to use this network, so there is no need to broadcast the SSID to wireless clients scanning the area. Also, the clients on SSID01 might need to access other clients on the same wireless network.
Chapter 4 Tutorial 3 Next, click Wireless > Security. Select SecProfile1 and click Edit. 4 Since SSID01 is the standard network that has access to all resources, assign a more secure security mode. Select WPA2-PSK-MIX as the Security Mode, and enter the Pre-Shared Key. In this example, use ThisisSSID01PreSharedKey. Click Apply. 5 You have finished configuring the standard network, SSID01.
Chapter 4 Tutorial 4.2.3 Configure the VoIP Network 34 1 Go to Wireless > SSID. Select VoIP_SSID and click Edit. 2 Set the SSID to VoIP_SSID. Select SecProfile2 as the Security Profile for the VoIP network. Select the Hidden SSID check-box. 3 Select WMM-Voice in the QoS field to give VoIP the highest priority in the wireless network. Click Save.
Chapter 4 Tutorial 4 Next, click Wireless > Security. Select SecProfile2 and click Edit. 5 Select WPA2-PSK as the Security Mode, and enter the Pre-Shared Key. In this example, use ThisisVoIPPreSharedKey. Click Apply. 6 Your VoIP wireless network is now ready to use. Any traffic using the VoIP_SSID profile will be given the highest priority across the wireless network. 4.2.
Chapter 4 Tutorial 36 1 Click Wireless > SSID. Select Guest_SSID and click Edit. 2 Set the SSID to Guest_SSID. Select SecProfile3 in the Security field. Do not select the Hidden SSID check-box so the guests can easily find the wireless network. 3 Select WMM-best effort in the QoS field t 4 o give the guest a lower QoS priority. 5 Select the check-box of Enable Intra-BSS Traffic blocking. Click Save.
Chapter 4 Tutorial 6 Next, click Wireless > Security. Select SecProfile3 and click Edit. 7 Select WPA-PSK in the Security Mode field. WPA-PSK provides strong security that is supported by most wireless clients. 8 Enter the PSK you want to use in your network in the Pre-Shared Key field. In this example, the PSK is ThisismyGuestWPApre-sharedkey. Click Apply. 9 Your guest wireless network is now ready to use. 4.2.
Chapter 4 Tutorial 4.3 NWA Setup in AP and Wireless Client Modes This example shows you how to restrict wireless access to your NWA. 4.3.1 Scenario In the figure below, there are two NWAs (A and B) in the network. A is in Access Point (AP) mode while station B is in Wireless Client mode. Station B is connected to a File Transfer Protocol (FTP) server. You want only specified wireless clients to be able to access station B.
Chapter 4 Tutorial Log into the Web Configurator on NWA (A) and go to the Wireless > Wireless Settings screen. 1 Set the Operation Mode to Access Point. 2 Select the Wireless Mode. In this example, select 802.11b/g/n. 3 Select Profile1 as the SSID Profile. 4 Choose the Channel you want NWA (A) to use. 5 Click Apply. 6 Go to Wireless > Multi SSID. Select Profile1 and click Edit. 7 Change the SSID to AP-A. 8 Select SecProfile1 in the Security field.
Chapter 4 Tutorial 10 Click Save. 11 Go to Wireless > Security. Select SecProfile1. Click Edit. 12 Configure WPA-PSK as the Security Mode and enter ThisisMyPreSharedKey in the PreShared Key field.
Chapter 4 Tutorial 13 Click Apply to finish configuration for NWA (A). 4.3.3 Configuring the NWA in Wireless Client Mode The NWA (B) should have a wired connection before it can be set to wireless client operating mode. Connect your NWA to the FTP server. Login to NWA (B)’s Web Configurator and go to the Wireless > Wireless Settings screen. Follow these steps to configure station B. 1 Select Wireless Client as Operation Mode. Select Profile1 as the SSID Profile. Click Apply.
Chapter 4 Tutorial 42 3 Find and select NWA (A)’s SSID: AP-A. Click Selected. 4 The NWA automatically uses the selected AP’s SSID for Profile 1. Go to Wireless > Multi SSID. Select Profile1 and click Edit.
Chapter 4 Tutorial 5 Select SecProfile1 in the Security field. Click Save. 6 Go to Wireless > Security. Select SecProfile1. Click Edit. 7 Configure the NWA to use the same security mode and Pre-Shared Key as NWA (A): WPA-PSK/ ThisisMyPreSharedKey. Click Apply.
Chapter 4 Tutorial 4.3.4 MAC Filter Setup One way to ensure that only specified wireless clients can access the FTP server is by enabling MAC filtering on NWA (B) (See Chapter 9 on page 87 for more information on MAC Filter). 1 Go to Wireless > MAC Filter. Select MacProfile1 and click Edit. 2 Select Allow Listed in the Access Control Mode field. Enter the MAC addresses of the wireless clients (W, Y and Z) you want to associate with the NWA. Click Apply.
Chapter 4 Tutorial 3 Make sure intra-BSS traffic is enabled on A. • Try accessing the FTP server from X. If you are able to access the FTP server, do the following. 1 Make sure MAC filtering is enabled. 2 Make sure X’s MAC address is not entered in the list of allowed devices.
P ART II Technical Reference The appendices provide general information. Some details may not apply to your NWA.
C HAPT ER 5 Wireless Settings Screen 5.1 Overview This chapter discusses the steps to configure the Wireless Settings screen on the NWA. It also introduces the wireless LAN (WLAN) and some basic scenarios. Figure 18 Wireless Mode In the figure above, the NWA allows access to another bridge device (A) and a notebook computer (B) upon verifying their settings and credentials. It denies access to other devices (C and D) with configurations that do not match those specified in your NWA. 5.
Chapter 5 Wireless Settings Screen 5.3 What You Need To Know BSS A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless clients in the BSS. ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
Chapter 5 Wireless Settings Screen Wireless Mode The IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. Your NWA can support 802.11b/g and 802.11b/g/n. Multi SSID Traditionally, you needed to use different APs to configure different Basic Service Sets (BSSs). As well as the cost of buying extra APs, there was also the possibility of channel interference.
Chapter 5 Wireless Settings Screen 5.4.1 Access Point Mode Use this screen to use your NWA as an access point. Select Access Point as the Operation Mode. The following screen displays. Figure 19 Wireless > Wireless Settings: Access Point The following table describes the general wireless LAN labels in this screen. Table 4 Wireless > Wireless Settings: Access Point LABEL DESCRIPTION Basic Settings Disable Wireless LAN Interface Select this option to turn off the wireless LAN.
Chapter 5 Wireless Settings Screen Table 4 Wireless > Wireless Settings: Access Point (continued) LABEL DESCRIPTION Wireless Mode Select 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the NWA. The transmission rate of your NWA might be reduced. Select 802.11b/g/n to allow IEEE802.11b, IEEE802.11g and IEEE802.11n compliant WLAN devices to associate with the Device. The transmission rate of the NWA might be reduced.
Chapter 5 Wireless Settings Screen Table 4 Wireless > Wireless Settings: Access Point (continued) LABEL DESCRIPTION A-MPDU aggregation This field is available only when 802.11 b/g/n is selected as the Wireless Mode. Select Enable to allow the grouping of several A-MSDUs (Aggregate MAC Service Data Units) into one large A-MPDU (Aggregate MAC Protocol Data Unit). This function allows faster data transfer rates. Short GI This field is available only when 802.11 b/g/n is selected as the Wireless Mode.
Chapter 5 Wireless Settings Screen Use this screen to use the NWA as a wireless bridge. Select Bridge/Repeater as the Operation Mode.
Chapter 5 Wireless Settings Screen The following table describes the bridge labels in this screen. Table 5 Wireless > Wireless Settings: Bridge/Repeater LABEL DESCRIPTIONS Basic Settings Disable Wireless LAN Interface Select this option to turn off the wireless LAN. Operation Mode Select Bridge/Repeater in this field. Wireless Mode Select 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the NWA. The transmission rate of your NWA might be reduced.
Chapter 5 Wireless Settings Screen Table 5 Wireless > Wireless Settings: Bridge/Repeater (continued) LABEL DESCRIPTIONS Encryption Type This field is configurable only when you select Enable WDS Security. Select TKIP to enable Temporal Key Integrity Protocol (TKIP) security on your WDS. This option is compatible with other ZyXEL access points that support WDS security. Use this if the other access points on your network support WDS security but do not have an AES option.
Chapter 5 Wireless Settings Screen Table 5 Wireless > Wireless Settings: Bridge/Repeater (continued) LABEL DESCRIPTIONS MCS Table The MCS Rate table is available only when 802.11 b/g/n is selected in the 802.11 Wireless Mode field. IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands for Modulation and Coding Scheme. This is an 802.11n feature that increases the wireless network performance in terms of throughput.
Chapter 5 Wireless Settings Screen 5.4.3 AP + Bridge Mode Use this screen to have the NWA function as a bridge and access point simultaneously. Select AP+Bridge as the Operation Mode. The following screen displays. Figure 21 Wireless > Wireless Settings: AP+Bridge See the tables describing the fields in the Access Point and Bridge / Repeater operating modes for descriptions of the fields in this screen.
Chapter 5 Wireless Settings Screen 5.4.4 Wireless Client Mode Use this screen to turn your NWA into a wireless client. Select Wireless Client as the Operation Mode. The following screen displays. Figure 22 Wireless > Wireless Settings: Wireless Client The following table describes the general wireless LAN labels in this screen. Table 6 Wireless > Wireless Settings: Wireless Client LABEL DESCRIPTION Basic Settings Disable Wireless LAN Interface Select this option to turn off the wireless LAN.
Chapter 5 Wireless Settings Screen Table 6 Wireless > Wireless Settings: Wireless Client (continued) LABEL DESCRIPTION Preamble Type Select Dynamic to have the NWA automatically use short preamble when the wireless network your NWA is connected to supports it, otherwise the NWA uses long preamble. Select Long preamble if you are unsure what preamble mode the wireless device your NWA is connected to supports, and to provide more reliable communications in busy wireless networks.
Chapter 5 Wireless Settings Screen 5.4.5 Multi SSID Mode Use this screen to have the NWA function in Multi SSID mode. Select Multi SSID as the Operating Mode. The following screen diplays.
Chapter 5 Wireless Settings Screen The following table describes the labels in this screen. Table 7 Wireless > Wireless Settings: Multi SSID LABEL DESCRIPTION Disable Wireless LAN Interface Select this option to turn off the wireless LAN. Operating Mode Select Multi SSID in this field. Wireless Mode Select 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the NWA. The transmission rate of your NWA might be reduced. Select 802.11b/g/n to allow IEEE802.
Chapter 5 Wireless Settings Screen Table 7 Wireless > Wireless Settings: Multi SSID (continued) LABEL DESCRIPTION QoS This displays the QoS priority level associated with the SSID. This field is configurable only when you enable 802.1Q VLAN tagging in the System > General screen and select the Tag check box in this screen. Select the Quality of Service priority for this BSS’s traffic.
Chapter 5 Wireless Settings Screen Table 7 Wireless > Wireless Settings: Multi SSID (continued) LABEL DESCRIPTION MCS Table The MCS Rate table is available only when 802.11 b/g/n is selected in the 802.11 Wireless Mode field. IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands for Modulation and Coding Scheme. This is an 802.11n feature that increases the wireless network performance in terms of throughput.
Chapter 5 Wireless Settings Screen 5.5.2 Additional Wireless Terms Table 8 Additional Wireless Terms TERM DESCRIPTION Intra-BSS Traffic This describes direct communication (not through the NWA) between two wireless devices within a wireless network. You might disable this kind of communication to enhance security within your wireless network. RTS/CTS Threshold In a wireless network which covers a large area, wireless devices are sometimes not aware of each other’s presence.
C HAPT ER 6 Multi SSID Screen 6.1 Overview This chapter describes how you can configure Service Set Identifier (SSID) profiles in your NWA. Figure 24 Sample SSID Profiles In the figure above, the NWA has three SSID profiles configured: a standard profile (SSID01), a profile with high QoS settings for Voice over IP (VoIP) users (VoIP_SSID), and a guest profile that prevents visitors in this network from communicating with one another (Guest_SSID). 6.1.
Chapter 6 Multi SSID Screen When the NWA is set to Access Point, AP + Bridge or MBSSID mode, you need to choose the SSID profile(s) you want to use in your wireless network (see Section 5.4 on page 50 for more information on operating modes). To configure the settings of your SSID profile, you need to know the Media Access Control (MAC) addresses of the devices you want to allow access to it.
Chapter 6 Multi SSID Screen Figure 26 Wireless > Multi SSID (continued) LABEL DESCRIPTION RADIUS This field displays which RADIUS profile is currently associated with each SSID profile, if you have a RADIUS server configured. QoS This field displays the Quality of Service setting for this profile or NONE if QoS is not configured on a profile.
Chapter 6 Multi SSID Screen Table 9 Multi SSID: Edit (continued) LABEL DESCRIPTION QoS Select the Quality of Service priority for this BSS’s traffic. • • • If you select WMM from the QoS list, the priority of a data packet depends on the packet’s IEEE 802.1q or DSCP header. If a packet has no WMM value assigned to it, it is assigned the default priority. If you select WMM_VOICE, WMM_VIDEO, WMM_BEST_EFFORT or WMM_BACKGROUND, the NWA applies that QoS setting to all of that SSID’s traffic.
Chapter 6 Multi SSID Screen individual traffic stream. This prevents reductions in data transmission for applications that are sensitive to latency and jitter (variations in delay). 6.3.1.1 WMM QoS Priorities The following table describes the WMM QoS priority levels that the NWA uses. Table 10 WMM QoS Priorities Priority Level description voice Typically used for traffic that is especially sensitive to jitter. Use this priority to reduce latency for improved voice quality.
C HAPT ER 7 Wireless Security Screen 7.1 Overview This chapter describes how to use the Wireless Security screen. This screen allows you to configure the security mode for your NWA. Wireless security is vital to your network. It protects communications between wireless stations, access points and the wired network. Figure 28 Securing the Wireless Network In the figure above, the NWA checks the identity of devices before giving them access to the network.
Chapter 7 Wireless Security Screen 7.3 What You Need To Know User Authentication Authentication is the process of verifying whether a wireless device is allowed to use the wireless network. You can make every user log in to the wireless network before they can use it. However, every device in the wireless network has to support IEEE 802.1x to do this. For wireless networks, you can store the user names and passwords for each user in a RADIUS server. This is a server used in businesses more than in homes.
Chapter 7 Wireless Security Screen • WPA2-PSK. This adds a pre-shared key on top of WPA2 standard. • WPA2-PSK-MIX. This commands the NWA to use either WPA-PSK or WPA2-PSK depending on which security mode the wireless client uses. Note: In Bridge/Repeater and AP+Bridge operating modes, the only available security modes are WEP, WPA-PSK, and WPA2-PSK. Note: To guarantee 802.11n wireless speed, please only use WPA2 or WPA2-PSK security mode.
Chapter 7 Wireless Security Screen Click Wireless > Security. Select the profile that you want to configure and click Edit. Figure 29 Wireless > Security The Security Settings screen varies depending upon the security mode you select. Figure 30 Security: None Note that some screens display differently depending on the operating mode selected in the Wireless > Wireless Settings screen.
Chapter 7 Wireless Security Screen 7.4.1 Security: WEP Use this screen to use WEP as the security mode for your NWA. Select WEP in the Security Mode field to display the following screen. Figure 31 Security: WEP The following table describes the labels in this screen. Table 13 Security: WEP LABEL DESCRIPTION Profile Name This is the name that identifying this profile. Security Mode Choose WEP in this field. Authentication Type Select Open or Shared from the drop-down list box.
Chapter 7 Wireless Security Screen Table 13 Security: WEP (continued) LABEL DESCRIPTION Reset Click Reset to begin configuring this screen afresh. Back Click Back to return to the previous screen. 7.4.2 Security: 802.1x Only This screen varies depending on whether you select Access Point, Multi SSID or Wireless Client in the Wireless > Wireless Settings screen. 7.4.2.1 Access Point or Multi SSID Use this screen to use 802.
Chapter 7 Wireless Security Screen 7.4.2.2 Wireless Client Use this screen to use 802.1x authentication with no data encryption for your NWA that is in Wireless Client operating mode. Select 802.1x in the Security Mode field to display the following screen. Figure 33 Security: 802.1x for Wireless Client The following table describes the labels in this screen. Table 15 Security: 802.1x for Wireless Client LABEL DESCRIPTION Security Settings Profile Name This is the name that identifying this profile.
Chapter 7 Wireless Security Screen 7.4.3 Security: 802.1x + Static WEP This screen varies depending on whether you select Access Point, Multi SSID or Wireless Client in the Wireless > Wireless Settings screen. 7.4.3.1 Access Point or Multi SSID Use this screen to use 802.1x authentication with a static WEP key for your NWA that is in Access Point or Multi SSID operating mode. Select 802.1X-Static64, 802.1X-Static128, or 802.1XStatic152 in the Security Mode field to display the following screen.
Chapter 7 Wireless Security Screen Table 16 Security: 802.1x + Static WEP (AP mode) (continued) LABEL DESCRIPTION Rekey Options ReAuthentication Timer Specify how often wireless stations have to resend user names and passwords in order to stay connected. Enter a time interval between 10 and 9999 seconds. Alternatively, enter “0” to turn reauthentication off. Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority.
Chapter 7 Wireless Security Screen The following table describes the labels in this screen. Table 17 Security: 802.1x + Static WEP for Wireless Client LABEL DESCRIPTION Security Settings Profile Name This is the name that identifying this profile. Security Mode Choose the same security mode used by the AP. Data Encryption Select 64-bit WEP, 128-bit WEP or 152-bit WEP to use 802.1x authentication with a static WEP key.
Chapter 7 Wireless Security Screen 7.4.4.1 Access Point or Multi SSID Use this screen to employ WPA and/or WPA2 as the security mode of your NWA that is in Access Point or Multi SSID operating mode. Select WPA, WPA2 or WPA2-MIX in the Security Mode field to display the following screen.
Chapter 7 Wireless Security Screen 7.4.4.2 Wireless Client Use this screen to employ WPA or WPA2 as the security mode of your NWA that is in Wireless Client operating mode. Select WPA or WPA2 in the Security Mode field to display the following screen. Figure 37 Security: WPA or WPA2 for Wireless Client The following table describes the labels in this screen.
Chapter 7 Wireless Security Screen 7.4.5 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX Use this screen to employ WPA-PSK, WPA2-PSK or WPA2-PSK-MIX as the security mode of your NWA. Select WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in the Security Mode field to display the following screen.
C HAPT ER 8 RADIUS Screen 8.1 Overview This chapter describes how you can use the Wireless > RADIUS screen. Remote Authentication Dial In User Service (RADIUS) is a protocol that can be used to manage user access to large networks. It is based on a client-server model that supports authentication, authorization and accounting. The access point is the client and the server is the RADIUS server.
Chapter 8 RADIUS Screen RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. You should know the IP addresses, ports and share secrets of the external RADIUS server and/or the external RADIUS accounting server you want to use with your NWA. You can configure a primary and backup RADIUS and RADIUS accounting server for your NWA. 8.4 The RADIUS Screen Use this screen to set up your NWA’s RADIUS server settings.
Chapter 8 RADIUS Screen Table 21 Wireless > RADIUS (continued) LABEL DESCRIPTION Backup If the NWA cannot communicate with the Primary server, you can have the NWA use a Backup server. Make sure the Active check boxes are selected if you want to use backup servers. The NWA will attempt to communicate three times before using the Backup servers. Requests can be issued from the client interface to use the backup server.
C HAPT ER 9 MAC Filter Screen 9.1 Overview This chapter discusses how you can use the Wireless > MAC Filter screen. The MAC filter function allows you to configure the NWA to grant access to the NWA from other wireless devices (Allow Association) or exclude devices from accessing the NWA (Deny Association). Figure 41 MAC Filtering In the figure above, wireless client U is able to connect to the Internet because its MAC address is in the allowed association list specified in the NWA.
Chapter 9 MAC Filter Screen 9.4 MAC Filter Screen Use this screen to enable MAC address filtering in your NWA. You can specify MAC addresses to either allow or deny association with your NWA. Click Wireless > MAC Filter. The screen displays as shown.
Chapter 9 MAC Filter Screen Select a profile you want to configure and click Edit. Figure 43 MAC Filter: Edit The following table describes the labels in this screen. Table 22 Wireless > MAC Filter LABEL DESCRIPTION ProfileName This is the name that identifying this RADIUS. Access Control Mode Select Disable if you do not want to use this feature. Select Allow Listed to permit access to the NWA. MAC addresses not listed will be denied access to the NWA. Select Deny Listed to block access to theNWA.
C HAPTER 10 IP Screen 10.1 Overview This chapter describes how you can configure the IP address of your NWA. The Internet Protocol (IP) address identifies a device on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Figure 44 IP Setup The figure above illustrates one possible setup of your NWA. The gateway IP address is 192.168.1.
Chapter 10 IP Screen 10.4 IP Screen Use this screen to configure the IP address for your NWA. Click IP to display the following screen. Figure 45 IP Setup The following table describes the labels in this screen. Table 23 IP Setup LABEL DESCRIPTION Obtain IP Address Automatically Select this option if your NWA is using a dynamically assigned IP address from a DHCP server each time. Note: You must know the IP address assigned to the NWA (by the DHCP server) to access the NWA again.
Chapter 10 IP Screen 10.5 Technical Reference This section provides the technical background information about the topics covered in this chapter. 10.5.1 WAN IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet (only between your two branch offices, for instance) you can assign any IP addresses to the hosts without problems.
Chapter 10 IP Screen Path cost is the cost of transmitting a frame onto a LAN through that port. It is assigned according to the speed of the link to which a port is attached. The slower the media, the higher the cost - see the following table.
C HAPTER 11 System Screens 11.1 Overview This chapter provides information and instructions on how to identify and manage your NWA over the network. Figure 46 NWA Setup In the figure above, the NWA connects to a Domain Name Server (DNS) server to avail of a domain name. It also connects to an Network Time Protocol (NTP) server to set the time on the device. 11.2 What You Can Do in this Chapter • Use the System > General screen to specify the System Name and Ethernet Data Rate value (see Section 11.
Chapter 11 System Screens to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks. Table 27 Private IP Address Ranges 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 You can obtain your IP address from the IANA, from an ISP or have it assigned by a private network.
Chapter 11 System Screens 11.4 General Screen Use the General screen to identify your NWA over the network. Click System > General. The following screen displays. Figure 47 System > General The following table describes the labels in this screen. Table 28 System > General LABEL DESCRIPTION System Settings System Name Type a descriptive name to identify the NWA in the Ethernet network. This name can be up to 15 alphanumeric characters long. Spaces are not allowed, but dashes "-" are accepted. 802.
Chapter 11 System Screens 11.4.1 Password Screen Use this screen to control access to your NWA by assigning a password to it. Click System > Password. The following screen displays. Figure 48 System > Password The following table describes the labels in this screen. Table 29 System > Password LABEL DESCRIPTIONS Current Password Type in your existing system password. New Password Type your new system password (max 19 characters).
Chapter 11 System Screens 11.5 Time Screen Use this screen to change your NWA’s time and date, click System > Time. The following screen displays. Figure 49 System > Time The following table describes the labels in this screen. Table 30 System > Time LABEL DESCRIPTION Current Time and Date Current Date This field displays the last updated date from the time server. Current Time This field displays the time of your NWA.
Chapter 11 System Screens 11.6 Technical Reference This section provides some technical information about the topics covered in this chapter. 11.6.1 Pre-defined NTP Time Servers List When you turn on the NWA for the first time, the date and time start at 2000-01-01 00:00:00. When you select Auto in the System > Time Setting screen, the NWA then attempts to synchronize with one of the following pre-defined list of NTP time servers.
C HAPTER 12 Remote Management 12.1 Overview This chapter shows you how to enable remote management of your NWA. It provides information on determining which services or protocols can access which of the NWA’s interfaces. Remote Management allows a user to administrate the device over the network.
Chapter 12 Remote Management • Use the WWW screen to configure through which interface(s) and from which IP address(es) you can use the Web Browser to manage the NWA (see Section 12.6 on page 104). • Use the SNMP screen to configure through which interface(s) and from which IP address(es) a network systems manager can access the NWA (see Section 12.7 on page 106). 12.
Chapter 12 Remote Management Note: SNMP is only available if TCP/IP is configured. Figure 51 SNMP Management Mode An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the NWA). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions.
Chapter 12 Remote Management System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The NWA automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling. 12.4 The Telnet Screen Use this screen to configure your NWA for remote Telnet access. You can use Telnet to access the NWA’s Command Line Interface (CLI). Click REMOTE MGNT > TELNET.
Chapter 12 Remote Management 12.5 The FTP Screen Use this screen to upload and download the NWA’s firmware using FTP. To use this feature, your computer must have an FTP client. To change your NWA’s FTP settings, click REMOTE MGMT > FTP. The following screen displays. Figure 53 Remote Management: FTP The following table describes the labels in this screen.
Chapter 12 Remote Management To change your NWA’s WWW settings, click REMOTE MGNT > WWW. The following screen shows. Figure 54 Remote Management: WWW The following table describes the labels in this screen. Table 34 Remote Management: WWW LABEL DESCRIPTION WWW Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
Chapter 12 Remote Management 12.7 The SNMP Screen Use this screen to have a manager station administrate your NWA over the network. To change your NWA’s SNMP settings, click REMOTE MGMT > SNMP. The following screen displays. Figure 55 Remote Management: SNMP The following table describes the labels in this screen.
Chapter 12 Remote Management Table 35 Remote Management: SNMP (continued) LABEL DESCRIPTION Access Type Specify the SNMP administrator’s access rights to MIBs. Read/Write - The SNMP administrator has read and write rights, meaning that the user can create and edit the MIBs on the NWA. Read Only - The SNMP administrator has read rights only, meaning the user can collect information from the NWA.
Chapter 12 Remote Management Table 35 Remote Management: SNMP (continued) LABEL DESCRIPTION Secured Client IP Address A secured client is a “trusted” computer that is allowed to communicate with the NWA using this service. Select All to allow any computer to access the NWA using this service. Choose Selected to just allow the computer with the IP address that you specify to access the NWA using this service.
Chapter 12 Remote Management 12.8.3 SNMP Traps SNMP traps are messages sent by the agents of each managed device to the SNMP manager. These messages inform the administrator of events in data networks handled by the device. The NWA can send the following traps to the SNMP manager. Table 36 SNMP Traps OBJECT IDENTIFIER # (OID) TRAP NAME DESCRIPTION Generic Traps coldStart 1.3.6.1.6.3.1.1.5.1 This trap is sent after booting (power on). This trap is defined in RFC-1215. warmStart 1.3.6.1.6.3.1.1.5.
C HAPTER 13 Certificate Screen 13.1 Overview This chapter describes how your NWA can use certificates as a means of authenticating wireless clients. It gives background information about public-key certificates and explains how to use them. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Chapter 13 Certificate Screen 13.4 Certificates Screen Use this screen to view, delete and import certificates. Click CERTIFICATES to open the NWA’s summary list of certificates and to import a new certificate. See the following figure. Figure 57 Certificates The following table describes the labels in this screen. Table 38 Certificates LABEL DESCRIPTION Delete Certificate You can delete a certificate Select the certificate from the list that you want to delete.
Chapter 13 Certificate Screen These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”). Only you can write your signature exactly as it should look. When people know what your signature looks like, they can verify whether something was signed by you, or by someone else. In the same way, your private key “writes” your digital signature and your public key allows people to verify whether data was signed by you, or by someone else.
Chapter 13 Certificate Screen 3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Figure 59 Certificate Details 4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may vary according to your situation. Possible examples would be over the telephone or through an HTTPS connection.
C HAPTER 14 Log Screens 14.1 Overview This chapter provides information on viewing and generating logs on your NWA. Logs are files that contain recorded network activity over a set period. They are used by administrators to monitor the health of the system(s) they are managing. Logs enable administrators to effectively monitor events, errors, progress, etc. so that when network problems or system failures occur, the cause or origin can be traced.
Chapter 14 Log Screens 14.3 What You Need To Know Alerts and Logs An alert is a type of log that warrants more serious attention. Some categories such as System Errors consist of both logs and alerts. You can differentiate them by their color in the View Log screen. Alerts are displayed in red and logs are displayed in black.
Chapter 14 Log Screens The following table describes the labels in this screen. Table 39 View Log LABEL DESCRIPTION Refresh Click Refresh to renew the log screen. Clear Log Click Clear Log to clear all the logs. # This field is a sequential value and is not associated with a specific entry. Time This field displays the time the log was recorded. Click the column heading to sort the entries. A triangle indicates the direction of the sort order.
Chapter 14 Log Screens To change your NWA’s log settings, click LOGS > Log Settings. The screen appears as shown. Figure 62 Log Settings The following table describes the labels in this screen. Table 40 Log Settings LABEL DESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below. If this field is left blank, logs and alert messages will not be sent via e-mail.
Chapter 14 Log Screens Table 40 Log Settings (continued) LABEL DESCRIPTION User Name If your e-mail account requires SMTP authentication, enter the username here. Password Enter the password associated with the above username. Syslog Logging Syslog logging sends a log to an external syslog server used to store logs. Active Click Active to enable syslog logging. Syslog IP Address Enter the IP address of the syslog server that will log the selected categories of logs.
C HAPTER 15 Maintenance 15.1 Overview This chapter describes the maintenance screens. It discusses how you can view the association list and channel usage, upload new firmware, manage configuration and restart your NWA without turning it off and on. 15.2 What You Can Do in this Chapter • Use the Client Information screen to view the wireless clients that are currently associated with the NWA (see Section 15.4 on page 119) .
Chapter 15 Maintenance Click Maintenance > Client Information. The following screen displays. Figure 63 Client Information The following table describes the labels in this screen. Table 41 Client Information LABEL DESCRIPTION # This is the index number of an associated wireless station. MAC Address This field displays the MAC address of an associated wireless station. ssid This field displays the SSID to which the wireless station is associated.
Chapter 15 Maintenance The following table describes the labels in this screen. Table 42 Channel Scan LABEL DESCRIPTION SSID This is the Service Set IDentification name of the AP in an Infrastructure wireless network or wireless station in an Ad-Hoc wireless network. For our purposes, we define an Infrastructure network as a wireless network that uses an AP and an Ad-Hoc network (also known as Independent Basic Service Set (IBSS)) as one that doesn’t.
Chapter 15 Maintenance Table 43 Firmware Upload (continued) LABEL DESCRIPTION Browse... Click Browse... to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Upload Click Upload to begin the upload process. This process may take up to two minutes. Do not turn off the NWA while firmware upload is in progress! After you see the Firmware Upload in Process screen, wait two minutes before logging into the NWA again.
Chapter 15 Maintenance 15.7 Configuration File Screen Use this screen to backup, restore and reset the configuration of your NWA. Click Maintenance > Configuration File. The screen appears as shown next. Figure 69 Configuration File 15.7.1 Backup Configuration Backup configuration allows you to back up (save) the NWA’s current configuration to a file on your computer.
Chapter 15 Maintenance Do not turn off the NWA while configuration file upload is in progress. After you see a “restore configuration successful” screen, you must then wait one minute before logging into the NWA again. Figure 70 Configuration Upload Successful The NWA automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop.
Chapter 15 Maintenance 15.7.3 Back to Factory Defaults Pressing the Reset button in this section clears all user-entered configuration information and returns the NWA to its factory defaults as shown on the screen. The following warning screen will appear. Figure 73 Reset Warning Message You can also press the RESET button to reset your NWA to its factory default settings. Refer to Section 2.2 on page 20 for more information. 15.
C HAPTER 16 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NWA Access and Login • Internet Access • Wireless LAN 16.1 Power, Hardware Connections, and LEDs The NWA does not turn on. None of the LEDs turn on. 1 Make sure you are using the power adaptor or cord included with the NWA.
Chapter 16 Troubleshooting 16.2 NWA Access and Login I forgot the IP address for the NWA. 1 The default IP address is 192.168.1.2. 2 If the NWA is working as a DHCP client and receives an IP address from a DHCP server, check the DHCP server for the NWA’s IP address. 3 If you configured a static IP address and have forgotten it, you have to reset the device to its factory defaults. See Section 2.2 on page 20. I forgot the password. 1 The default password is 1234.
Chapter 16 Troubleshooting Advanced Suggestions • Try to access the NWA using another service, such as Telnet. If you can access the NWA, check the remote management settings to find out why the NWA does not respond to HTTP. • If your computer is connected wirelessly, use a computer that is connected to a LAN/Ethernet port. I can see the Login screen, but I cannot log in to the NWA. 1 Make sure you have entered the user name and password correctly. The default password is 1234.
Chapter 16 Troubleshooting 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.7 on page 18. 2 Reboot the NWA. 3 If the problem continues, contact your ISP or network administrator. The Internet connection is slow or intermittent. 1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.7 on page 18.
A PPENDIX A Setting Up Your Computer’s IP Address Note: Your specific NWA may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix A Setting Up Your Computer’s IP Address 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon. 3 Right-click Local Area Connection and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 4 132 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 134 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix A Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 6 136 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 138 1 Click Start > Control Panel. 2 In the Control Panel, click View network status and tasks under the Network and Internet category. 3 Click Change adapter settings.
Appendix A Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 5 140 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 142 Click Apple > System Preferences.
Appendix A Setting Up Your Computer’s IP Address 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix A Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 144 Click Apply Now and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 75 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 Click Apple > System Preferences.
Appendix A Setting Up Your Computer’s IP Address 146 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix A Setting Up Your Computer’s IP Address • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NWA. 6 Click Apply and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 76 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix A Setting Up Your Computer’s IP Address 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix A Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix A Setting Up Your Computer’s IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. 8 Click the Close button to apply the changes.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 77 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address 1 Click K Menu > Computer > Administrator Settings (YaST). 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Appendix A Setting Up Your Computer’s IP Address 154 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix A Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 78 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window.
Appendix A Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 79 openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDIX B Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScript and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 82 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix B Pop-up Windows, JavaScript and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 83 Internet Options: Privacy 3 160 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 84 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
Appendix B Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 85 Internet Options: Security 162 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. Figure 86 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. Figure 87 Security Settings - Java JAVA (Sun) 164 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window. Figure 88 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix B Pop-up Windows, JavaScript and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 90 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly.
Appendix B Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 91 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the leftside menu. Select the check boxes as shown in the following screen.
Appendix B Pop-up Windows, JavaScript and Java Permissions To customize JavaScript behavior in the Opera browser, click JavaScript Options. Figure 93 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply.
A PPENDIX C IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 94 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix C IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks.
Appendix C IP Addresses and Subnetting The following table shows some possible subnet masks using both notations. Table 48 Alternative Subnet Mask Notation SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.0 /24 0000 0000 0 255.255.255.128 /25 1000 0000 128 255.255.255.192 /26 1100 0000 192 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.
Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 96 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix C IP Addresses and Subnetting Table 49 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 50 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix C IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 53 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
Appendix C IP Addresses and Subnetting Table 55 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
A PPENDIX D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix D Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 98 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 99 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix D Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 100 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
Appendix D Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver. Short and long refer to the length of the synchronization field in a packet.
Appendix D Wireless LANs The following figure shows the relative effectiveness of these wireless security methods available on your NWA. Table 57 Wireless Security Levels SECURITY LEVEL Least Secure SECURITY TYPE Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.
Appendix D Wireless LANs RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access.
Appendix D Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text. However, MD5 authentication has some weaknesses.
Appendix D Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled. Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
Appendix D Wireless LANs called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice.
Appendix D Wireless LANs WPA(2) with RADIUS Application Example To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server.
Appendix D Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 102 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix D Wireless LANs Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz or 5GHz is needed to communicate efficiently in a wireless LAN Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage area. Antenna Gain Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width.
Appendix D Wireless LANs For directional antennas, point the antenna in the direction of the desired coverage area.
A PPENDIX E Text File Based Auto Configuration This chapter describes how administrators can use text configuration files to configure the wireless LAN settings for multiple APs. Text File Based Auto Configuration Overview You can use plain text configuration files to configure the wireless LAN settings on multiple APs. The AP can automatically get a configuration file from a TFTP server at startup or after renewing DHCP client information.
Appendix E Text File Based Auto Configuration Use the following procedure to have the AP download the configuration file. Table 60 Configuration via SNMP STEPS MIB VARIABLE VALUE Step 1 pwTftpServer Set the IP address of the TFTP server. Step 2 pwTftpFileName Set the file name, for example, g3000hcfg.txt. Step 3 pwTftpFileType Set to 3 (text configuration file). Step 4 pwTftpOpCommand Set to 2 (download).
A PPENDIX F Open Software Announcements End-User License Agreement for "NWA1100-N WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix F Open Software Announcements remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation. 4.Restrictions You may not publish, display, disclose, sell, rent, lease, modify, store, loan, distribute, or create derivative works of the Software, or any part thereof. You may not assign, sublicense, convey or otherwise transfer, pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software.
Appendix F Open Software Announcements 7.
Appendix F Open Software Announcements remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties. NOTE: Some components of this product incorporate free software programs covered under the open source code licenses which allows you to freely copy, modify and redistribute the software.
Appendix F Open Software Announcements that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
Appendix F Open Software Announcements b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
Appendix F Open Software Announcements 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5.
Appendix F Open Software Announcements 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
Appendix F Open Software Announcements Derivative Work - 1996, 1998-2000 Copyright 1996, 1998-2000 The Regents of the University of California All Rights Reserved Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU and The Regents of the Un
Appendix F Open Software Announcements Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix F Open Software Announcements ---- Part 3: Cambridge Broadband Ltd. copyright notice (BSD) ----- Portions of this code are copyright (c) 2001-2003, Cambridge Broadband Ltd. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix F Open Software Announcements OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 4: Sun Microsystems, Inc. copyright notice (BSD) ----- Copyright ?2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Use is subject to license terms below. This distribution may include materials developed by third parties.
Appendix F Open Software Announcements products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix F Open Software Announcements documentation and/or other materials provided with the distribution. * Neither the name of Sparta, Inc nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
Appendix F Open Software Announcements this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Appendix F Open Software Announcements Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix F Open Software Announcements Copyright (c) 2007 Apple Inc. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2.
Appendix F Open Software Announcements SUCH DAMAGE. ---- Part 9: ScienceLogic, LLC copyright notice (BSD) ----- Copyright (c) 2009, ScienceLogic, LLC All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix F Open Software Announcements BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This Product includes SMTPClient software under below license.
Appendix F Open Software Announcements * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Appendix F Open Software Announcements Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Appendix F Open Software Announcements distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
Appendix F Open Software Announcements GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Appendix F Open Software Announcements You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2.
Appendix F Open Software Announcements These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
Appendix F Open Software Announcements b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code.
Appendix F Open Software Announcements distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.
Appendix F Open Software Announcements 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix F Open Software Announcements This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8.
Appendix F Open Software Announcements make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
A PPENDIX G Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional websites are listed below (see also http://www.zyxel.com/ about_zyxel/zyxel_worldwide.shtml). Please have the following information ready when you contact an office. Required Information • Product model and serial number. • Warranty Information.
Appendix G Customer Support Korea • ZyXEL Korea Corp. • http://www.zyxel.kr Malaysia • ZyXEL Malaysia Sdn Bhd. • http://www.zyxel.com.my Pakistan • ZyXEL Pakistan (Pvt.) Ltd. • http://www.zyxel.com.pk Philipines • ZyXEL Philippines • http://www.zyxel.com.ph Singapore • ZyXEL Singapore Pte Ltd. • http://www.zyxel.com.sg Taiwan • ZyXEL Communications Corporation • http://www.zyxel.com Thailand • ZyXEL Thailand Co., Ltd • http://www.zyxel.co.
Appendix G Customer Support Belgium • ZyXEL Communications B.V. • http://www.zyxel.com/be/nl/ Bulgaria • ZyXEL България • http://www.zyxel.com/bg/bg/ Czech • ZyXEL Communications Czech s.r.o • http://www.zyxel.cz Denmark • ZyXEL Communications A/S • http://www.zyxel.dk Estonia • ZyXEL Estonia • http://www.zyxel.com/ee/et/ Finland • ZyXEL Communications • http://www.zyxel.fi France • ZyXEL France • http://www.zyxel.fr Germany • ZyXEL Deutschland GmbH • http://www.zyxel.
Appendix G Customer Support Lithuania • ZyXEL Lithuania • http://www.zyxel.com/lt/lt/homepage.shtml Netherlands • ZyXEL Benelux • http://www.zyxel.nl Norway • ZyXEL Communications • http://www.zyxel.no Poland • ZyXEL Communications Poland • http://www.zyxel.pl Romania • ZyXEL Romania • http://www.zyxel.com/ro/ro Russia • ZyXEL Russia • http://www.zyxel.ru Slovakia • ZyXEL Communications Czech s.r.o. organizacna zlozka • http://www.zyxel.sk Spain • ZyXEL Spain • http://www.zyxel.
Appendix G Customer Support Turkey • ZyXEL Turkey A.S. • http://www.zyxel.com.tr UK • ZyXEL Communications UK Ltd. • http://www.zyxel.co.uk Ukraine • ZyXEL Ukraine • http://www.ua.zyxel.com Latin America Argentina • ZyXEL Communication Corporation • http://www.zyxel.com/ec/es/ Ecuador • ZyXEL Communication Corporation • http://www.zyxel.com/ec/es/ Middle East Egypt • ZyXEL Communication Corporation • http://www.zyxel.com/homepage.shtml Middle East • ZyXEL Communication Corporation • http://www.zyxel.
Appendix G Customer Support Oceania Australia • ZyXEL Communications Corporation • http://www.zyxel.com/au/en/ Africa South Africa • Nology (Pty) Ltd. • http://www.zyxel.co.
A PPENDIX H Legal Information Copyright Copyright © 2013 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix H Legal Information IC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. 率 輻 理 率 不 更 率 率 率 更 不 立 率 療 輻 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
Appendix H Legal Information [French] Par la présente ZyXEL déclare que l'appareil équipements est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/EC. [Italian] Con la presente ZyXEL dichiara che questo attrezzatura è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Appendix H Legal Information Draadloze verbindingen voor buitengebruik en met een reikwijdte van meer dan 300 meter dienen aangemeld te worden bij het Belgisch Instituut voor postdiensten en telecommunicatie (BIPT). Zie http://www.bipt.be voor meer gegevens. Les liaisons sans fil pour une utilisation en extérieur d’une distance supérieure à 300 mètres doivent être notifiées à l’Institut Belge des services Postaux et des Télécommunications (IBPT). Visitez http://www.ibpt.be pour de plus amples détails.
Appendix H Legal Information List of national codes COUNTRY ISO 3166 2 LETTER CODE COUNTRY ISO 3166 2 LETTER CODE Austria AT Malta MT Belgium BE Netherlands NL Cyprus CY Poland PL PT Czech Republic CR Portugal Denmark DK Slovakia SK Estonia EE Slovenia SI Finland FI Spain ES France FR Sweden SE Germany DE United Kingdom GB Greece GR Iceland IS Hungary HU Liechtenstein LI Ireland IE Norway NO Italy IT Switzerland CH Latvia LV Bulgaria BG Lithuania
Appendix H Legal Information "INFORMAZIONI AGLI UTENTI" Ai sensi dell'art. 13 del Decreto Legislativo 25 luglio 2005, n.
Index Index Numbers B 802.1x-Only 72 802.1x-Static128 72 Basic Service Set 49 see BSS 802.1x-Static64 72 Basic Service Set, See BSS 177 beacon 49 Beacon Interval 52, 63 A Bridge 12 Access Point 12, 38 Bridge Protocol Data Units (BPDUs) 93 access privileges 16 BSS 16, 49, 177 Bridge loops 14 Accounting Server 86 Advanced Encryption Standard See AES.
Index CTS (Clear to Send) 180 customer support 223 FTP 102 restrictions 102 D G Date and time start 99 Generic Token Card 73 disclaimer 229 GTC 73 Distribution System 49 Guide Quick Start 2 DNS 94 documentation related 2 Domain Name Server (DNS) 94 H DS 49 DTIM Interval 52, 63 hidden node 179 dynamic WEP key exchange 184 I E IANA 92, 176 EAP 73 IBSS 177 EAP Authentication 183 IEEE 802.11g 181 Encryption 73, 75, 77, 80 IEEE 802.
Index Channel Usage 120 Configuration 123 F/W Upload 121 Restart 125 Restore 123 J jitter 64 Management Information Base (MIB) 108 K key 73, 75, 80 managing the device using Telnet. See command interface. using the command interface. See command interface.
Index PFX PKCS#12 110 remote management 17 Preamble 65 remote management limitations 101 preamble mode 181 Roaming 65 Preamble Type 52, 56, 60, 63 root bridge 92 Pre-Shared Key 73 priorities 70 RTS (Request To Send) 180 threshold 179, 180 Private-Public Certificates 111 RTS/CTS Threshold 52, 56, 60, 63, 65 product registration 230 Protected Extensible Authentication Protocol 73 PSK 73, 186 S Security Mode, Choosing the 83 Security Modes 802.1x-Static64 72 IEEE 802.1x-Only 72 IEEE 802.
Index Poll Interval 25 Refresh Interval 23 Retry Count 25 Statistics 25 System Resources 24 system statistics 23 WLAN 23 STP 92 Internet 128 QoS 129 Web Configurator 127 TTLS 73 Tunneled Transport Layer Security 73 Tutorial 27 Type of Service 70 STP - how it works 93 STP path costs 93 STP port states 93 STP terminology 92 Subnet 169 U User Authentication 72 Subnet Mask 90, 95, 170 subnetting 172 Syslog Logging 115 System Screens 94 General 96 Password 97 Time 98 NTP client 98 Time and Date Setup 98 Tim
Index Wireless Client 27 user authentication 186 vs WPA2-PSK 186 wireless client supplicant 186 with RADIUS application example 187 Wireless Security 17 how to improve 17 Levels 72 wireless security 16, 181 WPA2-MIX 72 Wireless Security Screen 71 802.1x Only 76 Access Point 76, 78 Wireless Client 77, 79 802.1x Static 64-bit, 802.