Manuale d’uso / di manutenzione del prodotto NWA-3550 del fabbricante ZyXEL Communications
Vai alla pagina of 396
www .zyxel.com www .zyxel.com NW A-3500/NW A-3550 802.1 1a/g Dual Radio Wireless Business AP 802.1 1a/g Dual Radio Outdoor WLAN Business AP Copyright © 2009 ZyXEL Communications Corporation Firmware V ersion 3.7 Edition 1, 1/2009 Default Login Details IP Address http://192.
.
About This User's Guide NWA-3500/NWA-3550 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NW A using the web configurator . Y ou should have at least a basi c knowledge of TCP/IP netw orking concepts and topology .
About This User's Guide NWA-3500/NWA-3550 User’s Guide 4 Customer Support In the event of probl ems that cannot be solved by using t his manua l, you s hould contact your vendor . If y ou canno t cont act your vendor , then contact a Z yXEL office for the region in wh ich you bought the dev ice.
Document Conventions NWA-3500/NWA-3550 User’s Guide 5 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User’ s Guide.
Document Conventions NWA-3500/NWA-3550 User’s Guide 6 Icons Used in Figures Figures in this User’ s Guide ma y use the following generic icons. The NW A icon is not an exact representation of y our NW A.
Safety Warnings NWA-3500/NWA-3550 User’s Guide 7 Safety Warnings • Do NO T use this product near water , for exam ple, in a wet basement or near a swimming pool. • Do NO T expose your device to dampness, dust or corrosive liquids. • Do NO T store things on the device.
Safety Warnings NWA-3500/NWA-3550 User’s Guide 8.
Contents Overview NWA-3500/NWA-3550 User’s Guide 9 Contents Overview Introduction .......................................... ..................................................... ................... .......... 21 Introducing the NWA ........... ....
Contents Overview NWA-3500/NWA-3550 User’s Guide 10.
Table of Contents NWA-3500/NWA-3550 User’s Guide 11 Table of Contents About This User's Guide ........................................... ............................................................. .. 3 Document Conventions...................
Table of Contents NWA-3500/NWA-3550 User’s Guide 12 Chapter 3 St atus Screens ........................... ................................................................ ...................... ....... 39 3.1 The S tatus Screen .....................
Table of Contents NWA-3500/NWA-3550 User’s Guide 13 6.2.2.2 Activ ate the V oIP Profile .................. ................. ............ ................. . 77 6.2.3 Configure the Guest Network . ............. ................ ................ ....
Table of Contents NWA-3500/NWA-3550 User’s Guide 14 7.5 Configuring the Pass word ............... ............. ................ ............. ................ ................ ......... 11 3 7.6 Configuring Time Setting .......... ................ .
Table of Contents NWA-3500/NWA-3550 User’s Guide 15 10.1 Overview ........... ................ ............. ................ ................ ............. ................ ............ ......... 1 47 10.2 What Y ou Can Do in the Security Screen ..
Table of Contents NWA-3500/NWA-3550 User’s Guide 16 14.5.1 W AN IP Address Assignment ............... ............. ............. ................ ............. ........... 177 Chapter 15 Rogue AP Detection ............................. ............
Table of Contents NWA-3500/NWA-3550 User’s Guide 17 18.4.3 My Certificates Details Screen ............. ................ ................ ............. ................ ..... 214 18.5 T rusted CAs Screen ...................... ................ .....
Table of Contents NWA-3500/NWA-3550 User’s Guide 18 21.2 The Load Bala nc ing Screen ............. ............. ................ ............. ................ ................ ..... 257 21.2.1 Disassociating and Delaying Connection s ..... .......
Table of Contents NWA-3500/NWA-3550 User’s Guide 19 Appendix C Pop-up Win dows, JavaScripts and Java Permissions ...................................... 335 Appendix D Importing Certificates ....................................... ...................
Table of Contents NWA-3500/NWA-3550 User’s Guide 20.
21 P ART I Introduction Introducing the NWA (23) Introducing the W eb Configur ator (35) Status Screens (39) Management Mode (47) T utorial (67).
22.
NWA-3500/NWA-3550 User’s Guide 23 C HAPTER 1 Introducing the NWA This chapter introduces the main applications and features of the NWA. It also introduces the wa ys you can manage the NWA.
Chapter 1 Introducing the NWA NWA-3500/NWA-3550 User’s Guide 24 • Access P oint ( AP) • Bridge/R epeater •A P + B r i d g e •M B S S I D Applications for each oper ating mode are shown below . Note: A different channel should be configured for each WLAN interface to reduce the effect s of radio interference.
Chapter 1 In troducing the NWA NWA-3500/NWA-3550 User’s Guide 25 When the NWA is in Bridge / Repeater mode, security between APs (the Wireless Distribution System or WDS) is independent of the security between the wireless stations and the AP . If yo u do not enable WDS securit y , traffic between APs is not encrypted.
Chapter 1 Introducing the NWA NWA-3500/NWA-3550 User’s Guide 26 In the figure below , A and B us e X as an AP to access the wired network, while X and Y communicate in bridge mode.
Chapter 1 In troducing the NWA NWA-3500/NWA-3550 User’s Guide 27 T o the wireless clients in the network, ea ch SSID appears to be a different access point. As in any wireless network, clients can associate only with the S SIDs for which they have the correct security settings.
Chapter 1 Introducing the NWA NWA-3500/NWA-3550 User’s Guide 28 2 Guest_SSID . This profile is int ended for use by visitors and others who req uire access to certain resources on the netw ork (an Internet gatewa y or a network printer , fo r example) but must not have a ccess to the rest of the network.
Chapter 1 In troducing the NWA NWA-3500/NWA-3550 User’s Guide 29 Z yXEL ’s CAPW AP allows a single access point to manage up to eight other access points. The managed APs receive all their confi guration information from the controller AP . The CAPWAP dataflow is protected by DTLS (Datagr am T ransport Layer Security).
Chapter 1 Introducing the NWA NWA-3500/NWA-3550 User’s Guide 30 • SMT . System Management T erminal is a text -based configur ation menu that y ou can use to configure your device. Use T elnet to access the SMT . • FTP . File T ransfer Protocol for firmware upgr ades and configurati on backup and restore.
Chapter 1 In troducing the NWA NWA-3500/NWA-3550 User’s Guide 31 • Enable wireless securit y on your NW A. Choose the most secure encryption method that all devices on your network support. See Section 10.4 on page 150 for directions on configur ing en cryption.
Chapter 1 Introducing the NWA NWA-3500/NWA-3550 User’s Guide 32 1.8 LEDs This section applies to the NW A-3500 only . Figure 8 LEDs T able 3 LEDs LABEL LED COLOR STATUS DESCRIPTION 1 WL1 Green On The wireless adaptor WLAN1 is active. Blinking The wireless adaptor WLAN1 is active, and transmitting or receiving data.
Chapter 1 In troducing the NWA NWA-3500/NWA-3550 User’s Guide 33 2 WDS/SYS Green On The NWA is in AP + Bridge or Bridge/ Repeater mode, and has successfully established a Wireless Distribution System (WDS) connection. Red Flashing The NWA is starting up.
Chapter 1 Introducing the NWA NWA-3500/NWA-3550 User’s Guide 34.
NWA-3500/NWA-3550 User’s Guide 35 C HAPTER 2 Introducing the Web Configurator This chapter describes how to access the NWA’ s web configurator and provides an overview of its screens.
Chapter 2 Introducing the Web Configur ator NWA-3500/NWA-3550 User’s Guide 36 Note: If you do not change the password, the following screen appears every time you login. Figure 9 Change Password Screen 6 Click Apply in the Replace Certificate screen to create a certificate using y our NWA’ s MAC address that will be specific to this device.
Chapter 2 Introducing the Web Configurator NWA-3500/NWA-3550 User’s Guide 37 2.2 Resetting the NW A This replaces the current configur ation fi le with the factory -default configur ation file. This means that you will lose all th e settings you previously configured.
Chapter 2 Introducing the Web Configur ator NWA-3500/NWA-3550 User’s Guide 38 • Check the status bar at the bottom of the screen when you click Apply or OK to verify that the c onfiguration has been updated.
NWA-3500/NWA-3550 User’s Guide 39 C HAPTER 3 Status Screens The Status screen di splays when you log into the NWA, or click STATUS in the navigation menu. Use the Status screens to look at the current status of the device, sys tem resources, interfaces and SSID status.
Chapter 3 Sta tus Screens NWA-3500/NWA-3550 User’s Guide 40 3.1 The S t atus Screen Cluck Status . The following screen displays. The Status screen v aries slightly depending on the NWA’ s management mode you configured in the MGMT MODE screen. The NWA works as a standalone AP by default.
Chapter 3 Status Screens NWA-3500/NWA-3550 User’s Guide 41 System Information System Name This field displays the NW A system name. It is used for identification. Y ou can change this in the System > General screen’ s System Name field. Model This field displays the NW A’s exact model name.
Chapter 3 Sta tus Screens NWA-3500/NWA-3550 User’s Guide 42 R egistration T ype This field is av ailable only when the NWA is in AP controller management mode.
Chapter 3 Status Screens NWA-3500/NWA-3550 User’s Guide 43 SSID This field displays the SSID(s) currently used by each wireless module. BSSID This field displays the MAC address of the wireless adaptor . Security This field displays the type of wireless security used by each S SID.
Chapter 3 Sta tus Screens NWA-3500/NWA-3550 User’s Guide 44 3.1.1 AP List Click the AP List link the Status screen when the NW A is in AP controller management mode. Figure 14 S tatus > AP List The following table describes t he labels in this screen.
Chapter 3 Status Screens NWA-3500/NWA-3550 User’s Guide 45 3.1.2 AP S t atistics Click the AP Statistics link the Status screen when the NW A is in AP controller management mode. Figure 15 S tatus > AP S tatistics The following table describes t he labels in this screen.
Chapter 3 Sta tus Screens NWA-3500/NWA-3550 User’s Guide 46 3.1.3 SSID Information Click the SSID Information link the Status screen when the NWA is in AP controller management mode . Figure 16 S tatus > SSID Information The following table describes t he labels in this screen.
NWA-3500/NWA-3550 User’s Guide 47 C HAPTER 4 Management Mode This chapter discusses the MGNT MODE (Management Mode) screen. This screen determines whether the NW A is used in i ts default standalone AP mode or as part of a CAPWAP (Control An d Provisioni ng of Wireless Access Points) network.
Chapter 4 Manage ment Mode NWA-3500/NWA-3550 User’s Guide 48 4.1.1 CAPW AP Discovery and Management The link between CAPWAP-enabled a ccess points proceeds as follows: 1 An AP in managed AP mode joins a wi red network (receives a d ynamic IP address).
Chapter 4 Manag ement Mode NWA-3500/NWA-3550 User’s Guide 49 DHCP Option 43 allows the CAPWAP management request (from the AP in managed AP mode) to reach th e AP control ler in a diff erent subnet, as shown in the following figure . Figure 18 CAPW AP and DHCP Option 43 4.
Chapter 4 Manage ment Mode NWA-3500/NWA-3550 User’s Guide 50 Click MGNT MODE in the NW A’ s navigation menu . The following screen displa ys. Figure 19 The Ma nagement Mode Screen The following table describes t he labels in this screen.
Chapter 4 Manag ement Mode NWA-3500/NWA-3550 User’s Guide 51 Manual AP Controller IP Check this is you know the IP address of the controller AP that you w ant to manage this AP . • Primary AP Controller IP - Enter the IP address of the primary controller AP .
Chapter 4 Manage ment Mode NWA-3500/NWA-3550 User’s Guide 52.
NWA-3500/NWA-3550 User’s Guide 53 C HAPTER 5 Controller AP Mode 5.1 Overview This chapter discusses the Controller AP management mode. When the NW A is used as a CAPW AP (Control And Pro visioning of Wireless Access P oints) controll er AP , the We b Configurator changes to reflect this by including the Controller and Profile Edit screens.
Chapter 5 C ontroller AP Mo de NWA-3500/NWA-3550 User’s Guide 54 In the figure below , an administr ator is ab le to manage t he security settings of 5 APs (1 controller AP and 4 managed APs ). He changes the s ecurity mode to WP A- PSK just by accessing the W eb Configurator of the controller AP ( C ).
Chapter 5 Controller AP Mode NWA-3500/NWA-3550 User’s Guide 55 After logging in again, the na vigation menu changes to include links f or the Controller and Profile Edit screens. The items marked below are scree ns that can be configured for all APs managed by the NWA.
Chapter 5 C ontroller AP Mo de NWA-3500/NWA-3550 User’s Guide 56 Figure 23 AP Controller: the S tatus Screen The following table describes the new labels in this screen. T able 9 AP Con troller: the S tatus Scre en LABEL DESCRIPTION Registration T ype This field displ ays how the managed APs are registered with the NWA.
Chapter 5 Controller AP Mode NWA-3500/NWA-3550 User’s Guide 57 5.4 AP List Screen Use this screen to view and add manage d APs. By default, the NW A is always included in this tabl e. Although you cann ot remov e it, you can edit i ts settings. Click Controller > AP Lists .
Chapter 5 C ontroller AP Mo de NWA-3500/NWA-3550 User’s Guide 58 Status This displays whether the man aged AP is active, not active or upgrading its firmware. • Red : the AP is not active. • Green : the AP is active. • Yellow : the AP is upgrading its firmw are.
Chapter 5 Controller AP Mode NWA-3500/NWA-3550 User’s Guide 59 5.4.1 The AP List s Edit Screen Use this screen to change th e description or radio profile of an AP managed by the NWA. Click Edit in the CONTROLL ER > AP Lists screen. The following screen displays.
Chapter 5 C ontroller AP Mo de NWA-3500/NWA-3550 User’s Guide 60 5.5 Configuration Screen Use this screen to control the way in which the NWA acc epts new APs to manage. Y ou can also configure the pre-shared key (PSK) that is use to secure t he data transmit ted between the NWA and the APs it manages.
Chapter 5 Controller AP Mode NWA-3500/NWA-3550 User’s Guide 61 5.6 Redundancy Screen Use this screen to set t he controller AP as a primary or secondary controller . If you set your NW A as a primary controller AP , you can hav e a secondary controller AP to serve as a backup.
Chapter 5 C ontroller AP Mo de NWA-3500/NWA-3550 User’s Guide 62 5.7 The Profile Edit Screens This section describes the Profile Edit screens, which are available on ly in A P controller mode. The following Profile Edit screens are identical to those in regular mode: •T h e Profile Edit > SSID screen (see Section 9.
Chapter 5 Controller AP Mode NWA-3500/NWA-3550 User’s Guide 63 The following table describes t he labels in this screen. T able 13 The Profile Edit > Radio Screen LABEL DESCRIPTION Index This field displays the inde x number of each r adio profile.
Chapter 5 C ontroller AP Mo de NWA-3500/NWA-3550 User’s Guide 64 5.8 The Radio Profile Edit Screen Use this screen to conf igure a specific r adio profile. In the Profile Edit > Radio screen, select a profile and click Edit . The following screen displays.
Chapter 5 Controller AP Mode NWA-3500/NWA-3550 User’s Guide 65 The following table describes t he labels in this screen. T able 14 The Profile Edit > Radio > Edit Screen LABEL DESCRIPTION Profile Name Enter a name identifying this profile. 802.
Chapter 5 C ontroller AP Mo de NWA-3500/NWA-3550 User’s Guide 66 Rates Configuration This section controls the data r ates permitted for clients of an AP using this radio profile. For e a c h Rate , select an option from the Configuration list. The options are: Basic (1~11 Mbps only): Clients can always connect to the access point at this speed.
NWA-3500/NWA-3550 User’s Guide 67 C HAPTER 6 Tutorial This chapter first provides an overview of how to configure the wireless LAN on your NW A, and then gives step -by-step gu idelines showing how to configure your NWA for some example scenarios. 6.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 68 6.1.1.1 Configuring Dual WLAN Adaptors The NWA i s equipped with dual wireless adaptors. This means you can configure two different wireless networks to operate simultaneously . See Section 1.2.6 on page 28 for details.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 69 Figure 31 Configuring Wireless L AN S elect Operating Mode Access Point Bridge / Repeater Mo de. AP + Bridge Mode. MBSSID Mode. Select 802.1 1 Mode and Channel ID . Select SSID Configure SSID P rofile .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 70 6.1.3 Further Reading Use these links to find more information on the steps: • Choosing 802.11 Mode : see Section 8.4.1 on page 123 . • Choosing a wireless Channel ID : see Section 8.4.1 on page 123 .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 71 The following figure shows the multiple ne tworks you want to set up. Y our NWA is marked Z , the main network router is marked A , and your network printer is marked B . Figure 32 T utorial: Example MBSSID Setup The standard network ( SSID04 ) has access to all resources.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 72 6.2.1 Change the Operating Mode Log in to the NWA (see Section 2.1 on page 35 ). Clic k WIRELESS > Wireless . The Wireless screen appears. In this exampl e, the NW A is using WLAN Interface 1 in Access Point oper ating mode, and is currently set to use the SSID04 profile.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 73 Select MBSSID from the Operat ing Mode dr op-down list box. The screen displays as foll ows. Figure 34 T utorial: Wireless LAN: Change Mode This Select SSID Profile table allows you to activate or deactivate SSID profiles.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 74 network’ s par ameters, so when you set up security for the VoIP_SSID and Guest_SSID profiles you will need to set different security profiles.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 75 • Choose a new SSID for the V oIP ne twork. In this example, enter VOIP_SSID_Example . Note that al though the SSID changes, the S SID profile name ( VoIP_SSID ) remains the same as before. • Select Enable from the Hide Na me (SSID) list box.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 76 Y ou already chose to use the security02 profile for this netw ork, so select the radio button for security02 and click Edit .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 77 6.2.2.2 Activate the V oIP Profile Y ou need to activate the VoIP_SSID profil e before it can be used. Click the Wireless tab. In the Select SSID Profile table, select the VoIP_SSID profile’s Active checkbox and click Apply .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 78 Click WIRELESS > SSID . Selec t Guest_SSID ’ s entry in the list and click Edit . The following screen appears. Figure 41 T utorial: Guest Edit • Choose a new SSID for the guest network. In this example, enter Guest_SSID_Example .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 79 Y ou already chose to use the security03 profile for this ne twork, so select security03 ’ s entry in the list and click Edit .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 80 6.2.3.2 Set up Layer 2 Isolation Configure layer 2 isolation to control the speci fic devices you w ant the users on your guest network to access. Click WIRELESS > Layer-2 Isolation . The following screen appears.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 81 The Guest_SSID network uses the l2isolation01 profile by defau lt, so select its entry and click Edit .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 82 6.2.3.3 Activate the Guest Profile Y ou need to activate the Guest_SSID prof ile before it can be us ed. Click the Wireless tab. In the Select SSID Profile table, select the check box for the Guest_SSID profile and click Apply .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 83 6.3 How to Set Up and Use Rogue AP Detection This example shows you how to configur e the rogue AP detection feature on the NWA. A rogue AP is a wireless access point oper ating in a network’ s coverage area that is not a sanctioned part of that networ k.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 84 E , and a computer , marked F , connected to the wired network. The coffee shop’ s access point is marked 1 .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 85 Note: The NW A can detect the MAC addre sses of APs automatically . However , it is more secure to obt ain the correct MAC addresses from an other source and add them to the friendly AP list manually .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 86 Note: Y ou can add APs that are not p art of your network to the friendly AP list, as lo ng as you know that they do not pose a threat to your network’s security . The Friendly AP screen now appears as follows.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 87 3 Next, you will sa ve the list of friendly APs i n order to provide a backup and upload it to your ot her access points. Click the Configuration tab.The following screen appears. Figure 50 T utorial: Configuration 4 Click Export .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 88 5 Save the friendly AP list somewhere it can be accessed by al l the other access points on the network. In this example, save it on the net work file server ( E in Figure 47 on page 84 ). The default filename is “Flist” .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 89 4 Click Apply . 6.3.3 Set Up E-mail Logs In this section, you will configure the firs t of y our four APs to send a log message to your e-mail inbox whenever a rogue AP is disco vered in your wireless network’ s cover age area.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 90 • Enter a subject line for the alert e-mails in the Mail Subject field. Choose a subject that is eye- catching and identifi es the access point - in this examp le, “ ALER T_Access_P oint_A ” .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 91 • Log into each AP’ s W e b configur ator and click ROGUE AP > Rogue AP . Click Refresh . If any of the MAC addresses from T able 17 on page 86 appear in the list, the fr iendly A P function may be incorrectly configured - check t he ROGUE AP > Friendly AP screen.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 92 NWA i s marked Z . C is a workstatio n on your wired netw ork, D is your main network switch, and E is the security gateway you use to connect to the Internet. Figure 55 T utorial: Example Network 6.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 93 1 Configure th e SERVER_1 network’ s SSID pr ofile to use specific MAC filter and layer -2 isolation profiles. 2 Configure th e SERVER_1 network’ s MAC filter profile. 3 Configure th e SERVER_1 network’ s lay er-2 isolation profile.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 94 1 Log into the NW A’ s W eb Configur ator and click WIRELESS > SSID . The following screen displays, showing the SS ID profiles you already configured. Figure 56 T utorial: SSID Profile 2 Select SERVER_1 ’ s entry and click Edit .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 95 3 Click the Layer-2 Iso lation tab . When the Layer-2 Isolation screen appears, select L2Isolation03 ’s e n t r y a n d c l i c k Edit .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 96 6.4.5 Configure the SER VER_2 Network Next, you will configure the SERVER_2 network that allows Bob to access secure server 2 and the Internet. T o do this, repeat the procedure in Sect ion 6.4.4 on page 93 , subst ituting the following in formation .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 97 1 Click WIRELESS > Wireless . Check that the Operating Mode is MBSSID and that the correct SSID profiles are selected and activ ated, as shown in the following figure. Figure 60 T utorial: SSID Profi les Activa ted 2 Next, click the SSID tab .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 98 6.4.6.2 T esting the Configuration Before you allow employ ees to use the ne twork, y ou need to thoroughly test whether the setup behaves as it should. T ake the following steps to do this. 1 Te s t t h e SERV ER_1 network.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 99 6.5 How to Configure Management Modes This example shows you how t o configure the NW A’ s controller AP and manage AP modes. 6.5.1 Scenario In this example, you are the administr ator of a company network wherein a gr oup of users need stable wireless connection.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 100 6.5.3 Setup In this example, each of your NWA standalo ne AP mirror each other . They all have the same SSID profiles stored. First you need to download the configuration file from one of your NWAs for backup purposes.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 101 6.5.4 Configure Y our NW A in Controller AP Mode The NWA i s set to Standalone AP mode by default.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 102 1 T o set your NWA in secondary controller AP mode, open the Controller > Redundacy screen (this screen only appears when the NW A is in Controller AP mode) in the W eb Configurator of the NW A that you want to serv e as backup.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 103 6.5.5 Setting Y our NW A in Managed AP Mode After setting the NW As ( A and E ) to controller AP modes, y ou can now transform the NWAs ( B , C and D ) in the 2nd, 3rd and 4th floors of your company building to manage d APs.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 104 6.5.6 Configuring the Managed Access Point s List At this point, you have 3 NWA managed APs ( B , C and D ) that can now be managed b y the prima ry controlle r AP . First in the W eb Config urator of your primary control ler AP ( A ), go to Cont roller > Configuration .
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 105 2 Select the NW A managed APs from the Un- Managed Access Points List as shown in the screen above.
Chapter 6 Tutorial NWA-3500/NWA-3550 User’s Guide 106 In this example, the 1st floor NWA managed AP uses radio06 for its WLAN1 Radio Profile . The WLAN2 r adio is disabled . Refer t o Section 5.7.1 on page 62 for instructions on how to set up WLAN r adio profiles i n the NW A controller APs.
107 P ART II The W eb Configurator System Screens (109) Wireless Configur ation (119) SSID Screen (141) Wireless Security Screen (147) RADIUS Screen (161) Layer -2 Isolation Screen (165) MAC Filter Sc.
108.
NWA-3500/NWA-3550 User’s Guide 109 C HAPTER 7 System Screens 7.1 Overview This chapter provides information and i nstructions on how to identify and manage your NW A ov er the network. Figure 72 NW A Setup In the figure above, the NWA connects to a Domain Name Server (DNS) server to av ail of a domain name.
Chapter 7 System Screens NWA-3500/NWA-3550 User’s Guide 11 0 •U s e t h e Time Setting screen (see Section 7.6 on page 116 ) to change your NWA’ s time and date. This screen allows you to configure the NW A’ s time based on your local time zone.
Chapter 7 S ystem Scre ens NWA-3500/NWA-3550 User’s Guide 111 reserved this block of addresses specifical ly for priv ate use; please do not use any other number unless you are told otherwise. Let's say y ou select 192.168.1.0 as the network number; which c overs 254 indi vidual addresses, from 192.
Chapter 7 System Screens NWA-3500/NWA-3550 User’s Guide 11 2 7.4 General Setup Screen Use the General screen to identify your NWA over the network. Click System > General . The following screen displays. Figure 73 System > General The following table describes t he labels in this screen.
Chapter 7 S ystem Scre ens NWA-3500/NWA-3550 User’s Guide 11 3 7.5 Configuring the Password It is strongly recommended that you change your NWA’ s password. Click SYSTEM > Password . The screen appears as shown. If you forget your NW A’ s password (or IP address), you will need to reset the device.
Chapter 7 System Screens NWA-3500/NWA-3550 User’s Guide 11 4 Note: Regardless of how you configure this screen, you st ill use the local system password to log in via the console port (for internal use only). Figure 74 System > Password. The following table describes t he labels in this screen.
Chapter 7 S ystem Scre ens NWA-3500/NWA-3550 User’s Guide 11 5 P assword T ype a password (up to 31 ASCII characters) for this user profile. Note that as you type a password, the screen displays a (*) for each character y ou type. Spaces are allowed.
Chapter 7 System Screens NWA-3500/NWA-3550 User’s Guide 11 6 7.6 Configuring T ime Setting T o change your NWA’ s time and date, cli ck SYSTEM > Time Setting . The screen appears as shown. Use this screen to configure the NWA’ s time based on your local tim e zone.
Chapter 7 S ystem Scre ens NWA-3500/NWA-3550 User’s Guide 11 7 New Date (yyyy:mm:dd) This field displays the last updated date from the time server or the last date configured manually . When you set Time and Date Setup to Manual , enter the new date in this field and then click Apply .
Chapter 7 System Screens NWA-3500/NWA-3550 User’s Guide 11 8 7.7 T echnical Reference This section provides technical background information about the topics cov ered in this chapter . Pre-defined NTP Time Servers List When you turn on the NW A for the first ti me, the date and time start at 2000-01- 01 00:00:00.
NWA-3500/NWA-3550 User’s Guide 11 9 C HAPTER 8 Wireless Configuration 8.1 Overview This chapter discusses the steps to confi g ure the Wireless Settings screen on the NWA.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 120 8.3 What Y ou Need T o Know The following are wireless network terminol og ies that are relevant to this chapter .
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 121 their associated wireless stations within the same ESS must hav e the same ESSID in order to comm unicate. Figure 78 Extended Service Set 8.3.1 Operating Mode The NWA can run in four operating modes as fol lows: • AP (Access Point) .
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 122 SSID The SSID (Service Set IDenti fier) identifies the Service Set wi th which a wireless station is associated. Wireless stations a ssociating to the access point (AP) must have the same SSID .
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 123 MBSSID should not replace but r ather be used in conjunction with 802.1x securit y . 8.4 Configuring Wireless Settings Click WIRELESS > Wireless . The sc reen vari es depending upon the oper ating mode you select.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 124 The following table describes t he genera l wireless L AN labels in this screen. T able 27 Wireless: Access Point LABEL DESCRIPTION WLAN Interface Select which WLAN adapter you w ant to configure.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 125 RT S / C T S Threshold The threshold (number of bytes) fo r enabling RT S/CTS handshake.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 126 8.4.2 Bridge / Repeater Mode The NWA can act as a wireless network bridge and establis h wireless links with other APs. Y o u need to know th e MAC addr ess of the peer device, which also must be in bridge mode.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 127 T o have the NWA act as a wireless bridge only , click WIRELESS > Wireless and select Bridge / Repeater as the Operating Mode .
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 128 The following table describes t he bridge labels in this screen. T able 28 Wireless: Bridge / Repeater LABEL DESCRIPTIONS Operating Mode Select Bridge / Repeater in this field.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 129 See T able 27 on page 124 for information on the other label s in this screen. 8.4.3 AP + Bridge Mode Select AP + Bridge as the Operating Mode in the WIRELESS > Wireless screen to hav e the NWA function as a br idge and access point simultaneously .
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 130 See the tables describing the fields in the Access Point and Bridge / Repeater operating modes for descriptions of the fields in this screen. 8.4.4 MBSSID Mode Use this screen to have the NW A function in MBSSID mode.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 131 The following table describes t he labels in this screen. See T able 27 on page 124 for information on the other label s in this screen. 8.5 T echnical Reference This section provides technical background information about the topics cov ered in this chapter .
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 132 to propagate to the root bridge and unw anted learned addresses are flushed from the filtering database. In RSTP , the port states are Discarding, Learning, and For w a rd i n g . 8.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 133 8.5.1.4 STP Port St ates STP assigns five port states (see next table) to eliminate pack et looping. A bridge port is not allowed to go directly from blocking state to forwardi ng state so as to eliminate transient loops.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 134 The roaming feature on the access points allows the acces s points to relay information about t he wireless stations to each other .
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 135 5 Access point AP 1 updates the new position of wireless station Y . 8.5.3.1 Requirement s for Roaming The following requirements must be met in order for wireless stations to roam between the cover age areas.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 136 8.5.4 Bridge / Repeater Example This section shows an example of two NW As in Bridge/Repeater mode forming a WDS (Wireless Distribution S ystem) and allowing the computers in LAN 1 to connect to the computers in LAN 2 .
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 137 • If your NWA (in bridge mode) is connec ted to a wired LAN while communicating with another wireless bridge that is also connected to the same wired LAN.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 138 reductions in data tr ansmission for applications that are sensitive to l atency (delay) and jit ter (variations in delay). 8.5.6.1 WMM QoS Priorities The following table descri bes the WMM QoS priority lev els that the NW A uses.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 139 When A TC is activ ated, the device sends tr affic with smaller packets before tr affic with larger packets if the network is congested. A TC assigns priorit y to packets as shown in the following table.
Chapter 8 Wireless Configuration NWA-3500/NWA-3550 User’s Guide 140 The following table shows how priorit ies are assigned for packets coming from the LAN to the WLAN. 8.5.8.2 A TC+WMM from WLAN to LAN A TC+WMM from WLAN to LAN automatically prioritizes (assigns an A TC value to) all packets comi ng from the WLAN.
NWA-3500/NWA-3550 User’s Guide 141 C HAPTER 9 SSID Screen 9.1 Overview This chapter describes how y ou can configure Service Set Identifier (SSID) profiles in your NWA.
Chapter 9 SSID Screen NWA-3500/NWA-3550 User’s Guide 142 9.3 What Y ou Need T o Know When the NWA is set to Access Point , AP + Bridge or MBSSID mode, you ne ed to choose the SSID profile(s) you want to use in your wireless network (see Chapter 1 on page 31 for more informatio n on operating modes).
Chapter 9 SSID Screen NWA-3500/NWA-3550 User’s Guide 143 9.4 The SSID Screen Use this screen to select the SSID pr ofile you want to configure. Click Wireless > SSID to display the screen as shown. Figure 89 Wirele ss > SSID The following table describes t he labels in this screen.
Chapter 9 SSID Screen NWA-3500/NWA-3550 User’s Guide 144 9.4.1 Configuring SSID Use this screen to configure an SSID profile. Select a n SSID profile in Wireless > SSID and click Edit to display the following screen. Figure 90 Wireless > SSI D > Edit The following table describes t he labels in this screen.
Chapter 9 SSID Screen NWA-3500/NWA-3550 User’s Guide 145 QoS Select the Quality of Service priority for this BS S’s tr affic. • In the pre-configured VoIP_SSID profile, the QoS setting is VoIP . This is not user-configur able. The VoIP setting is available only o n the VoIP_SSID profile, and provides the highest level of QoS .
Chapter 9 SSID Screen NWA-3500/NWA-3550 User’s Guide 146.
NWA-3500/NWA-3550 User’s Guide 147 C HAPTER 10 Wireless Security Screen 10.1 Overview This chapter describes how to use t he Wireless Secu rity screen. This screen allows y ou to configure the security mode for your N WA. Wireless security is vital to your net w ork.
Chapter 10 Wire less Security Screen NWA-3500/NWA-3550 User’s Guide 148 10.3 What Y ou Need T o Know User Authentication Authentication is the process of v erifying whether a wireless device is allowed to use the wireless network. Y ou can make every user log in to the wireless ne twork before they can use it.
Chapter 10 Wire less Security Sc reen NWA-3500/NWA-3550 User’s Guide 149 • 802.1x-Only. This is a standard that extends the features of IEEE 802. 11 to support extended authentication. It prov ides additional accounting and control features. This option do es not support data encryption.
Chapter 10 Wire less Security Screen NWA-3500/NWA-3550 User’s Guide 150 Microsoft Challenge Handshake Authenticati on Protocol V ersion 2 (MSCHAPv2) or Generic T oken Card (GTC). Further information on these terms can be found in Appendix B on page 233 .
Chapter 10 Wire less Security Sc reen NWA-3500/NWA-3550 User’s Guide 151 After selecting the securit y profile y ou want to edit, the following screen appears. Enter the na me you want to call th is security pr ofile in the Profile Name field. Figure 93 Security: Profile Name The next screen varies according to the Se curity Mode you select.
Chapter 10 Wire less Security Screen NWA-3500/NWA-3550 User’s Guide 152 The following table describes t he labels in this screen. T able 41 Wireless > Security: WEP LABEL DESCRIPTION Profile Name T ype a name to identify this security profile. Security Mode Choose WEP in this field .
Chapter 10 Wire less Security Sc reen NWA-3500/NWA-3550 User’s Guide 153 10.4.2 Security: 802.1x Only Use this screen to set t he selected profile to 802.1x Only securit y mode. Select 802.1x-Only in the Security Mode field to dis play the following screen.
Chapter 10 Wire less Security Screen NWA-3500/NWA-3550 User’s Guide 154 10.4.3 Security: 802.1x S t atic 64-bit, 802.1x S t atic 128-bit Use this screen to set the selected prof ile to 802.1x Static 64 or 802.1x Stati c 128 security mode. Select 802.
Chapter 10 Wire less Security Sc reen NWA-3500/NWA-3550 User’s Guide 155 10.4.4 Security: WP A Use this screen to set the select ed profil e to Wi -Fi Protected Access (WP A) security mode.Select WPA in the Security Mode field to display the foll owing screen.
Chapter 10 Wire less Security Screen NWA-3500/NWA-3550 User’s Guide 156 10.4.5 Security: WP A2 or WP A2-MIX Use this screen to set the selected prof ile to WP A2 or WP A2-MIX security mode. Select WPA2 or WPA2-MIX in the Security Mode field to displa y the following screen.
Chapter 10 Wire less Security Sc reen NWA-3500/NWA-3550 User’s Guide 157 The following table descri bes the labels not previously discus sed T able 45 Wireless > Security: WPA2 or WPA2-MIX LABEL DESCRIPTIONS Profile Name T ype a name to identify this security profile.
Chapter 10 Wire less Security Screen NWA-3500/NWA-3550 User’s Guide 158 10.4.6 Security: WP A-PSK , WP A2-PSK, WP A2-PSK-MIX Use this screen to set the selected prof ile to WP A -PSK, WP A2-PSK or WP A2-PSK - MIX security mode. Select WPA-PSK , WPA2-PSK or WPA2-PSK-MIX in the Security Mode field to display the following screen.
Chapter 10 Wire less Security Sc reen NWA-3500/NWA-3550 User’s Guide 159 10.5 T e chnical Reference This section provi des technical background information on the topics discussed in this chapter . The following is a gener al guideline in ch oosing the securit y mode for your NW A.
Chapter 10 Wire less Security Screen NWA-3500/NWA-3550 User’s Guide 160.
NWA-3500/NWA-3550 User’s Guide 161 C HAPTER 11 RADIUS Screen 1 1.1 Overview This chapter describes how y ou can use the Wireless > RADIUS screen. Remote A uthentication Dial In User Serv ice (RADIUS) is a protocol that can be used to manage user access to large networks.
Chapter 11 RADIUS Screen NWA-3500/NWA-3550 User’s Guide 162 1 1.3 What Y ou Need T o Know The RADIUS server handles the following tasks: • Authentication which determines the identity of the users. • Authorization which determines the networ k services avai lable to authenticated users once they are connected to the network.
Chapter 11 RADIUS Screen NWA-3500/NWA-3550 User’s Guide 163 1 1.4 The RADIUS Screen Use this screen to set up y our NW A’ s RADIUS server settings. Cl ick Wireless > RADIUS . The screen appears as shown. Figure 101 Wireless > RADIUS The following table describes t he labels in this screen.
Chapter 11 RADIUS Screen NWA-3500/NWA-3550 User’s Guide 164 Internal Select this check box to use the NW A’ s internal authentication server . The Active , RADIUS Serv er IP Address , RADIUS Serv er Port and Share Secret fields are not available when you use the internal authentication server .
NWA-3500/NWA-3550 User’s Guide 165 C HAPTER 12 Layer-2 Isolation Screen 12.1 Overview This chapter describes ho w y ou can configure th e Layer-2 Isolation screen on your NWA. Layer -2 isolation is used to prevent wireless clients associated with your NW A from communicating with other wireless c lients, APs, computers or rout ers in a network.
Chapter 12 Layer-2 Iso lation Screen NWA-3500/NWA-3550 User’s Guide 166 MAC addresses that are not listed in the Allow devices with these MAC addresses table of the Wireless > Layer-2 Isolation screen are blocked from communicating with the NW A’ s wireless c lients except for broadcast packets.
Chapter 12 Layer-2 Isolation Screen NWA-3500/NWA-3550 User’s Guide 167 12.4 The Layer-2 Isolation Screen Use this screen to select and configure a layer-2 is olation profile.
Chapter 12 Layer-2 Iso lation Screen NWA-3500/NWA-3550 User’s Guide 168 Note: When configuring this screen, remember to select the correct layer-2 isolation profile in the Wireless> SSID > Edit screen of the relevant SSID profile. Figure 104 Wireless > Layer-2 Isolation > Edit The following table describes t he labels in this screen.
Chapter 12 Layer-2 Isolation Screen NWA-3500/NWA-3550 User’s Guide 169 12.5 T e chnical Reference This section provi des technical background information on the topics discussed in this chapter . The figure that follows i llustrates two ex ample layer -2 isolation configurations on your NWA ( A ).
Chapter 12 Layer-2 Iso lation Screen NWA-3500/NWA-3550 User’s Guide 170 •E n t e r C ’ s MAC address in the MAC Address field, and enter “File Server C” in the Description field.
NWA-3500/NWA-3550 User’s Guide 171 C HAPTER 13 MAC Filter Screen 13.1 Overview This chapter discusses how you can use the Wireless > MAC Filter screen. The MAC filter function allows you to configure the NW A to grant access to devices (Allow Association) or ex clude devices from accessing the NW A (Den y Association).
Chapter 13 MAC Filt er Screen NWA-3500/NWA-3550 User’s Guide 172 13.3 What Y ou Should Know About MAC Filter Every Ethernet dev ice has a unique MAC (Media Access Cont rol) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
Chapter 13 MAC Filter Scr een NWA-3500/NWA-3550 User’s Guide 173 The following table describes t he labels in this screen. 13.4.1 Configuring the MAC Filter T o change your NWA’s MAC filter setti ngs, click WIRELESS > MAC Filter > Edit . The screen appears as shown.
Chapter 13 MAC Filt er Screen NWA-3500/NWA-3550 User’s Guide 174 Note: T o activate MAC filtering on an SSID profile , select the correct filter from the Enable MAC Filtering drop-down list box in the Wir ele ss > SSID > Edit screen and click Apply Index This is the index number of the MAC address.
NWA-3500/NWA-3550 User’s Guide 175 C HAPTER 14 IP Screen 14.1 Overview This chapter describes how y ou can co nfigure the IP addr ess of your NW A. The Internet Protocol (IP) address iden tifies a devi ce on a network. Every networking device (inclu ding computers, se rvers, routers, printers, etc.
Chapter 14 IP Screen NWA-3500/NWA-3550 User’s Guide 176 14.3 What Y ou Need T o Know About IP The Ethernet parameters of the NW A are pr eset in the factory with the following val u e s : 1 IP address of 192.168.1.2 2 Subnet mask of 255.255.255.0 ( 24 bits) These parameters should work fo r the majority of installations.
Chapter 14 IP Scree n NWA-3500/NWA-3550 User’s Guide 177 14.5 T e chnical Reference This section provides technical background information about the topics cov ered in this chapter . 14.5.1 W AN IP Address Assignment Every computer on the Internet must have a unique IP address.
Chapter 14 IP Screen NWA-3500/NWA-3550 User’s Guide 178.
NWA-3500/NWA-3550 User’s Guide 179 C HAPTER 15 Rogue AP Detection 15.1 Overview This chapter discusses rogue wireless a ccess points and how to configure the NWA’ s rogue AP detection feature.
Chapter 15 Rogue AP Detection NWA-3500/NWA-3550 User’s Guide 180 (the dashed ellipse B ) is well-secured, but the rogue AP uses inferior security that is easily broken by an attacker ( X ) runni ng readily av ailable encryption-crac king software.
Chapter 15 Rogue AP Detectio n NWA-3500/NWA-3550 User’s Guide 181 that of a neighbor (for example) you should also add these APs to the list, as they do not compromise your own network’ s security . If you do not add them to the friendly AP list, these access points will appear in the Rogue AP list each time the NWA sc ans.
Chapter 15 Rogue AP Detection NWA-3500/NWA-3550 User’s Guide 182 15.3.1 Configuration Screen Use this screen to enable your NW A’ s Rogue AP detection settings. Cl ick Rogue AP > Configuration . The following screen appears: Figure 1 15 Rogue AP > Configuration The following table describes t he labels in this screen.
Chapter 15 Rogue AP Detectio n NWA-3500/NWA-3550 User’s Guide 183 15.3.2 Friendly AP Screen Use this screen to specif y APs as trusted. Click Rogue AP > Friendly AP . The following screen appears: Figure 1 16 Rogue AP > Friendly AP The following table describes t he labels in this screen.
Chapter 15 Rogue AP Detection NWA-3500/NWA-3550 User’s Guide 184 15.3.3 Rogue AP Screen Use this scren to dis play details of al l wireless access points within the NW A’ s cover age area. Click Rogue AP > Rogue AP . The following screen displays .
Chapter 15 Rogue AP Detectio n NWA-3500/NWA-3550 User’s Guide 185 Description If you w ant to move the AP’ s entry to the friendly AP list, enter a short, explanatory description iden tifying the AP before you click Add to Friendly AP List . A maximum of 32 alphanumeric characters are allowed in this field.
Chapter 15 Rogue AP Detection NWA-3500/NWA-3550 User’s Guide 186.
NWA-3500/NWA-3550 User’s Guide 187 C HAPTER 16 Remote Management Screens 16.1 Overview This chapter shows you how t o enable remote management of your NW A. It provides information on determining whic h services or protocols can access whic h of the NWA’ s interfaces.
Chapter 16 Remo te Management Scree ns NWA-3500/NWA-3550 User’s Guide 188 16.2 What Y ou Can Do in the Remote Management Screens •U s e t h e Telnet screen (see Section 16.4 on page 190 ) to con figure through which interface(s) and from which IP address(es) y ou can use T elnet to manage the Z yXEL Device.
Chapter 16 Remot e Management Screens NWA-3500/NWA-3550 User’s Guide 189 versi on o ne ( SN MPv1 ) an d ve rsio n tw o ( SNM Pv2c). The next figure illustr ates an SNMP management oper ation.
Chapter 16 Remo te Management Scree ns NWA-3500/NWA-3550 User’s Guide 190 1. T elnet 2. HTTP System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The NWA automatically logs you out if the management session remains idle for longer t han this timeout period.
Chapter 16 Remot e Management Screens NWA-3500/NWA-3550 User’s Guide 191 16.5 The FTP Screen Y ou can upload and download the NWA’ s firmware and configuration files using FTP . T o use th is feature, your computer must have an FTP client. T o change your NW A’ s FTP settings, click REMOTE MGMT > FTP .
Chapter 16 Remo te Management Scree ns NWA-3500/NWA-3550 User’s Guide 192 The following table describes t he labels in this screen. 16.6 The WWW Screen Y ou can choose to conf igure your NWA via the W orld Wide W eb ( WWW) using a W eb browser .
Chapter 16 Remot e Management Screens NWA-3500/NWA-3550 User’s Guide 193 The following table describes t he labels in this screen. T able 59 Remote MGNT > WWW LABEL DESCRIPTION WWW Server P ort Y.
Chapter 16 Remo te Management Scree ns NWA-3500/NWA-3550 User’s Guide 194 16.7 The SNMP Screen Use this screen to ha ve a manager stat ion administrate y our NW A over the network. T o change your NW A’ s SNMP settings, click REMOTE MGMT > SNMP .
Chapter 16 Remot e Management Screens NWA-3500/NWA-3550 User’s Guide 195 16.8 T e chnical Reference This section provi des some technical background informatio n about the topics covered in th is chapte r .
Chapter 16 Remo te Management Scree ns NWA-3500/NWA-3550 User’s Guide 196 device. Examples of v ariables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.SNMP itself is a simple request/ response protocol based on the manager/ agent model.
Chapter 16 Remot e Management Screens NWA-3500/NWA-3550 User’s Guide 197 Some traps include an SNMP interface i n dex. The following table maps the SNMP interface indexes to the NW A’ s physical and virtual ports. authenticationF ailure (defined in RFC-1215 ) 1.
Chapter 16 Remo te Management Scree ns NWA-3500/NWA-3550 User’s Guide 198.
NWA-3500/NWA-3550 User’s Guide 199 C HAPTER 17 Internal RADIUS Server 17.1 Overview This chapter describes how the NWA can use its internal RADIUS server to authenticate wireless clients. Remote A uthentication Dial In User Serv ice (RADIUS) is a protocol that enables you to control access to a network by aut henticating user credentials.
Chapter 17 Internal RADIUS Server NWA-3500/NWA-3550 User’s Guide 200 17.2 What Y ou Can Do in the Internal Radius Server Screens •U s e t h e AUTH. SERVER > Setting screen (see Section 17.4 on page 200 ) to turn the NW A’s internal RADIUS server o ff or on and to view information about the NWA’ s certificates.
Chapter 17 Internal RADIUS Server NWA-3500/NWA-3550 User’s Guide 201 Click AUTH. SERVER > Setting . The following screen displays. Figure 125 Setting Screen The following table describes t he labels in this screen.
Chapter 17 Internal RADIUS Server NWA-3500/NWA-3550 User’s Guide 202 17.5 The T rusted AP Screen Use this screen to specif y APs as trusted. Click AUTH.
Chapter 17 Internal RADIUS Server NWA-3500/NWA-3550 User’s Guide 203 Figure 126 T rusted AP Scree n The following table describes t he labels in this screen. T able 64 Trusted AP Screen LABEL DESCRIPTION # This field displays the trusted AP index number .
Chapter 17 Internal RADIUS Server NWA-3500/NWA-3550 User’s Guide 204 17.6 The T rusted Users Screen Use this screen to conf igure trusted user entries. Click AUTH. SERVER > Trusted Users . The following screen displays. Figure 127 T rusted Users Screen The following table describes t he labels in this screen.
Chapter 17 Internal RADIUS Server NWA-3500/NWA-3550 User’s Guide 205 17.7 T e chnical Reference This section provi des some technical background informatio n about the topics covered in th is chapte r . A trusted AP is an AP that uses the NW A’ s internal RADI US server to a uthentica te its wireless client s.
Chapter 17 Internal RADIUS Server NWA-3500/NWA-3550 User’s Guide 206 Note: The internal RADIUS server does not support domain acco unts (DOMAIN/ user). When you configure your Windows XP SP2 Wireless Zero Configuration PEAP/MS-CHAPv2 settings, deselect the Use Windows logon name and password check box.
NWA-3500/NWA-3550 User’s Guide 207 C HAPTER 18 Certificates 18.1 Overview This chapter describes how your NWA can use certificates as a means of authenticating wireless cl ients. It giv e s background information about public -key certificates and explains how to use them.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 208 18.3 What Y ou Need T o Know A Certification Authorit y (CA) issues certificates and guarantees the identit y of each certificate owner . There are comm ercial certification aut horities like CyberT rust or V eriSign and gov ernment certification authorities.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 209 Note: Certificates display in black and certification requests display in gray . Figure 130 Certificates > My Certif icates The following table describes t he labels in this screen.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 210 18.4.1 My Certificates Import Screen Use this screen if you ha ve an existing CA -issued certificate you want to use for authentication. F ollow the instructions in th i s screen to sav e it to the NW A.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 21 1 Note: Y ou can import only a certificate th at matches a corresponding certification request that was generated by the NW A. Note: The certificate you import replace s the corresponding request in the My Certificates screen.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 212 Click Certificates > My Certificates and then Create to open the My Certificate Create screen. The following figure displ ays. Figure 132 Certificates > My Certif icate Create The following table describes t he labels in this screen.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 213 Organization T ype up to 127 characters to identify the company or group to which the certificate owner belongs. Y ou may use any char acter , including spaces, but the NW A drops trailing spaces.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 214 After you cl ick Apply in the My Certificate Create screen, you see a screen that tells you the NWA is generating the s elf-signed certifica te or certific ation request .
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 215 Click Certificates > My Certificates to open the My Certificates screen ( Figure 130 on page 209 ).
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 216 The following table describes t he labels in this screen. T able 69 Certificates > My Certificate Details LABEL DESCRIPTION Name This field displays the identifying na me of this certificate.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 217 V alid From This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Y e t V alid! message if the certificate has not yet become applicable.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 218 18.5 T rusted CAs Screen Use this screen to view the list of trus t ed certificates. The NW A accepts an y val id certificate signed by a certi fication authorit y on this list as being trustworthy .
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 219 18.5.1 T rusted CAs Import Screen Use this screen to sa ve a trusted certif ication authority’ s certifi cate to the NW A. Click Certificates > Trusted CAs to op en the Trusted CAs screen and then click Import to open the Trusted CAs Import screen.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 220 The following table describes t he labels in this screen. 18.5.2 T rusted CAs Det ails Screen Use this screen to view in-depth inform ation.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 221 Click Certificates > Trusted CAs to open the Trusted CAs screen. Click the details icon to open the Trusted CAs Details screen. Figure 136 Certificates > T rusted CAs Details The following table describes t he labels in this screen.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 222 Certificate Path Click the Refresh button to have this read-only text box display the end entity’ s certificate and a list of certification authority certificates that shows the hierarch y of certification authorities that validate the end entity’ s certificate.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 223 18.6 T e chnical Reference This section provides technical background information about the topics cov ered in this chapter . K ey Usage This field displays for what func tions the certificate’ s key can be used.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 224 18.6.1 Private-Public Certificates When using public-k ey cryptology for auth entic ation, each host has two keys. One key is public and can be made openl y available. The other key is private and must be kept secure.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 225 18.6.3 Checking the Fingerprin t of a Certificate on Y our Computer A certificate’ s fingerprints are message di gests calcul ated using the MD5 or SHA1 algorithms.
Chapter 18 Certificates NWA-3500/NWA-3550 User’s Guide 226 4 Use a secure method to verify t hat the certificate owner has the same information in the Thumbp rint Algorithm and Thumbprint fi elds. The secure method may vary acc ording to your s ituation.
NWA-3500/NWA-3550 User’s Guide 227 C HAPTER 19 Log Screens 19.1 Overview This chapter provides information on vi ewing and generating logs on y our NW A. Logs are files that contain recorded netw ork activity ov er a set period. They are used by administr ators to monitor the he alth of the computer system(s) they are managing.
Chapter 19 Log Scre ens NWA-3500/NWA-3550 User’s Guide 228 19.2 What Y ou Can Do in the Log Screens •U s e t h e View Log screen ( Section 19.4 on page 228 ) to display all logs or logs for a certain category . Y ou can view logs and alert messages in this page.
Chapter 19 Log Screens NWA-3500/NWA-3550 User’s Guide 229 Click Logs > V iew Log . The followi ng screen displays. Figure 140 Logs > V iew Log The following table describes t he labels in this screen.
Chapter 19 Log Scre ens NWA-3500/NWA-3550 User’s Guide 230 Click Logs > Log Settings . The following screen displa ys. Figure 141 Logs > Log Settings The following table describes t he labels in this screen.
Chapter 19 Log Screens NWA-3500/NWA-3550 User’s Guide 231 Send Alerts to Enter the e-mail address where the alert messages will be sent. If this field is left blank, alert messages will not be sent via e-mail. SMTP Authentication If you use SMTP authentication, th e mail receiver should be the owner of the SMTP account.
Chapter 19 Log Scre ens NWA-3500/NWA-3550 User’s Guide 232 19.6 T e chnical Reference This section provi des some technical background informatio n about the topics covered in th is chapte r . 19.6.1 Example Log Messages This section provi des descriptions of some example log mes sages.
Chapter 19 Log Screens NWA-3500/NWA-3550 User’s Guide 233 19.6.2 Log Commands Go to the command interpreter interface (refer to Appendix F on page 379 for a discussion on how to access and use the commands).
Chapter 19 Log Scre ens NWA-3500/NWA-3550 User’s Guide 234 Use sys logs category followed by a log category and a parameter to decide what to record Use the sys logs save command to store the settings in the NW A (you must do this in order to record logs).
NWA-3500/NWA-3550 User’s Guide 235 C HAPTER 20 VLAN 20.1 Overview This chapter discusses how to conf igure VLAN on the NWA. A VLAN (Virtual Local Area Network) allo ws a ph ysical network to be partitioned into multiple logi cal networks. Stations on a logical network can belong to one or more groups.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 236 20.3 What Y ou Need T o Know About VLAN When you use wireless VLAN an d RADIUS VLAN together , the NW A first tries to assign VLAN IDs based on RADIUS VLAN co nfigur ation.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 237 20.4 Wireless VLAN Screen Use this scre en to enable and configur e your Wireless V irtual LAN s etup.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 238 The following table describes t he labels in this screen T able 79 VLAN > Wireless VLAN FIELD DESCRIPTION Enable VIRT UAL LAN Select this box to enable VLAN tagging. Management VLAN ID Enter a number from 1 to 4094 to define this VLAN group.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 239 20.4.1 RADIUS VLAN Screen Use this screen to configure your RADIUS Virtual LAN setup . Click VLAN > RADIUS VLAN . The following screen appears. Figure 144 VLAN > RADIUS VLAN The following table describes t he labels in this screen.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 240 20.5 T e chnical Reference This section provi des some technical background information and configur ation examples about the t opics covered in this chapter . 20.5.1 VLAN T agging The NWA support s IEEE 802.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 241 On an Ethernet switch, create a VLAN that has the same management VLAN ID as the NW A. The following figure has the NW A connected to port 2 of the switch and your computer connected to port 1. The management VLAN ID is ten.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 242 8 Click Apply . The following scre en displays. Figure 147 VLAN-A ware Switch 9 Click VLAN S tatus to di splay the following screen. Figure 148 VLAN-A ware Switch - VLAN S tatus Fol low the instructions in the Quick Start Gui de to set up your NW A for configuration.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 243 3 Click Apply . Figure 149 VLAN Setup 4 The NWA attempts to con nect with a VL AN-aware device. Y ou can now access an d mange the NW A though the Ethernet switch. Note: If you do not connect the NW A to a correctly configured VLAN-aware device, you will lock yourself out of the NW A.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 244 Z yXEL uses the following standard RADIUS attributes returned from Microsoft’ s IAS RADIUS service to place the wirele ss station into the correc.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 245 1d Click OK . Figure 150 New Global Security Group 2 In VLAN Group ID Properties , click th e Members tab. • The IAS uses group memberships to d e termine wh ich user ac counts be long to which VLAN groups.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 246 1 Using the Remote Access Policy option on the Internet Authentication Service management interface, create a new VLAN Po licy for each VLA N Group defined in the previous section. The order of the remote acce ss policies is important .
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 247 4 The Select Groups window displays. Select a remote access policy and click the Add button. The policy is added to the fi eld below. Only one VLAN Group should be associated with each policy . 5 Click OK and Next in the next few screens to accept th e group value.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 248 7b Clear the check boxes for all other authentication types lis ted below the drop- down list box. Figure 156 Authentication T ab Settings 8 Click the Encryption tab. Select the Strongest encryption option.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 249 •C l i c k t h e Add button to add an additional three RADIUS VLAN attrib utes required for 802.1X Dynamic VLAN Assignment. Figure 158 Connection Attr ibutes Screen 11 The RADIUS Attribute screen di splays.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 250 11 c Click the Add button. Figure 159 RADIUS Attribute Screen 12 The Enumerable Attribute Information screen displays. Select the 802 va lu e from the Attribute va lue drop-down list box. •C l i c k OK .
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 251 the VLAN Group specified in this policy will be give n a VLAN ID speci fied in the NWA VLA N table. 14b Click OK . Figure 161 VLAN ID Attribute Se tting for T unnel-Pvt-Group-ID 15 Return to the RADIUS Attribute Screen shown as Figure 159 on page 250 .
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 252 17b The completed Advanced tab config uration should resemble the fo llowing screen. Figure 163 Completed Advanced T ab Note: Repeat the Configuring Remote Ac cess Policies procedure for each VLAN Group defined in the Active Dire ctory .
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 253 20.5.4 Second Rx VLAN ID Example In this example, the NWA is configured to tag packets from SSID01 with VLAN ID 1 and tag packets from SSID02 with VLAN ID 2. VLAN 1 and VLAN 2 ha ve access to a server , S , and the Internet, as shown in the following figure.
Chapter 20 VLAN NWA-3500/NWA-3550 User’s Guide 254 2 Click VLAN > Wireless VLAN . 3 If VLAN is not already enabled, click Ena ble Virtual LAN and set up th e Management VLAN ID (see Section 20.
NWA-3160 Series User’s Guide 255 C HAPTER 21 Load Balancing 21.1 Overview Wireless load balancing is the process whereby you limit the number of connections allowed on an wireless acce ss point or you limit the amount of wireless tr affic transmi tted and received on it.
Chapter 21 Load Balancing NWA-3160 Series User’s Guide 256 Imagine a coffee shop in a crowded business distri ct that offers free wireless connectivity to i ts customers. The coffee shop owner can’t possibly know how many connections his NWA will hav e at an y given moment.
Chapter 21 L oad Balancing NWA-3160 Series User’s Guide 257 The requirements for load balancing are fairly straight forw ard and should be met in order for a group of similar NWAs to tak e advantage of the feature: • They should all be within t he same subnet.
Chapter 21 Load Balancing NWA-3160 Series User’s Guide 258 21.2.1 Disassociating and Delaying Connections When your AP becomes ov erloaded, th ere are two basic responses it can take.
Chapter 21 L oad Balancing NWA-3160 Series User’s Guide 259 can afford the bandwidth for it or the red la pt op is picked up by a different AP that has bandwidth to spare. Figure 168 Delaying a Co nnection The second response your AP can take is to kick the con nections tha t are pushing it ov er its balanced bandwi dth allotment.
Chapter 21 Load Balancing NWA-3160 Series User’s Guide 260.
NWA-3160 Series User’s Guide 261 C HAPTER 22 Dynamic Channel Selection 22.1 Overview This chapter discusses how to configure dynamic channel selection on the NWA.
Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 262 In this example, if the NW A attempts t o broadcast on channels 1, 2, or 3 it is met with cross-channel interf erence from the othe r AP that shares the channel.
Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 263 DCS Client Aware Selec t Enable to hav e the NWA w ait until all connected clients have disconnected before switching channels. If you select Disab le then the NWA switches chan nels immediately regardless of any client connections.
Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 264.
NWA-3500/NWA-3550 User’s Guide 265 C HAPTER 23 Maintenance 23.1 Overview This chapter describes the maintenance screens. It discusses how y ou can view the association list and channel us age, upload new firmware, manage configur ation and restart y our NW A without turning it off and on.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 266 23.3 What Y ou Need T o Know About the Maintenance Screens Find firmw are at www .zyxel .com in a file that (usually) uses the system model name with a "*.b in" exte nsion, for example "[Model # ].
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 267 Note: The Poll Interval field is configurable. The fields in this screen va ry according to the current wireless mode of ea ch WLAN adaptor . Figure 173 Maintenance > System S tatus: Show S tatistics The following table describes t he labels in this screen.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 268 23.5 Association List Screen Use this screen to know which wireless cl ients are associated with the NW A. Click Maintenance > Association List . The following screen displays. Figure 174 Maintenance > Association List The following table describes t he labels in this screen.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 269 23.6 Channel Usage Screen Use this screen to see what channel the wireless clients are using to associate with the NWA, as well as the signal strength and network mode. Click Maintenance > Channel Usage .
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 270 The following table describes t he labels in this screen. 23.7 F/W Upload Screen Use this scren to upload firmware to your NW A. Click MAINTENANCE > F/W Up load . The following screen displays.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 271 The following table describes t he labels in this screen. Do not turn off the NW A while firmware upload is in progress! After you see the Firmware Upload in Process screen, wait tw o minute s before logging into the NWA again.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 272 If the upload was not successful, the following screen will appear . Click Return to go back to the F/W Upload screen. Figure 179 Firmware Upload Error 23.8 Configuration Screen Use this screen backup or upload your NW A’ s configur ation file.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 273 it is highly recommended that you b ack up y our configuration file before making configur ation changes. The backup configur ation file will be useful in case you need to return to your previous settings.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 274 If you uploaded the default con figuration file you may need to change the IP address of your computer to be in t he sa me subnet as that of the default NWA IP address (192.168.1.2). See your Quick Start Guide for details on how to set up your computer’ s IP address.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 275 Click Maintenance > Restart . The following screen displays. Click Restart to have the NW A reboot.
Chapter 23 Maintenance NWA-3500/NWA-3550 User’s Guide 276.
277 P ART III T roubleshooting and S pecifications T roubleshooting (279) Product Specifications (285).
278.
NWA-3500/NWA-3550 User’s Guide 279 C HAPTER 24 Troubleshooting This chapter offers some suggesti ons to solve problems you mi ght encounter . The potential problems are divided into the following categories. • P ower and Hardware Connections • NWA Acc ess and Login • Internet Access • Wireless R outer/A P T roubleshooting 24.
Chapter 24 Trou bleshooting NWA-3500/NWA-3550 User’s Guide 280 2 If you changed the st atic IP address and have f orgotten it, you ha ve to reset the device to its factory d efaults.
Chapter 24 Trou bleshooting NWA-3500/NWA-3550 User’s Guide 281 • T ry to access the NWA using another serv ice, such as T elnet. If you can access the NWA, check the remote management settings to find out why the NWA does not respond to HT TP . I can see the Login screen, but I cannot log in to the NW A.
Chapter 24 Trou bleshooting NWA-3500/NWA-3550 User’s Guide 282 1 Check the hardware connections, and ma k e sure the NWA is connected to a broadband modem or router that provides Internet access.
Chapter 24 Trou bleshooting NWA-3500/NWA-3550 User’s Guide 283 Advanced Suggestions • Check the settings for QoS . If it is disabled, y ou might consider activ ating it. If it is enabled, you might cons ider raising or lowering th e priority for so me applications.
Chapter 24 Trou bleshooting NWA-3500/NWA-3550 User’s Guide 284.
NWA-3500/NWA-3550 User’s Guide 285 C HAPTER 25 Product Specifications The following tables summarize the NW A’ s hardware and firmwa re features. T able 91 NWA-3500 Hardware Specifications T able .
Chapter 25 Product Specifications NWA-3500/NWA-3550 User’s Guide 286 T able 92 Firmware Specifications Antenna Specifications SMA antenna connectors, equipped by default with 2dBi omni antenna, 60°.
Chapter 25 Product Specifications NWA-3500/NWA-3550 User’s Guide 287 SSL P assthrough SSL (Secure Sock ets Layer) uses a public k ey to encrypt data that's transmitted ov er an SSL connection.
Chapter 25 Product Specifications NWA-3500/NWA-3550 User’s Guide 288 T able 93 Other Specifications Approvals Radi o •U S A : FCC P art 15C 15.247 FCC P art 15E 15.
Chapter 25 Product Specifications NWA-3500/NWA-3550 User’s Guide 289 Comp atible ZyXEL Antennas At the time of writing, yo u can use the followi ng antennas in your NWA.
Chapter 25 Product Specifications NWA-3500/NWA-3550 User’s Guide 290 Comp atible ZyXEL Antenna Cables The following table shows you the cables you can use in the NW A to extend your connection to ant ennas at the time of writing. Power over Ethernet (PoE) S pecifications Y ou can use a power over Ethernet injector to power this device.
291 P ART IV Appendices and Index Setting Up Y our Computer ’ s IP Address (293) Wireless LANs (319) P op-up Windows, Jav aScripts and Java P ermissions (335) Importing Certificates (343) IP Address.
292.
NWA-3500/NWA-3550 User’s Guide 293 A PPENDIX A Setting Up Y our Computer ’ s IP Address Note: Y our specific ZyXEL device ma y not support all of the operating systems described in this appendix. See the produc t specifications for mo re information about which operating systems are sup ported.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 294 1 Click Start > Control Panel . Figure 186 Windows XP: S tart Menu 2 In the Control Panel , click the Network Connections icon.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 295 3 Right- click Local Area Connection and then select Properties . Figure 188 Windows XP: Control Panel > Ne twork Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties .
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 296 5 The Internet Protocol TCP/IP Properties window opens. Figure 190 Windows XP: Internet Protocol (T CP/IP) Properties 6 Select Obtain an IP address automatically if your network admi nistrator or ISP assigns your IP addres s dynamically .
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 297 Windows V ist a This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel . Figure 191 Windows V ista: S tart Menu 2 In the Control Panel , click the Network and Internet icon.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 298 4 Click Manage network conne ctions . Figure 194 Windows V ista: Network and Sharing Center 5 Right- click Local Area Connection and then select Properties .
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 299 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties .
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 300 7 The Internet Protocol Versio n 4 (TCP/IPv4) Properties window opens.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 301 Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences . Figure 198 Mac OS X 10.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 302 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 303 5 For s tatically assigned settings, do t he following: •F r o m t h e Configure IPv4 lis t, sele ct Manually . •I n t h e IP Address field, type your IP address.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 304 Click Apply No w and close the window . V erifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities , and then selecting the appropriat e Network Interface from the Info tab.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 305 2 In System Preferences , click the Net work icon. Figure 205 Mac OS X 10.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 306 3 When the Network preferences pane opens, select Ethe rnet from the list of available conn ecti on types. Figure 206 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure lis t, sele ct Using DHCP for dynamically assigned settings.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 307 •I n t h e Router field, enter the IP address of your NW A. Figure 207 Mac OS X 10.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 308 V erifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities , and then selecting the appropriat e Network interface from the Info tab.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 309 1 Click System > Administration > Network . Figure 209 Ubuntu 8: System > Administration Menu 2 When the Network Settings wi ndow opens, click Unlock to open the Authenticate window .
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 310 3 In the Authenticate window , enter your admin a ccount name and password then click the Authenticate button.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 31 1 5 The Properties dialog box opens. Figure 213 Ubuntu 8: Network Settings > Properties •I n t h e Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 312 7 If you know yo ur DNS server IP address(es), click the DNS tab in the Net work Settings window and then enter the DNS se rv er information in the fields provided.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 313 tab. The Interface Statistics column shows data if your connection is working properly .
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 314 1 Click K Menu > Computer > Administrator Se ttings (YaST) . Figure 216 openSUSE 10.3: K Menu > Computer Menu 2 When the Run as R oot - KDE su dialog opens, enter the admin password and click OK .
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 315 3 When the YaST Contro l Center window opens, select Network Devices and then clic k the Network Card icon.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 316 5 When the Network Card Setup window opens, click the Address tab Figure 220 openSUSE 10.3: Ne twork Card Setup 6 Select Dynamic Address (DHCP) if you ha ve a dynamic IP add ress.
Appendix A Setting Up Your Compu ter’s IP Address NWA-3500/NWA-3550 User’s Guide 317 8 If you know yo ur DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server informat ion in the fields provided. Figure 221 openSUSE 10.
Appendix A Se tting Up Your Computer’s IP Addres s NWA-3500/NWA-3550 User’s Guide 318 V erifying Settings Click the KNetwork Manager icon on the Task bar t o check your T CP/IP properties. From the Option s sub-m enu, se lect Show Connectio n Information .
NWA-3500/NWA-3550 User’s Guide 319 A PPENDIX B W ireless LANs Wireless LAN T opologies This section discuss es ad-hoc and infr astructure wi reless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configur ation is an in dependent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B , C).
Appendix B Wireless LANs NWA-3500/NWA-3550 User’s Guide 320 with each other . When Intra-BSS i s disabled, wireless client A and B can still access the wired network but cannot communicate with eac h other .
Appendix B Wir eless LANs NWA-3500/NWA-3550 User’s Guide 321 An ESSID (ES S IDentification) uniquely id entifies each ESS . All access points and their associated wirel ess clients within the same ESS must have the same ESSID in order to comm unicate.
Appendix B Wireless LANs NWA-3500/NWA-3550 User’s Guide 322 wireless gatewa y , but out-of -range of ea ch other , so they canno t "hear" each other , that is they do not know if the channel is currently being used. Therefore, they are consider ed hi dden from each other .
Appendix B Wir eless LANs NWA-3500/NWA-3550 User’s Guide 323 Fragment ation Threshold A Fragmentation Threshold is the maximum data fr agment size (between 256 and 2432 bytes) that can be sent in th e wireless network before the AP will fragment the packet into smaller dat a frames.
Appendix B Wireless LANs NWA-3500/NWA-3550 User’s Guide 324 sever al intermediate rate steps between the maximum and minimum data r ates. The IEEE 802.
Appendix B Wir eless LANs NWA-3500/NWA-3550 User’s Guide 325 IEEE 802.1x In June 2001, the IEEE 802.1x standard w a s designed to extend the features of IEEE 802.11 to support extended authentica tion as well as providing addi tional accounting and control features.
Appendix B Wireless LANs NWA-3500/NWA-3550 User’s Guide 326 • Access-Challeng e Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access- Request message .
Appendix B Wir eless LANs NWA-3500/NWA-3550 User’s Guide 327 However , MD5 authenti cation has s ome weaknesses. Since the authentication server needs to get the plaintext password s, t he passwords must be stored. Thus someone other th an the authenti cation server m ay access the pas sword file.
Appendix B Wireless LANs NWA-3500/NWA-3550 User’s Guide 328 Dynamic WEP Key Exchange The AP maps a unique key that is generated with t he RADIUS server . This key expires when the wireless connection ti me s out, disconnec ts or reauthentication times out.
Appendix B Wir eless LANs NWA-3500/NWA-3550 User’s Guide 329 If the AP or the wireless clients do no t support WP A2, just use WP A or WPA -PSK depending on whether you hav e an external RADIUS server or not. Select WEP only when the AP and/or wirel ess clients do not support WP A or WP A2.
Appendix B Wireless LANs NWA-3500/NWA-3550 User’s Guide 330 keys. This prev ent all wireless d evices sharing the same encryption ke ys. (a weakness of WEP) User Authentication WP A and WPA2 ap ply IEEE 802.1x and Extens ible Authentication Protocol (EAP) to authenticate wireless clients using an ex ternal RADIUS database.
Appendix B Wir eless LANs NWA-3500/NWA-3550 User’s Guide 331 3 The RADIUS server distributes a Pairwi se Master K ey (PMK) key to the AP that then sets up a key hier archy and management system, usi.
Appendix B Wireless LANs NWA-3500/NWA-3550 User’s Guide 332 4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data exchanged between them.
Appendix B Wir eless LANs NWA-3500/NWA-3550 User’s Guide 333 Antenna Overview An antenna couples RF signals onto air . A tr ansmitter within a wireless d evice sends an RF signal to the antenna, whic h propagates the signal through the air . The antenna also operates in reverse by capturing RF signals from the air .
Appendix B Wireless LANs NWA-3500/NWA-3550 User’s Guide 334 • Omni-directional antennas send the RF sign al out in all directions on a horizontal plane. The cover age area is torus-sh aped (like a donut) which makes these antennas ideal for a room environment.
NWA-3500/NWA-3550 User’s Guide 335 A PPENDIX C Pop-up Windows, JavaScript s and Java Permissions In order to use the web configurator you need to allow: • W eb browser pop-up wind ows from your device. • Jav aScripts (enabled by default). • Jav a permissions (enabled by default).
Appendix C Pop-up Windows, JavaScripts and Java Perm issions NWA-3500/NWA-3550 User’s Guide 336 1 In Internet Explorer , select Tools , Internet Options , Privacy . 2 Clear the Block pop-ups check box in the Pop-up Blocker sect ion of the screen. This disables an y web pop-up block ers you may have enabled.
Appendix C Pop-up Windows, JavaScripts and Java Per missions NWA-3500/NWA-3550 User’s Guide 337 2 Select Settings… to open the Pop-up Blocker Settings screen. Figure 232 Internet Options: Privacy 3 T ype the IP address of y our device (the web page that you do not want to have blocked) wi th the prefix “http://” .
Appendix C Pop-up Windows, JavaScripts and Java Perm issions NWA-3500/NWA-3550 User’s Guide 338 4 Click Add to mo ve the IP address to the list of Allowed sites . Figure 233 Pop-up Blo cker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting.
Appendix C Pop-up Windows, JavaScripts and Java Per missions NWA-3500/NWA-3550 User’s Guide 339 1 In Internet Explorer , click Tools , Internet Options and then the Security tab. Figure 234 Internet Options: Secu rity 2 Click the Custom Level... button .
Appendix C Pop-up Windows, JavaScripts and Java Perm issions NWA-3500/NWA-3550 User’s Guide 340 6 Click OK to close the window . Figure 235 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer , click Tools , Internet Options and then the Security tab.
Appendix C Pop-up Windows, JavaScripts and Java Per missions NWA-3500/NWA-3550 User’s Guide 341 5 Click OK to close the window . Figure 236 Security Settings - Java JA V A (Sun) 1 From Internet Explorer , click Tools , Internet Options and then the Advanced tab.
Appendix C Pop-up Windows, JavaScripts and Java Perm issions NWA-3500/NWA-3550 User’s Guide 342 3 Click OK to close the window . Figure 237 Java (Sun).
NWA-3500/NWA-3550 User’s Guide 343 A PPENDIX D Importing Certificates This appendix shows you how to import public key certificates into your web browser . Public key certificates are used by web br owsers to ensure that a secure web site is legitimate.
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 344 1 If your device’ s web configur ator is set to use S SL certification, then the first time you browse to i t you are presented with a certificati on error . Figure 238 Internet Explorer 7: Cert ification Error 2 Click Continue to this website (not recommended) .
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 345 4 In the Certificate dialog bo x, click Install Certificate . Figure 241 Internet Explorer 7: Cert ificate 5 In the Certificate Import Wizard , click Next .
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 346 6 If you w ant Internet E xplorer to Automatically select certificate store based on the type of certificate , click Next again and then go to step 9.
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 347 8 In the Select Certificate Store dialog box, choose a location in which to sa ve the certificate and then clic k OK . Figure 245 Internet Explorer 7: Select Certificate S tor e 9 In the Completing the Certificate Import Wizard screen, click Finish .
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 348 10 If you are presented with another Security Warning , c lick Yes . Figure 247 Internet Explorer 7: Security W arning 11 Finally , click OK when presented with the successful certif icate installation message.
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 349 Inst alling a St and-Alone Certific ate File in Internet Explorer Rather t han browsing to a Z yXEL web co nfigur ator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you.
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 350 1 Open Internet Explorer and click Tools > Internet Options . Figure 252 Internet Explorer 7: T ools Menu 2 In the Internet Options dialog box, cl ick Conte nt > Certificates .
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 351 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificat e that yo u w ant to delete, and then click Remove . Figure 254 Internet Explorer 7: Cert ificates 4 In the Certificates confirmation, click Yes .
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 352 6 The next time you go to the web site that issued the public k ey certificate you just removed, a certification error appears. Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however , the screens can also apply to Firefox 2 on all platforms.
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 353 3 The certificate is stored an d you can now connect securely to the web configurator . A sealed padlock appears in the address bar , which you can click to open the Page Info > Security window to view the web page’ s securi ty information.
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 354 2 In the Options dialog bo x, click Advanced > Encryption > View Certificat es . Figure 260 Firefox 2: Options 3 In the Certificate Manager dialog box, cl ick Web S ites > Import .
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 355 4 Use the Select File dialog bo x to locate the certificate and then click Op en .
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 356 2 In the Options dialog bo x, click Advanced > Encryption > View Certificat es . Figure 264 Firefox 2: Options 3 In the Certificate Manager dialog box, select the Web Sites tab , select the certificate that you w ant to remove, and then click Delete .
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 357 4 In the Delete Web Site Certificates dialog bo x, click OK . Figure 266 Firefox 2: Delete W eb Site Certificates 5 The next time you go to the web site that issued the public k ey certificate you just removed, a certification error appears.
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 358 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’ s securit y details.
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 359 2 In Preferences , click Advanced > Security > Manage certificates . Figure 270 Opera 9: Prefer ences.
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 360 3 In the Certificates Manager , click Authorities > Import . Figure 271 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 361 5 In the Install authority certificate dialog box, c lick Ins tall . Figure 273 Opera 9: Inst all authority certificate 6 Next, click OK .
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 362 1 Open Opera and click Tools > Preferences . Figure 275 Opera 9: T ools Menu 2 In Preferences , Advanced > Security > Manage certificates .
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 363 3 In the Certificates manager , select the Authorities tab, select th e certific ate that you wan t to rem ove, a nd th en cl ick Delete .
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 364 2 Click Continue . Figure 278 Konquero r 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate.
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 365 Inst alling a St and-Alone Ce rtificate File in Konqueror Rather t han browsing to a Z yXEL web co nfigur ator and installing a public key certificate when prompted, y ou can install a stand- alone certific ate file if one has been issued to you.
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 366 3 The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Inf ormation window to view the web page’ s security details. Removing a Certificate in Konqueror This section shows y ou how to remove a public k ey certificate in K onqueror 3.
Appendix D Importi ng Certificates NWA-3500/NWA-3550 User’s Guide 367 4 The next time you go to the web site that issued the public k ey certificate you just removed, a certification error appears.
Appendix D Importing Certificates NWA-3500/NWA-3550 User’s Guide 368.
NWA-3500/NWA-3550 User’s Guide 369 A PPENDIX E IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify indi vidual devices on a network. Every networking device (including computers, serv ers, routers, printers, etc.
Appendix E IP Addre sses and Sub netting NWA-3500/NWA-3550 User’s Guide 370 The following figure shows an example IP address in which the first three octets (192.
Appendix E IP Addresses and Subnetting NWA-3500/NWA-3550 User’s Guide 371 By conv ention, subnet masks alw ays cons ist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
Appendix E IP Addre sses and Sub netting NWA-3500/NWA-3550 User’s Guide 372 As these two IP addresses cannot be us ed for individual hosts, calculat e the maximum number of possible host s in a netw.
Appendix E IP Addresses and Subnetting NWA-3500/NWA-3550 User’s Guide 373 Subnetting Y ou can use subnetting to divide one netw ork into multiple sub-networks. In the following example a network administrator creates t wo sub-networks to isolate a group of servers from the rest of th e compan y network for security reasons.
Appendix E IP Addre sses and Sub netting NWA-3500/NWA-3550 User’s Guide 374 The following figure shows the company network after subnet ting. There are now two sub-n etworks, A and B .
Appendix E IP Addresses and Subnetting NWA-3500/NWA-3550 User’s Guide 375 Each subnet contains 6 host ID bit s, giving 2 6 - 2 or 62 hosts for each subnet (a host ID of all zeroes i s the subnet it self , all ones is the subnet’s broadcast address).
Appendix E IP Addre sses and Sub netting NWA-3500/NWA-3550 User’s Guide 376 Example: Eight Subnet s Similarly , use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each sub net.
Appendix E IP Addresses and Subnetting NWA-3500/NWA-3550 User’s Guide 377 The following table is a summary for subnet planning on a network with a 16-bit network number . Configuring IP Addresses Where you obtain your network number depends on your particular situation.
Appendix E IP Addre sses and Sub netting NWA-3500/NWA-3550 User’s Guide 378 you entered. Y ou don't need to change the subnet mask computed by the NW A unless you are instructed to do otherwise. Private IP Addresses Every machine on the In ternet must ha ve a uni que address.
NWA-3500/NWA-3550 User’s Guide 379 A PPENDIX F T ext File Based Auto Configuration This chapter describes how administ rators can use text confi guration files to configure the wireless LAN setti ngs for multiple APs.
Appendix F Text File Ba sed Auto Configuration NWA-3500/NWA-3550 User’s Guide 380 Y ou can have a different configuration file for each AP . Y ou can also have multiple APs use the same configur ation file.
Appendix F Text File Ba sed Auto Con figuration NWA-3500/NWA-3550 User’s Guide 381 Use the following procedure to have the AP download the configur ation file. V erifying Y our Configuration File Upload Via SNMP Y ou can use SNMP management software to display the configuration file v ersion currently on the device by using the foll owing MIB.
Appendix F Text File Ba sed Auto Configuration NWA-3500/NWA-3550 User’s Guide 382 The second line must speci fy the file v ersion. The AP compares the file versi on with the version of th e last configu ration file that it do wnloaded. If th e version of the downloaded file is the same or smalle r (older), the AP ignores the fi le.
Appendix F Text File Ba sed Auto Con figuration NWA-3500/NWA-3550 User’s Guide 383 Wcfg Command Configuration File Examples These example configur ation fi les use the wcfg command to configure security and SSID profiles. Figure 291 WEP Configura tion File Example Figure 292 802.
Appendix F Text File Ba sed Auto Configuration NWA-3500/NWA-3550 User’s Guide 384 Figure 293 WP A-PSK Configuration File Example Figure 294 WP A Configuration File Example Wlan Command Configuration.
Appendix F Text File Ba sed Auto Con figuration NWA-3500/NWA-3550 User’s Guide 385 commands that create security and S SID pr ofiles before the commands that tell the AP to use thos e profiles.
Appendix F Text File Ba sed Auto Configuration NWA-3500/NWA-3550 User’s Guide 386.
NWA-3500/NWA-3550 User’s Guide 387 A PPENDIX G Legal Information Copyright Copyright © 2009 by Z yXEL Communications Corpor ation. The contents of this publication ma y not be reproduced in any p a.
Appendix G Legal Information NWA-3500/NWA-3550 User’s Guide 388 • This dev ice must accept any inte rference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Clas s B digital device pursuant to P art 15 of th e FCC Rules.
Appendix G Legal Information NWA-3500/NWA-3550 User’s Guide 389 前項合法通信,指依電信規定作 業之無線電信。低功率射頻電機須 忍 受合法通信或工業、科學及醫.
Appendix G Legal Information NWA-3500/NWA-3550 User’s Guide 390 Note Re pair or replacement, as provided under this wa rranty , is the exclusiv e remedy of the purchaser . This w arranty is in lieu of all other warr anties, express or implied, including any implied w arranty of merchantabilit y or fitness for a particular use or purpose.
Index NWA-3500/NWA-3550 User’s Guide 391 Index A access 24 access point 24 access privileges 26 address 11 0 address assignment 11 0 , 177 address filtering 23 administrator authentication on RADIUS 111 Advanced Encryption Standard See AES.
Index NWA-3500/NWA-3550 User’s Guide 392 dimensions 285 disclaimer 387 Distribution System 120 Dynamic Frequency Selection 133 dynamic WEP key exchange 328 E EAP authentication 326 encryption 26 , 3.
Index NWA-3500/NWA-3550 User’s Guide 393 maintenance 23 management 23 Management Information Base (MIB) 196 management VLAN 240 managing the device good habits 31 usi ng FT P . See FTP . using T elnet. See command interface. using the command interface.
Index NWA-3500/NWA-3550 User’s Guide 394 S safety warnings 7 security 24 security profiles 23 server 23 Service Set 122 , 125 , 131 Service Set Identifier see SSID SNMP 287 MIBs 196 traps 196 specif.
Index NWA-3500/NWA-3550 User’s Guide 395 WPA2 23 , 328 user authentication 330 vs WP A2-PSK 329 wireless client supplicant 330 with RADIUS application example 330 WPA2-Pre- Shared Key 328 WPA2-PSK 3.
Index NWA-3500/NWA-3550 User’s Guide 396.
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il ZyXEL Communications NWA-3550 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del ZyXEL Communications NWA-3550 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso ZyXEL Communications NWA-3550 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul ZyXEL Communications NWA-3550 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il ZyXEL Communications NWA-3550, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del ZyXEL Communications NWA-3550.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il ZyXEL Communications NWA-3550. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo ZyXEL Communications NWA-3550 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.