NWA1120 Series Wireless LAN Ceiling Mountable PoE Access Point Version 1.00 Edition 1, 12/2012 Quick Start Guide User’s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name www.zyxel.
IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. This is a User’s Guide for a series of products. Not all products support all firmware features. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system. Every effort has been made to ensure that the information in this manual is accurate.
Contents Overview Contents Overview User’s Guide .........................................................................................................................................9 Introducing the NWA ............................................................................................................................... 11 Introducing the Web Configurator ...........................................................................................................19 Dashboard ...................
Contents Overview 4 NWA1120 Series User’s Guide
Table of Contents Table of Contents Contents Overview ..............................................................................................................................3 Table of Contents .................................................................................................................................5 Part I: User’s Guide ........................................................................................... 9 Chapter 1 Introducing the NWA ..................................
Table of Contents Chapter 4 Tutorial .................................................................................................................................................29 4.1 How to Configure the Wireless LAN ..................................................................................................29 4.1.1 Choosing the Wireless Mode ...................................................................................................29 4.1.2 Further Reading ..............................
Table of Contents 6.6 Wireless Security Screen ..................................................................................................................76 6.6.1 Security: WEP .........................................................................................................................78 6.6.2 Security: WPA, WPA2, WPA2-MIX ..........................................................................................79 6.6.3 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ..........................
Table of Contents Chapter 10 Log Settings ...................................................................................................................................... 111 10.1 Overview ....................................................................................................................................... 111 10.2 What You Can Do in this Chapter ................................................................................................. 111 10.3 What You Need To Know ..........
P ART I User’s Guide 9
C HAPT ER 1 Introducing the NWA This chapter introduces the main applications and features of the NWA. It also discusses the ways you can manage your NWA. 1.1 Introducing the NWA This User’s Guide covers the following models: NWA1121-NI, and NWA1123-NI. Your NWA is an IPv6 wireless AP (Access Point) that can function in several wireless modes. It extends the range of your existing wired network without additional wiring, providing easy network access to mobile users.
Chapter 1 Introducing the NWA 1.1.1 Dual-Band The NWA1123-NI is a dual-band AP and able to function both 2.4G and 5G networks at the same time. You could use the 2.4 GHz band for regular Internet surfing and downloading while using the 5 GHz band for time sensitive traffic like high-definition video, music, and gaming. Figure 1 Dual-Band Application 1.
Chapter 1 Introducing the NWA You can assign different wireless and security settings to each SSID profile. This allows you to compartmentalize groups of users, set varying access privileges, and prioritize network traffic to and from certain BSSs. To the wireless clients in the network, each SSID appears to be a different access point. As in any wireless network, clients can associate only with the SSIDs for which they have the correct security settings.
Chapter 1 Introducing the NWA In the figure below, the printer can receive requests from the wired computer clients A and B via the NWA in Client mode (Z) using only the 2.4 GHz band.
Chapter 1 Introducing the NWA 1.2.3 Root AP In Root AP mode, the NWA (Z) can act as the root AP in a wireless network and also allow repeaters (X and Y) to extend the range of its wireless network at the same time. In the figure below, both clients A, B and C can access the wired network through the root AP. Figure 4 Root AP Application On the NWA in Root AP mode, you can have multiple SSIDs active for reqular wireless connections and one SSID for the connection with a repeater (universal repeater SSID).
Chapter 1 Introducing the NWA clients and the wired LAN. Clients A and B access the AP and the wired network behind the AP throught repeaters Z and Y. Figure 5 Repeater Application When the NWA is in Repeater mode, universal repeater security between the NWA and other repeater is independent of the security between the wireless clients and the AP or repeater. If you do not enable universal repeater security, traffic between APs is not encrypted.
Chapter 1 Introducing the NWA 1.4 Configuring Your NWA’s Security Features Your NWA comes with a variety of security features. This section summarizes these features and provides links to sections in the User’s Guide to configure security settings on your NWA. Follow the suggestions below to improve security on your NWA and network. 1.4.1 Control Access to Your Device Ensure only people with permission can access your NWA.
Chapter 1 Introducing the NWA • Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the NWA to its factory default settings. If you backed up an earlier configuration file, you would not have to totally re-configure the NWA. You could simply restore your last configuration. 1.
C HAPT ER 2 Introducing the Web Configurator This chapter describes how to access the NWA’s web configurator and provides an overview of its screens. 2.1 Accessing the Web Configurator 1 Make sure your hardware is properly connected and prepare your computer or computer network to connect to the NWA (refer to the Quick Start Guide). 2 Launch your web browser. 3 Type "192.168.1.2" as the URL (default). The login screen appears.
Chapter 2 Introducing the Web Configurator Note: If you do not change the password, the following screen appears every time you login. Figure 8 Change Password Screen You should now see the Dashboard screen. See Chapter 2 on page 19 for details about the Dashboard screen. 2.2 Resetting the NWA If you forget your password or cannot access the web configurator, you will need to use the RESET button at the rear panel of the NWA.
Chapter 2 Introducing the Web Configurator default configuration file. This means that you will lose all the settings you previously configured. The password will be reset to “1234”. Figure 9 The RESET Button 2.2.1 Methods of Restoring Factory-Defaults You can erase the current configuration and restore factory defaults in two ways: Use the RESET button to upload the default configuration file. Hold this button in for about 3 seconds (the light will begin to blink).
Chapter 2 Introducing the Web Configurator 2.3 Navigating the Web Configurator The following summarizes how to navigate the web configurator from the Dashboard screen. This guide uses the NWA1121-NI screens as an example. The screens may vary slightly for different models. Figure 10 Status Screen of the Web Configurator A B C As illustrated above, the Web Configurator screen is divided into these parts: • A - title bar • B - navigation panel • C - main window 2.3.
Chapter 2 Introducing the Web Configurator 2.3.2 Navigation Panel Use the menu items on the navigation panel to open screens to configure NWA features. The following tables describe each menu item. Table 3 Navigation Panel Summary LINK TAB Dashboard FUNCTION This screen shows the NWA’s general device and network status information. Use this screen to access the statistics and client list. Monitor Logs View Log Use this screen to view the logs for the categories that you selected.
Chapter 2 Introducing the Web Configurator Table 3 Navigation Panel Summary LINK TAB FUNCTION Configuration File Use this screen to backup and restore your device’s configuration (settings) or reset the factory default settings. Restart Use this screen to reboot the NWA without turning the power off. 2.3.3 Main Window The main window displays information and configuration fields. It is discussed in the rest of this document.
C HAPT ER 3 Dashboard The Dashboard screens display when you log into the NWA, or click Dashboard in the navigation menu. Use the Dashboard screen to look at the current status of the device, system resources, and interfaces. The Dashboard screens also provide detailed information about system statistics, associated wireless clients, and logs. 3.1 The Dashboard Screen Use this screen to get a quick view of system, Ethernet, WLAN and other information regarding your NWA.
Chapter 3 Dashboard Click Dashboard. The following screen displays.
Chapter 3 Dashboard The following table describes the labels in this screen. Table 4 The Dashboard Screen LABEL DESCRIPTION Refresh Interval Select how often you want the NWA to update this screen. Refresh Now Click this to update this screen immediately. System Information System Name This field displays the NWA system name. It is used for identification. You can change this in the Maintenance > General screen’s System Name field.
Chapter 3 Dashboard Table 4 The Dashboard Screen (continued) LABEL View Log DESCRIPTION Click this to see a list of logs produced by the NWA. See Section 5.3 on page 49. System Status System Up Time This field displays the elapsed time since the NWA was turned on. Current Date/Time This field displays the date and time configured on the NWA. You can change this in the Maintenance > Time screen.
C HAPT ER 4 Tutorial This chapter first provides an overview of how to configure the wireless LAN on your NWA, and then gives step-by-step guidelines showing how to configure your NWA for some example scenarios. 4.1 How to Configure the Wireless LAN This section illustrates how to choose which wireless operating mode to use on the NWA and how to set up the wireless LAN in each wireless mode. See Section 4.1.2 on page 29 for links to more information on each step. 4.1.
Chapter 4 Tutorial page 71) to provide multiple wireless networks. Each wireless network will cater to a different type of user. You want to make three wireless networks: one standard office wireless network with all the same settings you already have, another wireless network with high priority QoS settings for Voice over IP (VoIP) users, and a guest network that allows visitors to access only the Internet and the network printer. To do this, you will take the following steps: 1 Edit the SSID profiles.
Chapter 4 Tutorial To configure these settings, you need to know the Media Access Control (MAC) addresses of the devices you want to allow users of the guest network to access. The following table shows the addresses used in this example. Table 5 Tutorial: Example Information Network router (A) MAC address 00:AA:00:AA:00:AA Network printer (B) MAC address AA:00:AA:00:AA:00 4.2.1 Configure the SSID Profiles 1 Log in to the NWA (see Section 2.1 on page 19). Click Wireless LAN > SSID.
Chapter 4 Tutorial 4.2.1.1 MBSSID 32 1 Go to Wireless LAN > Wireless Settings. Select MBSSID from the Operation Mode drop-down list box. 2 SSID01 is the standard network, so select SSID01 as the first profile. It is always active. 3 Select VoIP_SSID as the second profile, and Guest_SSID as the third profile. Select the corresponding Active check-boxes. 4 Click Apply to save your settings. Now the three SSIDs are activated.
Chapter 4 Tutorial 4.2.2 Configure the Standard Network 1 Click Wireless LAN > SSID. Click the Edit icon next to SSID01. 2 Select SecProfile1 as SSID01’s security profile. Select the Hidden SSID checkbox as you want only authorized company employees to use this network, so there is no need to broadcast the SSID to wireless clients scanning the area. Also, the clients on SSID01 might need to access other clients on the same wireless network. Do not select the Intra-BSS Traffic blocking check-box.
Chapter 4 Tutorial 3 Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile1. 4 Since SSID01 is the standard network that has access to all resources, assign a more secure security mode. Select WPA2-PSK-MIX as the Security Mode, and enter the Pre-Shared Key. In this example, use ThisisSSID01PreSharedKey. Click Apply. 5 You have finished configuring the standard network, SSID01. 4.2.3 Configure the VoIP Network 34 1 Go to Wireless LAN > SSID.
Chapter 4 Tutorial 3 Select WMM_VOICE in the QoS field to give VoIP the highest priority in the wireless network. Click Apply. 4 Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile2.
Chapter 4 Tutorial 5 Select WPA2-PSK as the Security Mode, and enter the Pre-Shared Key. In this example, use ThisisVoIPPreSharedKey. Click Apply. 6 Your VoIP wireless network is now ready to use. Any traffic using the VoIP_SSID profile will be given the highest priority across the wireless network. 4.2.
Chapter 4 Tutorial 4 Select the check-box of Intra-BSS Traffic blocking Enabled. Click Apply. 5 Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile3. 6 Select WPA-PSK in the Security Mode field. WPA-PSK provides strong security that is supported by most wireless clients. Even though your Guest_SSID clients do not have access to sensitive information on the network, you should not leave the network without security.
Chapter 4 Tutorial 7 Enter the PSK you want to use in your network in the Pre Shared Key field. In this example, the PSK is ThisismyGuestWPApre-sharedkey. Click Apply. 8 Your guest wireless network is now ready to use. 4.2.5 Testing the Wireless Networks To make sure that the three networks are correctly configured, do the following. • On a computer with a wireless client, scan for access points. You should see the Guest_SSID network, but not the SSID01 and VoIP_SSID networks.
Chapter 4 Tutorial wireless traffic between B and wireless clients connected to A (W, Y and Z). Other wireless devices (X) must not be able to connect to the FTP server. Figure 13 FTP Server Connected to a Wireless Client 4.3.2 Configuring the NWA in MBSSID or Root AP Mode Before setting up the NWA as a wireless client (B), you need to make sure there is an access point to connect to. Use the Ethernet port on NWA (A) to configure it via a wired connection.
Chapter 4 Tutorial Log into the Web Configurator on NWA (A) and go to the Wireless LAN > Wireless Settings screen. 40 1 Set the Operation Mode to Root AP. 2 Select the Wireless Mode. In this example, select 802.11b/g/n. 3 Select Profile1 as the SSID Profile. 4 Choose the Channel you want NWA (A) to use. 5 Click Apply.
Chapter 4 Tutorial 6 Go to Wireless LAN > SSID. Click the Edit icon next to Profile1. 7 Change the SSID to AP-A. 8 Select SecProfile1 in the Security field. 9 Select the check-box for Intra-BSS Traffic blocking Enabled so the client cannot access other clients on the same wireless network. 10 Click Apply.
Chapter 4 Tutorial 11 Go to Wireless LAN > Security. Click the Edit icon next to SecProfile1. 12 Configure WPA-PSK as the Security Mode and enter ThisisMyPreSharedKey in the PreShared Key field. 13 Click Apply to finish configuration for NWA (A). 4.3.3 Configuring the NWA in Wireless Client Mode The NWA (B) should have a wired connection before it can be set to wireless client operating mode. Connect your NWA to the FTP server.
Chapter 4 Tutorial 1 Select Client as Operation Mode. Click Apply. 2 Click on the Site Survey button. A window should pop up which contains a list of all available wireless devices within your NWA’s range. 3 Find and select NWA (A)’s SSID: AP-A.
Chapter 4 Tutorial 4 Go to Wireless LAN > Security to configure the NWA to use the same security mode and PreShared Key as NWA (A): WPA-PSK/ThisisMyPreSharedKey. Click Apply. Figure 14 4.3.4 MAC Filter Setup One way to ensure that only specified wireless clients can access the FTP server is by enabling MAC filtering on NWA (B) (See Section 6.9 on page 86 for more information on MAC Filter). 1 Go to Wireless LAN > MAC Filter. Click the Edit icon next to MacProfile1.
Chapter 4 Tutorial 4.3.5 Testing the Connection and Troubleshooting This section discusses how you can check if you have correctly configured your network setup as described in this tutorial. • Try accessing the FTP server from wireless clients W, Y or Z. Test if you can send or retrieve a file. If you cannot establish a connection with the FTP server, do the following steps. 1 Make sure W, Y and Z use the same wireless security settings as A and can access A.
Chapter 4 Tutorial 46 NWA1120 Series User’s Guide
P ART II Technical Reference The appendices provide general information. Some details may not apply to your NWA.
C HAPT ER 5 Monitor 5.1 Overview This chapter discusses read-only information related to the device state of the NWA. Note: To access the Monitor screens, you can also click the links in the Summary table of the Dashboard screen to view the wireless packets sent/received as well as the status of clients connected to the NWA. 5.2 What You Can Do • Use the Logs screen to see the logs for the categories that you selected in the Configuration > Log Settings screen (see Section 5.3 on page 49).
Chapter 5 Monitor Click Monitor > Logs. Figure 15 Logs The following table describes the labels in this screen. Table 6 Logs LABEL DESCRIPTION Display Select a category of logs to view. Select All Log to view logs from all of the log categories that you selected in the Configuration > Log Settings screen.
Chapter 5 Monitor Click Monitor > Statistics. The following screen pops up. Figure 16 Statistics The following table describes the labels in this screen. Table 7 Statistics LABEL DESCRIPTION Description This is the wireless interface on the NWA. 802.11 Mode This field shows which 802.11 mode the NWA is using. Channel ID This shows the channel number which the NWA is currently using over the wireless LAN. RX Pkts This is the number of received packets on this port.
Chapter 5 Monitor Click Monitor > Association List to display the screen as shown next. Figure 17 Association List The following table describes the labels in this screen. Table 8 Association List LABEL DESCRIPTION # This is the index number of an associated wireless device. MAC Address This field displays the MAC address of an associated wireless device. SSID This field displays the SSID to which the wireless device is associated.
Chapter 5 Monitor Wait a moment while the NWA compiles the information. Figure 18 Channel Usage The following table describes the labels in this screen. Table 9 Channel Usage LABEL DESCRIPTION SSID This is the Service Set IDentification (SSID) name of the AP in an Infrastructure wireless network or wireless station in an Ad-Hoc wireless network.
Chapter 5 Monitor 54 NWA1120 Series User’s Guide
C HAPT ER 6 Wireless LAN 6.1 Overview This chapter discusses the steps to configure the Wireless Settings screen on the NWA. It also introduces the wireless LAN (WLAN) and some basic scenarios. Figure 19 Wireless Mode In the figure above, the NWA allows access to another bridge device (A) and a notebook computer (B) upon verifying their settings and credentials. It denies access to other devices (C and D) with configurations that do not match those specified in your NWA. 6.
Chapter 6 Wireless LAN • Use the MAC Filter screen to specify which wireless station is allowed or denied access to the NWA (see Section 6.9 on page 86). 6.3 What You Need To Know BSS A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless clients in the BSS.
Chapter 6 Wireless LAN Channel A channel is the radio frequency(ies) used by wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference. Wireless Mode The IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
Chapter 6 Wireless LAN The NWA secure communications via data encryption, wireless client authentication and MAC address filtering. It can also hide its identity in the network. User Authentication Authentication is the process of verifying whether a wireless device is allowed to use the wireless network. You can make every user log in to the wireless network before they can use it. However, every device in the wireless network has to support IEEE 802.1x to do this.
Chapter 6 Wireless LAN Passphrase A passphrase functions like a password. In WEP security mode, it is further converted by the NWA into a complicated string that is referred to as the “key”. This key is requested from all devices wishing to connect to a wireless network. PSK The Pre-Shared Key (PSK) is a password shared by a wireless access point and a client during a previous secure connection. The key can then be used to establish a connection between the two parties.
Chapter 6 Wireless LAN In the figure above, wireless clients A and B are trying to access the Internet via the NWA. The NWA in turn queries the RADIUS server if the identity of clients A and U are allowed access to the Internet. In this scenario, only client U’s identity is verified by the RADIUS server and allowed access to the Internet. The RADIUS server handles the following tasks: • Authentication which determines the identity of the users.
Chapter 6 Wireless LAN 6.4.1 Root AP Mode Use this screen to use your NWA as an access point. Select Root AP as the Operation Mode. The following screen displays.
Chapter 6 Wireless LAN The following table describes the general wireless LAN labels in this screen. Table 11 Wireless LAN > Wireless Settings: Root AP LABEL DESCRIPTION Basic Settings Wireless LAN Interface Select the check box to turn on the wireless LAN on the NWA. Operation Mode Select Root AP from the drop-down list. Wireless Mode If you are in the Wireless LAN > Wireless Settings or Wireless LAN > Wireless Settings- 2.4G screen, you can select from the following: • • • 802.
Chapter 6 Wireless LAN Table 11 Wireless LAN > Wireless Settings: Root AP (continued) LABEL DESCRIPTION Universal Repeater Settings The Universal repeater function allows the NWA in root AP or repeater mode to set up a wireless connection between it and another NWA in root AP or repeater mode. Note: Universal repeater security is independent of the security settings between the NWA and any wireless clients. Local MAC Address Local MAC Address is the MAC address of your NWA.
Chapter 6 Wireless LAN Table 11 Wireless LAN > Wireless Settings: Root AP (continued) LABEL DESCRIPTION MCS Rate The MCS Rate table is available only when 802.11n, 802.11b/g/n or 802.11a/n is selected in the Wireless Mode field. IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands for Modulation and Coding Scheme. This is an 802.11n feature that increases the wireless network performance in terms of throughput.
Chapter 6 Wireless LAN 6.4.2 Repeater Mode Use this screen to have the NWA act as a wireless repeater. You need to know the MAC address of the peer device, which also must be in Repeater or Root AP mode. Figure 23 Wireless LAN > Wireless Settings: Repeater The following table describes the bridge labels in this screen. Table 12 Wireless LAN > Wireless Settings: Repeater LABEL DESCRIPTION Basic Settings Wireless LAN Interface Select the check box to turn on the wireless LAN on the NWA.
Chapter 6 Wireless LAN Table 12 Wireless LAN > Wireless Settings: Repeater (continued) LABEL DESCRIPTION Wireless Mode If you are in the Wireless LAN > Wireless Settings or Wireless LAN > Wireless Settings- 2.4G screen, you can select from the following: • • • 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the NWA. The transmission rate of your NWA might be reduced. 802.11b/g/n to allow IEEE802.11b, IEEE802.11g and IEEE802.
Chapter 6 Wireless LAN Table 12 Wireless LAN > Wireless Settings: Repeater (continued) LABEL DESCRIPTION Output Power Set the output power of the NWA in this field. If there is a high density of APs in an area, decrease the output power of the NWA to reduce interference with other APs. Select one of the following Full (Full Power), 50%, 25% or 12.5%. See the product specifications for more information on your NWA’s output power.
Chapter 6 Wireless LAN 6.4.3 Wireless Client Mode Use this screen to turn your NWA into a wireless client. Select Client as the Operation Mode. The following screen displays. Figure 24 Wireless LAN > Wireless Settings: Wireless Client The following table describes the general wireless LAN labels in this screen. Table 13 Wireless LAN > Wireless Settings: Wireless Client LABEL DESCRIPTION Basic Settings Wireless LAN Interface Select the check box to turn on the wireless LAN on the NWA.
Chapter 6 Wireless LAN Table 13 Wireless LAN > Wireless Settings: Wireless Client (continued) LABEL DESCRIPTION SSID Profile The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID. In this field, select the SSID profile of the AP you want to use. Click Apply. The SSID used in the selected SSID profile automatically changes to be the one you select in the Site Survey screen.
Chapter 6 Wireless LAN Table 13 Wireless LAN > Wireless Settings: Wireless Client (continued) LABEL DESCRIPTION A-MPDU Aggregation This field is not available in the NWA1123-NI. Select to enable A-MPDU aggregation. Message Protocol Data Unit (MPDU) aggregation collects Ethernet frames along with their 802.11n headers and wraps them in a 802.11n MAC header. This method is useful for increasing bandwidth throughput in environments that are prone to high error rates.
Chapter 6 Wireless LAN 6.4.4 MBSSID Mode Use this screen to have the NWA function in MBSSID mode. Select MBSSID as the Operation Mode. The following screen diplays. Figure 25 Wireless LAN > Wireless Settings: MBSSID The following table describes the labels in this screen. Table 14 Wireless LAN > Wireless Settings: MBSSID LABEL DESCRIPTION Basic Settings Wireless LAN Interface Select the check box to turn on the wireless LAN on the NWA. Operation Mode Select MBSSID from the drop-down list.
Chapter 6 Wireless LAN Table 14 Wireless LAN > Wireless Settings: MBSSID (continued) LABEL DESCRIPTION Wireless Mode If you are in the Wireless LAN > Wireless Settings or Wireless LAN > Wireless Settings- 2.4G screen, you can select from the following: • • • 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the NWA. The transmission rate of your NWA might be reduced. 802.11b/g/n to allow IEEE802.11b, IEEE802.11g and IEEE802.
Chapter 6 Wireless LAN Table 14 Wireless LAN > Wireless Settings: MBSSID (continued) LABEL DESCRIPTION Preamble Type Select Dynamic to have the AP automatically use short preamble when wireless adapters support it, otherwise the AP uses long preamble. Select Long if you are unsure what preamble mode the wireless adapters support, and to provide more reliable communications in busy wireless networks. RTS/CTS Threshold (Request To Send) The threshold (number of bytes) for enabling RTS/CTS handshake.
Chapter 6 Wireless LAN 6.5 SSID Screen Use this screen to view and modify the settings of the SSID profiles on the NWA. Click Wireless LAN > SSID to display the screen as shown. Figure 26 Wireless LAN > SSID The following table describes the labels in this screen. Table 15 Wireless LAN > SSID LABEL DESCRIPTION Profile Settings # 74 This field displays the index number of each SSID profile. Profile Name This field displays the identification name of each SSID profile on the NWA.
Chapter 6 Wireless LAN 6.5.1 Configuring SSID Use this screen to configure an SSID profile. In the Wireless LAN > SSID screen, click Edit next to the SSID profile you want to configure to display the following screen. Figure 27 SSID: Edit The following table describes the labels in this screen. Table 16 SSID: Edit LABEL DESCRIPTION Profile Name This is the name that identifying this profile.
Chapter 6 Wireless LAN Table 16 SSID: Edit (continued) LABEL DESCRIPTION QoS Select the Quality of Service priority for this BSS’s traffic. • • • If you select WMM from the QoS list, the priority of a data packet depends on the packet’s IEEE 802.1q or DSCP header. If a packet has no WMM value assigned to it, it is assigned the default priority. If you select WMM_VOICE, WMM_VIDEO, WMM_BESTEFFORT or WMM_BACKGROUND, the NWA applies that QoS setting to all of that SSID’s traffic.
Chapter 6 Wireless LAN Click Wireless LAN > Security. Select the profile that you want to configure and click Edit. Figure 28 Wireless > Security The Security Settings screen varies depending upon the security mode you select. Figure 29 Security: None Note that some screens display differently depending on the operating mode selected in the Wireless LAN > Wireless Settings, Network > Wireless LAN > Wireless Settings- 2.4G or Network > Wireless LAN > Wireless Settings - 5G screen.
Chapter 6 Wireless LAN 6.6.1 Security: WEP Use this screen to use WEP as the security mode for your NWA. Select WEP in the Security Mode field to display the following screen. Figure 30 Security: WEP The following table describes the labels in this screen. Table 17 Security: WEP 78 LABEL DESCRIPTION Profile Name This is the name that identifying this profile. Security Mode Choose WEP in this field. Authentication Type Select Open or Shared from the drop-down list box.
Chapter 6 Wireless LAN Table 17 Security: WEP (continued) LABEL DESCRIPTION Key 1 to The WEP keys are used to encrypt data. Both the NWA and the wireless stations must use the same WEP key for data transmission. Key 4 If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F").
Chapter 6 Wireless LAN Table 18 Security: WPA/WPA2 for Access Point (continued) LABEL DESCRIPTION Reauthentication Time Specify how often wireless stations have to resend user names and passwords in order to stay connected. Enter a time interval between 100 and 3600 seconds. Alternatively, enter “0” to turn reauthentication off. Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority.
Chapter 6 Wireless LAN The following table describes the labels in this screen. Table 19 Security: WPA/WPA2 for Wireless Client LABEL DESCRIPTION Security Settings Profile Name This is the name that identifying this profile. Security Mode Choose the same security mode used by the AP. Data Encryption This shows the encryption method used by the NWA. IEEE802.1x Authentication Eap Type The options on the left refer to EAP methods. You can choose either TLS, LEAP, PEAP or TTLS.
Chapter 6 Wireless LAN The following table describes the labels not previously discussed Table 20 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX LABEL DESCRIPTION Profile Name This is the name that identifying this profile. Security Mode Choose WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in this field. Pre-Shared Key The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials.
Chapter 6 Wireless LAN Select a profile you want to configure and click Edit. Figure 35 Wireless LAN > RADIUS The following table describes the labels in this screen. Table 21 Wireless LAN > RADIUS LABEL DESCRIPTION Profile Name This is the name that identifying this RADIUS profile. Primary RADIUS Server Select the check box to enable user authentication through an external authentication server. Primary Server IP Address Enter the IP address of the RADIUS server to be used for authentication.
Chapter 6 Wireless LAN Table 21 Wireless LAN > RADIUS (continued) LABEL DESCRIPTION Backup RADIUS Server If the NWA cannot communicate with the primary RADIUS server, you can have the NWA use a backup RADIUS server. Make sure the check boxe is selected if you want to use the backup server. The NWA will attempt to communicate three times before using the backup server. Requests can be issued from the client interface to use the backup server.
Chapter 6 Wireless LAN network. The client can communicate with other wireless clients only if Intra-BSS Traffic blocking is disabled. Note: Intra-BSS Traffic Blocking is activated when you enable layer-2 isolation. Figure 36 Layer-2 Isolation Application MAC addresses that are not listed in the layer-2 isolation table are blocked from communicating with the NWA’s wireless clients except for broadcast packets.
Chapter 6 Wireless LAN Note: You need to know the MAC address of each wireless client, AP, computer or router that you want to allow to communicate with the NWA's wireless clients. Figure 37 Wireless LAN > Layer-2 Isolation The following table describes the labels in this screen. Table 22 Wireless LAN > Layer-2 Isolation LABEL DESCRIPTION Index This is the index number of the MAC address listed.
Chapter 6 Wireless LAN 00:A0:C5:00:00:02. You need to know the MAC address of each device to configure MAC filtering on the NWA. The MAC filter function allows you to configure the NWA to grant access to the NWA from other wireless devices (Allow Association) or exclude devices from accessing the NWA (Deny Association). Figure 38 MAC Filtering In the figure above, wireless client U is able to connect to the Internet because its MAC address is in the allowed association list specified in the NWA.
Chapter 6 Wireless LAN Select a profile you want to configure and click Edit. Figure 40 MAC Filter: Edit The following table describes the labels in this screen. Table 23 Wireless LAN > MAC Filter LABEL DESCRIPTION Profile Name This is the name that identifying this profile. Access Control Mode Select Disabled if you do not want to use this feature. Select Allow to permit access to the NWA. MAC addresses not listed will be denied access to the NWA. Select Deny to block access to theNWA.
Chapter 6 Wireless LAN 6.10.1 Additional Wireless Terms Table 24 Additional Wireless Terms TERM DESCRIPTION Intra-BSS Traffic This describes direct communication (not through the NWA) between two wireless devices within a wireless network. You might disable this kind of communication to enhance security within your wireless network. RTS/CTS Threshold In a wireless network which covers a large area, wireless devices are sometimes not aware of each other’s presence.
Chapter 6 Wireless LAN 6.10.2.1 WMM QoS Priorities The following table describes the WMM QoS priority levels that the NWA uses. Table 25 WMM QoS Priorities Priority Level description voice Typically used for traffic that is especially sensitive to jitter. Use this priority to reduce latency for improved voice quality.
C HAPT ER 7 LAN 7.1 Overview This chapter describes how you can configure the IP address of your NWA. The Internet Protocol (IP) address identifies a device on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Figure 41 IPv4 Setup The figure above illustrates one possible setup of your NWA. The gateway IPv4 address is 192.168.1.
Chapter 7 LAN IPv6 IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. IPv6 Addressing The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This is an example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000. IPv6 addresses can be abbreviated in two ways: • Leading zeros in a block can be omitted.
Chapter 7 LAN 7.4 LAN IP Screen Use this screen to configure the IP address for your NWA. Click Network > LAN to display the following screen. Figure 42 LAN IP The following table describes the labels in this screen. Table 27 LAN IP LABEL DESCRIPTION IPv4 Address Assignment Obtain IP Address Automatically Select this option if your NWA is using a dynamically assigned IPv4 address from a DHCP server each time.
Chapter 7 LAN Table 27 LAN IP (continued) LABEL DESCRIPTION IPv6 Address Assignment Enable Stateful Address Autoconfiguration Select this to turn on IPv6 stateful autoconfiguration to have the NWA obtain an IPv6 global address from a DHCPv6 server in your network. IPv6 Address/Prefix Length Enter your IPv6 address and prefix manually. System DNS Servers 94 Primary DNS Server Enter the IPv4 address of the first DNS (Domain Name Service) server, if provided.
C HAPT ER 8 VLAN 8.1 Overview This chapter discusses how to configure the NWA’s VLAN settings. Figure 43 Management VLAN Setup B A In the figure above, to access and manage the NWA from computer A, the NWA and switch B’s ports to which computer A and the NWA are connected should be in the same VLAN. 8.1.1 What You Can Do in This Chapter The VLAN screens let you set up the NWA’s mangement VLAN (Section 8.3 on page 96). 8.
Chapter 8 VLAN VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain. In traditional switched environments, all broadcast packets go to each and every individual port. With VLAN, all broadcasts are confined to a specific broadcast domain. IEEE 802.1Q Tag The IEEE 802.1Q standard defines an explicit VLAN tag in the MAC header to identify the VLAN membership of a frame across bridges.
C HAPT ER 9 System 9.1 Overview This chapter shows you how to enable remote management of your NWA. It provides information on determining which services or protocols can access which of the NWA’s interfaces. Remote Management allows a user to administrate the device over the network.
Chapter 9 System • Use the SNMP screen to configure through which interface(s) and from which IP address(es) a network systems manager can access the NWA (see Section 9.7 on page 104). • Use the FTP screen to configure through which interface(s) and from which IP address(es) you can use File Transfer Protocol (FTP) to manage the NWA. You can use FTP to upload the latest firmware for example (see Section 9.8 on page 106). 9.
Chapter 9 System The next figure illustrates an SNMP management operation. Figure 47 SNMP Management Mode An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the NWA). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions.
Chapter 9 System 1 Telnet 2 HTTP Certificate A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication. Figure 48 Certificates Example In the figure above, the NWA (Z) checks the identity of the notebook (A) using a certificate before granting access to the network. The certification authority certificate that you can import to your NWA should be in PFX PKCS#12 file format.
Chapter 9 System To change your NWA’s WWW settings, click System > WWW. The following screen shows. Figure 49 System > WWW The following table describes the labels in this screen. Table 28 System > WWW LABEL DESCRIPTION WWW HTTP Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. HTTPS Port The HTTPS proxy server listens on port 443 by default.
Chapter 9 System Click System > Certificates. The following screen shows. Figure 50 System > Certificates The following table describes the labels in this screen. Table 29 System > Certificates LABEL DESCRIPTION Import Certificate Import Certificate Enter the location of a previously-saved certificate to upload to the NWA. Alternatively, click the Browse button to locate a list. Browse Click this button to locate a previously-saved certificate to upload to the NWA.
Chapter 9 System The following table describes the labels in this screen. Table 30 System > Telnet LABEL DESCRIPTION TELNET Port You can change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Server Access Select the interface(s) through which a computer may access the NWA using Telnet and to which the IP and MAC filtering rules you specified below are applied.
Chapter 9 System 9.7 SNMP Screen Use this screen to have a manager station administrate your NWA over the network and configure SNMP accounts on the SNMP v3 manager. An SNMP administrator/user is an SNMP manager. To change your NWA’s SNMP settings, click System > SNMP. The following screen displays.
Chapter 9 System The following table describes the labels in this screen. Table 31 System > SNMP LABEL DESCRIPTION SNMP Port You can change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Server Access Select the interface(s) through which a computer may access the NWA using SNMP and to which the IP and MAC filtering rules you specified below are applied.
Chapter 9 System Table 31 System > SNMP (continued) LABEL DESCRIPTION Privacy Protocol Specify the encryption method used for SNMP communication with the SNMP administrator. DES - Data Encryption Standard is a widely used (but breakable) method of data encryption. It applies a 56-bit key to each 64-bit block of data. AES - Advanced Encryption Standard is another method for data encryption that also uses a secret key. AES applies a 128-bit key to 128-bit blocks of data.
Chapter 9 System To change your NWA’s FTP settings, click System > FTP. The following screen displays. Figure 53 System > FTP The following table describes the labels in this screen. Table 32 System > FTP LABEL DESCRIPTION FTP Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
Chapter 9 System as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.SNMP itself is a simple request/response protocol based on the manager/agent model. The manager issues a request and the agent returns responses using the following protocol operations: • Get - Allows the manager to retrieve an object variable from the agent. • GetNext - Allows the manager to retrieve the next object variable from a table or list within an agent.
Chapter 9 System certification authorities. You can use the NWA to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority. 9.9.5 Checking the Fingerprint of a Certificate on Your Computer A certificate’s fingerprints are message digests calculated using the MD5 or SHA1 algorithms. The following procedure describes how to check a certificate’s fingerprint to verify that you have the actual certificate.
Chapter 9 System 110 NWA1120 Series User’s Guide
C HAPTER 10 Log Settings 10.1 Overview This chapter provides information on viewing and generating logs on your NWA. Logs are files that contain recorded network activity over a set period. They are used by administrators to monitor the health of the system(s) they are managing. Logs enable administrators to effectively monitor events, errors, progress, etc. so that when network problems or system failures occur, the cause or origin can be traced.
Chapter 10 Log Settings 10.3 What You Need To Know Alerts and Logs An alert is a type of log that warrants more serious attention. Some categories such as System Error consist of both logs and alerts. You can differentiate them by their color in the Monitor > Logs screen. Alerts are displayed in red and logs are displayed in black.
Chapter 10 Log Settings To change your NWA’s log settings, click Configuration > Log Settings. The screen appears as shown. Figure 57 Log Settings The following table describes the labels in this screen. Table 33 Log Settings LABEL DESCRIPTION E-mail Log Settings Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below. If this field is left blank, logs and alert messages will not be sent via e-mail.
Chapter 10 Log Settings Table 33 Log Settings (continued) LABEL DESCRIPTION SMTP Authentication SMTP (Simple Mail Transfer Protocol) is the message-exchange standard for the Internet. Select the check box to activate SMTP authentication. If mail server authentication is needed but this feature is disabled, you will not receive the e-mail logs. If you use SMTP authentication, the mail receiver should be the owner of the SMTP account.
C HAPTER 11 Maintenance 11.1 Overview This chapter describes the maintenance screens. It discusses how you can upload new firmware, manage configuration and restart your NWA without turning it off and on. This chapter provides information and instructions on how to identify and manage your NWA over the network. Figure 58 NWA Setup In the figure above, the NWA connects to a Domain Name Server (DNS) server to avail of a domain name.
Chapter 11 Maintenance 11.3 What You Need To Know You can find the firmware for your device at www.zyxel.com. It is a file that uses the system project code with a "*.bin" extension, for example "V100AAEO0.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. 11.4 General Screen Use the General screen to identify your NWA over the network. Click Maintenance > General. The following screen displays.
Chapter 11 Maintenance 11.5 Password Screen Use this screen to control access to your NWA by assigning a password to it. Click Maintenance > Password. The following screen displays. Figure 60 Maintenance > Password The following table describes the labels in this screen. Table 35 Maintenance > Password LABEL DESCRIPTIONS Current Password Type in your existing system password. New Password Type your new system password. Note that as you type a password, the screen displays a dot (.
Chapter 11 Maintenance 11.6 Time Screen Use this screen to change your NWA’s time and date, click Maintenance > Time. The following screen displays. Figure 61 Maintenance > Time The following table describes the labels in this screen. Table 36 Maintenance > Time LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your NWA. Each time you reload this page, the NWA synchronizes the time with the time server (if configured).
Chapter 11 Maintenance 11.7 Firmware Upgrade Screen Use this screen to upload a firmware to your NWA. Click Maintenance > Firmware Upgrade. Follow the instructions in this section to upload firmware to your NWA. Figure 62 Maintenance > Firmware Upgrade The following table describes the labels in this screen. Table 37 Maintenance > Firmware Upgrade LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse ... to find it. Browse... Click Browse...
Chapter 11 Maintenance 11.8 Configuration File Screen Use this screen to backup, restore and reset the configuration of your NWA. Click Maintenance > Configuration File. The screen appears as shown next. Figure 65 Maintenance > Configuration File 11.8.1 Backup Configuration Backup configuration allows you to back up (save) the NWA’s current configuration to a file on your computer.
Chapter 11 Maintenance The NWA automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 66 Network Temporarily Disconnected If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default NWA IP address (192.168.1.2). See Appendix A on page 129 for details on how to set up your computer’s IP address. 11.8.
Chapter 11 Maintenance 122 NWA1120 Series User’s Guide
C HAPTER 12 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NWA Access and Login • Internet Access • Wireless LAN 12.1 Power, Hardware Connections, and LEDs The NWA does not turn on. None of the LEDs turn on. 1 Make sure you are using the power adaptor or cord included with the NWA.
Chapter 12 Troubleshooting 12.2 NWA Access and Login I forgot the IP address for the NWA. 1 The default IP address is 192.168.1.2. 2 If the NWA is working as a DHCP client and receives an IP address from a DHCP server, check the DHCP server for the NWA’s IP address. 3 If you configured a static IP address and have forgotten it, you have to reset the device to its factory defaults. See Section 2.2 on page 20. I forgot the password. 1 The default password is 1234.
Chapter 12 Troubleshooting Advanced Suggestions • Try to access the NWA using another service, such as Telnet. If you can access the NWA, check the remote management settings to find out why the NWA does not respond to HTTP. • If your computer is connected wirelessly, use a computer that is connected to a LAN/Ethernet port. I can see the Login screen, but I cannot log in to the NWA. 1 Make sure you have entered the user name and password correctly.
Chapter 12 Troubleshooting I cannot access the Internet anymore. I had access to the Internet (with the NWA), but my Internet connection is not available anymore. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.7 on page 18. 2 Reboot the NWA. 3 If the problem continues, contact your ISP or network administrator. The Internet connection is slow or intermittent. 1 There might be a lot of traffic on the network.
Chapter 12 Troubleshooting 5 Check that both the NWA and your wireless client are using the same wireless and wireless security settings.
Chapter 12 Troubleshooting 128 NWA1120 Series User’s Guide
A PPENDIX A Setting Up Your Computer’s IP Address Note: Your specific NWA may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix A Setting Up Your Computer’s IP Address 130 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon. 3 Right-click Local Area Connection and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix A Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel. 2 In the Control Panel, click View network status and tasks under the Network and Internet category. 3 Click Change adapter settings.
Appendix A Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences.
Appendix A Setting Up Your Computer’s IP Address 142 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix A Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 Click Apply Now and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 69 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 144 Click Apple > System Preferences.
Appendix A Setting Up Your Computer’s IP Address 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix A Setting Up Your Computer’s IP Address • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NWA. 6 146 Click Apply and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 70 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix A Setting Up Your Computer’s IP Address 148 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix A Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix A Setting Up Your Computer’s IP Address 150 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. 8 Click the Close button to apply the changes.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 71 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address 152 1 Click K Menu > Computer > Administrator Settings (YaST). 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Appendix A Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix A Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 72 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 154 Click Next to save the changes and close the Network Card Setup window.
Appendix A Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 73 openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDIX B Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScript and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 76 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 158 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix B Pop-up Windows, JavaScript and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 77 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 78 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
Appendix B Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 79 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. Figure 80 Security Settings - Java Scripting Java Permissions 162 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. Figure 81 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window. Figure 82 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix B Pop-up Windows, JavaScript and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 84 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly.
Appendix B Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 85 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the leftside menu. Select the check boxes as shown in the following screen.
Appendix B Pop-up Windows, JavaScript and Java Permissions To customize JavaScript behavior in the Opera browser, click JavaScript Options. Figure 87 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply.
Appendix B Pop-up Windows, JavaScript and Java Permissions 168 NWA1120 Series User’s Guide
A PPENDIX C IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 88 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix C IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks.
Appendix C IP Addresses and Subnetting The following table shows some possible subnet masks using both notations. Table 42 Alternative Subnet Mask Notation SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.0 /24 0000 0000 0 255.255.255.128 /25 1000 0000 128 255.255.255.192 /26 1100 0000 192 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.
Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 90 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix C IP Addresses and Subnetting Table 43 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 44 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix C IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 47 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
Appendix C IP Addresses and Subnetting Table 49 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
A PPENDIX D IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. IPv6 Addressing The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This is an example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000. IPv6 addresses can be abbreviated in two ways: • Leading zeros in a block can be omitted.
Appendix D IPv6 Global Address A global address uniquely identifies a device on the Internet. It is similar to a “public IP address” in IPv4. A global unicast address starts with a 2 or 3. Unspecified Address An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have its own address. It is similar to “0.0.0.0” in IPv4. Loopback Address A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar to “127.0.0.1” in IPv4.
Appendix D IPv6 Table 52 Reserved Multicast Address (continued) MULTICAST ADDRESS FF0A:0:0:0:0:0:0:0 FF0B:0:0:0:0:0:0:0 FF0C:0:0:0:0:0:0:0 FF0D:0:0:0:0:0:0:0 FF0E:0:0:0:0:0:0:0 FF0F:0:0:0:0:0:0:0 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses four bits for each character (1 ~ 10, A ~ F). Each block’s 16 bits are then represented by four hexadecimal characters.
Appendix D IPv6 combines its interface ID and global and subnet information advertised from the router. This is a routable global IP address. DHCPv6 The Dynamic Host Configuration Protocol for IPv6 (DHCPv6, RFC 3315) is a server-client protocol that allows a DHCP server to assign and pass IPv6 network addresses, prefixes and other configuration information to DHCP clients. DHCPv6 servers and clients exchange DHCP messages using UDP.
Appendix D IPv6 such as the system name. The interface-ID option provides slot number, port information and the VLAN ID to the DHCPv6 server. The remote-ID option (if any) is stripped from the Relay-Reply messages before the relay agent sends the packets to the clients. The DHCP server copies the interface-ID option from the Relay-Forward message into the Relay-Reply message and sends it to the relay agent. The interface-ID should not change even after the relay agent restarts.
Appendix D IPv6 determine whether the destination address is on-link and can be reached directly without passing through a router. If the address is onlink, the address is considered as the next hop. Otherwise, the NWA determines the next-hop from the default router list or routing table. Once the next hop IP address is known, the NWA looks into the neighbor cache to get the link-layer address and sends the packet when the neighbor is reachable.
Appendix D IPv6 Example - Enabling IPv6 on Windows XP/2003/Vista By default, Windows XP and Windows 2003 support IPv6. This example shows you how to use the ipv6 install command on Windows XP/2003 to enable IPv6. This also displays how to use the ipconfig command to see auto-generated IP addresses. C:\>ipv6 install Installing... Succeeded. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . IP Address. . . . .
Appendix D IPv6 5 Click Start and then OK. 6 Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer. To enable IPv6 in Windows 7: 184 1 Select Control Panel > Network and Sharing Center > Local Area Connection. 2 Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it. 3 Click OK to save the change.
Appendix D IPv6 4 Click Close to exit the Local Area Connection Status screen. 5 Select Start > All Programs > Accessories > Command Prompt. 6 Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS IPv6 Address. . . . . . Link-local IPv6 Address IPv4 Address. . . . . . Subnet Mask . . . . . . Default Gateway .
Appendix D IPv6 186 NWA1120 Series User’s Guide
A PPENDIX E Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix E Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 92 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix E Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 93 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix E Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 94 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
Appendix E Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver. Short and long refer to the length of the synchronization field in a packet.
Appendix E Wireless LANs Table 55 Wireless LAN Standards Comparison Table WIRELESS LAN STANDARD MAXIMUM NET DATA RATE FREQUENCY BAND COMPATIBILITY IEEE 802.11a 54 Mbps 5 GHz IEEE 802.11n IEEE 802.11n 300 Mbps 2.4 GHz, 5 GHz IEEE 802.11b IEEE 802.11g IEEE 802.11a Wireless Security Overview Wireless security is vital to your network to protect wireless communication between wireless clients, access points and the wired network.
Appendix E Wireless LANs RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The access point is the client and the server is the RADIUS server. The RADIUS server handles the following tasks: • Authentication Determines the identity of the users. • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity.
Appendix E Wireless LANs EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that supports IEEE 802.1x.
Appendix E Wireless LANs LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed.
Appendix E Wireless LANs Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA2 also uses TKIP when required for compatibility reasons, but offers stronger encryption than TKIP with Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP). TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server.
Appendix E Wireless LANs Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicant is the WPA patch for Windows XP, Funk Software's Odyssey client. The Windows XP patch is a free download that adds WPA capability to Windows XP's built-in "Zero Configuration" wireless client. However, you must run Windows XP to use it.
Appendix E Wireless LANs 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each wireless client's password and allows it to join the network only if the password matches. 3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over the network, but is derived from the PSK and the SSID.
Appendix E Wireless LANs Table 58 Wireless Security Relational Matrix (continued) AUTHENTICATION ENCRYPTIO METHOD/ KEY MANAGEMENT PROTOCOL N METHOD ENTER MANUAL KEY IEEE 802.1X WPA2 TKIP/AES No Enable WPA2-PSK TKIP/AES Yes Disable Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air.
Appendix E Wireless LANs • Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light from its bulb. The angle of the beam determines the width of the coverage pattern. Angles typically range from 20 degrees (very directional) to 120 degrees (less directional). Directional antennas are ideal for hallways and outdoor point-to-point applications. Positioning Antennas In general, antennas should be mounted as high as practically possible and free of obstructions.
A PPENDIX F Legal Information Copyright Copyright © 2012 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix F Legal Information IC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance.
Appendix F Legal Information Open Source Licenses This product contains in part some free software distributed under GPL license terms and/or GPL like licenses. Open source licenses are provided with the firmware package. You can download the latest firmware at www.zyxel.com. To obtain the source code covered under those Licenses, please contact support@zyxel.com.tw to get it. Regulatory Information European Union The following information applies if you use the product within the European Union.
Appendix F Legal Information National Restrictions This product may be used in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below: Ce produit peut être utilisé dans tous les pays de l’UE (et dans tous les pays ayant transposés la directive 1999/5/CE) sans aucune limitation, excepté pour les pays mentionnés ci-dessous: Questo prodotto è utilizzabile in tutte i paesi EU (ed in tutti gli altri paesi che seguono le diretti
Appendix F Legal Information List of national codes COUNTRY ISO 3166 2 LETTER CODE COUNTRY ISO 3166 2 LETTER CODE Austria AT Malta MT Belgium BE Netherlands NL Cyprus CY Poland PL Czech Republic CR Portugal PT Denmark DK Slovakia SK Estonia EE Slovenia SI Finland FI Spain ES France FR Sweden SE Germany DE United Kingdom GB Greece GR Iceland IS Hungary HU Liechtenstein LI NO Ireland IE Norway Italy IT Switzerland CH Latvia LV Bulgaria BG Lithuania
Appendix F Legal Information RoHS ENGLISH DEUTSCH ESPAÑOL FRANÇAIS Green Product Declaration Grünes Produkt Erklärung Declaración de Producto Ecológico Déclaration de Produit Vert RoHS Directive 2011/65/EU RoHS Richtlinie 2011/65/EU Directiva RoHS 2011/65/UE Directive RoHS 2011/65/UE WEEE Directive 2002/96/EC (WEEE: Waste Electrical and Electronic Equipment) 2003/108/EC;2008/34/EC ElektroG Richtlinie 2002/96/EG (ElektroG: Über Elektro- und Elektronik-Altgeräte) 2003/108/EG;2008/34/EG Directiv
Index Index authentication 100 file format 100 A access privileges 13 Accounting Server 84 Certificate Authority See CA. Alerts 112 Certificates Fingerprint 109 MD5 109 public key 100 SHA1 109 Alternative subnet mask notation 172 Certification Authority 108 Antenna 89 certifications 201 notices 202 viewing 202 Advanced Encryption Standard See AES.
Index ESS 56, 188 Ethernet device 86 Internet Assigned Numbers Authority See IANA Extended Service Set 56 Internet Protocol version 6, see IPv6 Extended Service Set, See ESS 188 Internet telephony 13 Extensible Authentication Protocol 59 IP Address 91 Gateway IP address 91 F Factory Defaults 121 restoring 21 FCC interference statement 201 Firmware 116 Fragmentation 63, 67, 69, 73 Fragmentation threshold 89 fragmentation threshold 190 FTP 99 restrictions 99 G Generic Token Card 59 GTC 59 Guide Quic
Index Send Log to 113 Syslog 114 Logs, Uses of 111 Passphrase 59 Password 124 PEAP 59 Personal Information Exchange Syntax Standard 100 M PFX PKCS#12 100 MAC Filter Allow Association 87 Deny Association 87 preamble mode 191 Maintenance 115 Association List 116 Backup 120 Restore 120 Management Information Base (MIB) 108 Preamble 89 Preamble Type 63, 67, 69, 73 Pre-Shared Key 59 priorities 90 product registration 202 Protected Extensible Authentication Protocol 59 PSK 59, 196 managing the device goo
Index Roaming 89 General 116 Password 117 Time Time and Date Setup 118 Time Zone 118 RootAP 15 RTS (Request To Send) 190 threshold 189, 190 RTS/CTS Threshold 63, 67, 69, 73, 89 S Security Mode, Choosing the 90 Security Modes None 58 WEP 58 WPA 58 WPA2 58 WPA2-MIX 58 WPA2-PSK 58 Service Set IDentifier 56 Service Set Identifier see SSID Simple Mail Transfer Protocol 112 SMTP 112, 114 SNMP MIBs 108 Spanning Tree Protocol 89 SSID 12, 56 SSID profile pre-configured 13 T telnet 102 Temporal Key Integrity Pro
Index W WMM QoS 89 warranty 202 note 202 WLAN interference 189 security parameters 198 WDS 15 WMM 76 Web Configurator 19 password 19 WMM QoS 89 WEP 58 WEP key encrypting 90 Wi-Fi Multimedia QoS 89 Wi-Fi Protected Access 58, 195 Wired Equivalent Privacy 58 Wireless Client 42 wireless client WPA supplicants 197 Wireless Distribution System (WDS) 15 Wireless Mode 57 Wireless Mode, Choosing the Access Point 29 Bridge 29 Wireless Client 29 Wireless Security 17 how to improve 17 Levels 58 wireless securi
Index 212 NWA1120 Series User’s Guide