Chapter 8 AP Profile Figure 56 Configuration > Object > AP Profile > SSID > Security List > Add/Edit Security Profile NWA / WAC Series User’s Guide 101
Chapter 8 AP Profile The following table describes the labels in this screen. Table 48 Configuration > Object > AP Profile > SSID > Security List > Add/Edit Security Profile LABEL DESCRIPTION Profile Name Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed. Security Mode Select a security mode from the list: none, wep, wpa2, or wpa2-mix.
Chapter 8 AP Profile Table 48 Configuration > Object > AP Profile > SSID > Security List > Add/Edit Security Profile (continued) LABEL DESCRIPTION Key Length Select the bit-length of the encryption key to be used in WEP connections. If you select WEP-64: • Enter 10 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (for example, 0x11AA22BB33) for each Key used. or • Enter 5 ASCII characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (for example, MyKey) for each Key used.
Chapter 8 AP Profile 8.5 MAC Filter List This screen allows you to create and manage security configurations that can be used by your SSIDs. To access this screen click Configuration > Object > AP Profile > SSID > MAC Filter List. Note: You can have a maximum of 32 MAC filtering profiles on the NWA/WAC. Figure 57 Configuration > Object > AP Profile > SSID > MAC Filter List The following table describes the labels in this screen.
Chapter 8 AP Profile Figure 58 Configuration > Object > AP Profile > SSID > MAC Filter List > Add/Edit MAC Filter Profile The following table describes the labels in this screen. Table 50 Configuration > Object > AP Profile > SSID > MAC Filter List > Add/Edit MAC Filter Profile LABEL DESCRIPTION Profile Name Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed.
Chapter 8 AP Profile In the following example, layer-2 isolation is enabled on the NWA/WAC to allow a guest wireless client (A) to access the main network router (B). The router provides access to the Internet and the network printer (C) while preventing the client from accessing other computers and servers on the network. The client can communicate with other wireless clients only if Intra-BSS Traffic blocking is disabled. Note: Intra-BSS Traffic Blocking is activated when you enable layer-2 isolation.
Chapter 8 AP Profile Table 51 Configuration > Object > AP Profile > SSID > Layer-2 Isolation List (continued) LABEL DESCRIPTION # This field is a sequential value, and it is not associated with a specific user. Profile Name This field indicates the name assigned to the layer-2 isolation profile. 8.6.1 Add/Edit Layer-2 Isolation Profile This screen allows you to create a new layer-2 isolation profile or edit an existing one.
Chapter 8 AP Profile Table 52 Configuration > Object > AP Profile > SSID > Layer-2 Isolation List > Add/Edit Layer-2 Isolation Profile (continued) LABEL DESCRIPTION Description This field displays a description for the MAC address associated with this profile. You can click the description to make it editable. Enter up to 60 characters, spaces and underscores allowed. OK Click OK to save your changes back to the NWA/WAC. Cancel Click Cancel to exit this screen without saving your changes.
CHAPTER 9 MON Profile 9.1 Overview This screen allows you to set up monitor mode configurations that allow your NWA/WAC to scan for other wireless devices in the vicinity. Once detected, you can use the Wireless > MON Mode screen (Section 6.3 on page 74) to classify them as either rogue or friendly. Not all NWA/WACs support monitor mode and rogue APs detection. 9.1.1 What You Can Do in this Chapter The MON Profile screen (Section 9.
Chapter 9 MON Profile Table 53 Configuration > Object > MON Profile (continued) LABEL DESCRIPTION Inactivate To turn off an entry, select it and click Inactivate. Object Reference Click this to view which other objects are linked to the selected monitor mode profile (for example, an AP management profile). # This field is a sequential value, and it is not associated with a specific profile. Status This field shows whether or not the entry is activated.
Chapter 9 MON Profile The following table describes the labels in this screen. Table 54 Configuration > Object > MON Profile > Add/Edit MON Profile LABEL DESCRIPTION Activate Select this to activate this monitor mode profile. Profile Name This field indicates the name assigned to the monitor mode profile. Channel dwell time Enter the interval (in milliseconds) before the NWA/WAC switches to another channel for monitoring.
Chapter 9 MON Profile Figure 64 Rogue AP Example X A RG C B In the example above, a corporate network’s security is compromised by a rogue AP (RG) set up by an employee at his workstation in order to allow him to connect his notebook computer wirelessly (A). The company’s legitimate wireless network (the dashed ellipse B) is well-secured, but the rogue AP uses inferior security that is easily broken by an attacker (X) running readily available encryption-cracking software.
C H A P T E R 10 WDS Profile 10.1 Overview This chapter shows you how to configure WDS (Wireless Disbribution System) profiles for the NWA/WAC to form a WDS with other APs. 10.1.1 What You Can Do in this Chapter The WDS Profile screen (Section 10.2 on page 113) creates preset WDS configurations that can be used by the NWA/WAC. 10.2 WDS Profile This screen allows you to manage and create WDS profiles that can be used by the APs. To access this screen, click Configuration > Object > WDS Profile.
Chapter 10 WDS Profile 10.2.1 Add/Edit WDS Profile This screen allows you to create a new WDS profile or edit an existing one. To access this screen, click the Add button or select and existing profile and click the Edit button. Figure 66 Configuration > Object > WDS Profile > Add/Edit WDS Profile The following table describes the labels in this screen.
C H A P T E R 11 Certificates 11.1 Overview The NWA/WAC can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication. 11.1.1 What You Can Do in this Chapter • The My Certificate screens (Section 11.
Chapter 11 Certificates 5 Additionally, Jenny uses her own private key to sign a message and Tim uses Jenny’s public key to verify the message. The NWA/WAC uses certificates based on public-key cryptology to authenticate users attempting to establish a connection, not to encrypt the data that you send after establishing a connection. The method used to secure the data that you send through an established connection depends on the type of connection.
Chapter 11 Certificates • Binary PKCS#12: This is a format for transferring public key and private key certificates.The private key in a PKCS #12 file is within a password-encrypted envelope. The file’s password is not connected to your certificate’s public or private passwords. Exporting a PKCS #12 file creates this and you must provide it to decrypt the contents when you import the file into the NWA/WAC. Note: Be careful not to convert a binary file to text during the transfer process.
Chapter 11 Certificates 11.2 My Certificates Click Configuration > Object > Certificate > My Certificates to open this screen. This is the NWA/WAC’s summary list of certificates and certification requests. Figure 67 Configuration > Object > Certificate > My Certificates The following table describes the labels in this screen.
Chapter 11 Certificates Table 57 Configuration > Object > Certificate > My Certificates (continued) LABEL DESCRIPTION Subject This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
Chapter 11 Certificates Figure 68 Configuration > Object > Certificate > My Certificates > Add NWA / WAC Series User’s Guide 120
Chapter 11 Certificates The following table describes the labels in this screen. Table 58 Configuration > Object > Certificate > My Certificates > Add LABEL DESCRIPTION Name Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. Subject Information Use these fields to record information that identifies the owner of the certificate.
Chapter 11 Certificates Table 58 Configuration > Object > Certificate > My Certificates > Add (continued) LABEL DESCRIPTION Create a certification request and enroll for a certificate immediately online Select this to have the NWA/WAC generate a request for a certificate and apply to a certification authority for a certificate. You must have the certification authority’s certificate already imported in the Trusted Certificates screen.
Chapter 11 Certificates Figure 69 Configuration > Object > Certificate > My Certificates > Edit NWA / WAC Series User’s Guide 123
Chapter 11 Certificates The following table describes the labels in this screen. Table 59 Configuration > Object > Certificate > My Certificates > Edit LABEL DESCRIPTION Name This field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. Certification Path This field displays for a certificate, not a certification request.
Chapter 11 Certificates Table 59 Configuration > Object > Certificate > My Certificates > Edit LABEL DESCRIPTION MD5 Fingerprint This is the certificate’s message digest that the NWA/WAC calculated using the MD5 algorithm. SHA1 Fingerprint This is the certificate’s message digest that the NWA/WAC calculated using the SHA1 algorithm. Certificate in PEM (Base-64) Encoded Format This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format.
Chapter 11 Certificates Figure 70 Configuration > Object > Certificate > My Certificates > Import The following table describes the labels in this screen. Table 60 Configuration > Object > Certificate > My Certificates > Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. Browse Click Browse to find the certificate file you want to upload. Password This field only applies when you import a binary PKCS#12 format file.
Chapter 11 Certificates Figure 71 Configuration > Object > Certificate > Trusted Certificates The following table describes the labels in this screen. Table 61 Configuration > Object > Certificate > Trusted Certificates LABEL DESCRIPTION PKI Storage Space in Use This bar displays the percentage of the NWA/WAC’s PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
Chapter 11 Certificates change the certificate’s name and set whether or not you want the NWA/WAC to check a certification authority’s list of revoked certificates before trusting a certificate issued by the certification authority.
Chapter 11 Certificates The following table describes the labels in this screen. Table 62 Configuration > Object > Certificate > Trusted Certificates > Edit LABEL DESCRIPTION Name This field displays the identifying name of this certificate. You can change the name. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
Chapter 11 Certificates Table 62 Configuration > Object > Certificate > Trusted Certificates > Edit (continued) LABEL DESCRIPTION Valid From This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable. Valid To This field displays the date that the certificate expires.
Chapter 11 Certificates Figure 73 Configuration > Object > Certificate > Trusted Certificates > Import The following table describes the labels in this screen. Table 63 Configuration > Object > Certificate > Trusted Certificates > Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. You cannot import a certificate with the same name as a certificate that is already in the NWA/ WAC.
C H A P T E R 12 System 12.1 Overview Use the system screens to configure general NWA/WAC settings. 12.1.1 What You Can Do in this Chapter • The Host Name screen (Section 12.2 on page 132) configures a unique name for the NWA/WAC in your network. • The Date/Time screen (Section 12.3 on page 133) configures the date and time for the NWA/WAC. • The WWW screens (Section 12.4 on page 137) configure settings for HTTP or HTTPS access to the NWA/ WAC. • The SSH screen (Section 12.
Chapter 12 System The following table describes the labels in this screen. Table 64 Configuration > System > Host Name LABEL DESCRIPTION System Name Choose a descriptive name to identify your NWA/WAC device. This name can be up to 64 alphanumeric characters long. Spaces are not allowed, but dashes (-) underscores (_) and periods (.) are accepted. System Location Specify the name of the place where the NWA/WAC is located. You can enter up to 60 alphanumeric and '()’ ,:;?! +-*/= #$%@ characters.
Chapter 12 System Figure 75 Configuration > System > Date/Time The following table describes the labels in this screen. Table 65 Configuration > System > Date/Time LABEL DESCRIPTION Current Time and Date Current Time This field displays the present time of your NWA/WAC. Current Date This field displays the present date of your NWA/WAC. Time and Date Setup Manual Select this radio button to enter the time and date manually.
Chapter 12 System Table 65 Configuration > System > Date/Time (continued) LABEL DESCRIPTION Get from Time Server Select this radio button to have the NWA/WAC get the time and date from the time server you specify below. The NWA/WAC requests time and date settings from the time server under the following circumstances. • • • When the NWA/WAC starts up. When you click Apply or Sync. Now in this screen. 24-hour intervals after starting up.
Chapter 12 System 12.3.1 Pre-defined NTP Time Servers List When you turn on the NWA/WAC for the first time, the date and time start at 2003-01-01 00:00:00. The NWA/WAC then attempts to synchronize with one of the following pre-defined list of Network Time Protocol (NTP) time servers. The NWA/WAC continues to use the following pre-defined list of NTP time servers if you do not specify a time server or it cannot synchronize with the time server you specified. Table 66 Default Time Servers 0.pool.ntp.org 1.
Chapter 12 System To get the NWA/WAC date and time from a time server: 1 Click System > Date/Time. 2 Select Get from Time Server under Time and Date Setup. 3 Under Time Zone Setup, select your Time Zone from the list. 4 Under Time and Date Setup, enter a Time Server Address. 5 Click Apply. 12.4 WWW Overview The following figure shows secure and insecure management of the NWA/WAC coming in from the WAN. HTTPS and SSH access are secure. HTTP, Telnet, and FTP management access are not secure.
Chapter 12 System 12.4.3 HTTPS You can set the NWA/WAC to use HTTP or HTTPS (HTTPS adds security) for Web Configurator sessions. HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web protocol that encrypts and decrypts web pages.
Chapter 12 System Figure 79 Configuration > System > WWW > Service Control The following table describes the labels in this screen. Table 67 Configuration > System > WWW > Service Control LABEL DESCRIPTION HTTPS Enable Select the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the NWA/WAC Web Configurator using secure HTTPs connections. Server Port The HTTPS server listens on port 443 by default.
Chapter 12 System 12.4.5 HTTPS Example If you haven’t changed the default HTTPS port on the NWA/WAC, then in your browser enter “https:// NWA/WAC IP Address/” as the web site address where “NWA/WAC IP Address” is the IP address or domain name of the NWA/WAC you wish to access. 12.4.5.1 Internet Explorer Warning Messages When you attempt to access the NWA/WAC HTTPS server, you will see the error message shown in the following screen.
Chapter 12 System Figure 81 Security Certificate 1 (Firefox) Figure 82 Security Certificate 2 (Firefox) 12.4.5.3 Avoiding Browser Warning Messages Here are the main reasons your browser displays warnings about the NWA/WAC’s HTTPS server certificate and what you can do to avoid seeing the warnings: • The issuing certificate authority of the NWA/WAC’s HTTPS server certificate is not one of the browser’s trusted certificate authorities.
Chapter 12 System • For the browser to trust a self-signed certificate, import the self-signed certificate into your operating system as a trusted certificate. • To have the browser trust the certificates issued by a certificate authority, import the certificate authority’s certificate into your operating system as a trusted certificate. Refer to Appendix A on page 198 for details. 12.4.5.
Chapter 12 System 12.4.5.5 Installing the CA’s Certificate 1 Double click the CA’s trusted certificate to produce a screen similar to the one shown next. 2 Click Install Certificate and follow the wizard as shown. 12.4.5.6 Installing a Personal Certificate You need a password in advance. The CA may issue the password or you may have to specify it during the enrollment. Double-click the personal certificate given to you by the CA to produce a screen similar to the one shown next.
Chapter 12 System 1 Click Next to begin the wizard. 2 The file name and path of the certificate you double-clicked should automatically appear in the File name text box. Click Browse if you wish to import a different certificate.
Chapter 12 System 3 Enter the password given to you by the CA. 4 Have the wizard determine where the certificate should be saved on your computer or select Place all certificates in the following store and choose a different location.
Chapter 12 System 5 Click Finish to complete the wizard and begin the import process. 6 You should see the following screen when the certificate is correctly installed on your computer. 12.4.5.7 Using a Certificate When Accessing the NWA/WAC To access the NWA/WAC via HTTPS: 1 Enter ‘https://NWA/WAC IP Address/’ in your browser’s web address field.
Chapter 12 System 2 When Authenticate Client Certificates is selected on the NWA/WAC, the following screen asks you to select a personal certificate to send to the NWA/WAC. This screen displays even if you only have a single certificate as in the example. 3 You next see the Web Configurator login screen. 12.5 SSH You can use SSH (Secure SHell) to securely access the NWA/WAC’s command line interface.
Chapter 12 System Figure 85 How SSH v1 Works Example 1 Host Identification The SSH client sends a connection request to the SSH server. The server identifies itself with a host key. The client encrypts a randomly generated session key with the host key and server key and sends the result back to the server. The client automatically saves any new server public keys. In subsequent connections, the server public key is checked against the saved version on the client computer.
Chapter 12 System 12.5.3 Requirements for Using SSH You must install an SSH client program on a client computer (Windows or Linux operating system) that is used to connect to the NWA/WAC over SSH. 12.5.4 Configuring SSH Click Configuration > System > SSH to open the following screen. Use this screen to configure your NWA/ WAC’s Secure Shell settings. Note: It is recommended that you disable Telnet and FTP when you configure SSH for secure connections.
Chapter 12 System 1 Launch the SSH client and specify the connection information (IP address, port number) for the NWA/ WAC. 2 Configure the SSH client to accept connection using SSH version 1. 3 A window displays prompting you to store the host key in you computer. Click Yes to continue. Figure 87 SSH Example 1: Store Host Key Enter the password to log in to the NWA/WAC. The CLI screen displays next. 12.5.5.
Chapter 12 System 3 The CLI screen displays next. 12.6 Telnet You can use Telnet to access the NWA/WAC’s command line interface. Click Configuration > System > TELNET to configure your NWA/WAC for remote Telnet access. Use this screen to enable or disable Telnet and set the server port number. Figure 90 Configuration > System > TELNET The following table describes the labels in this screen.
Chapter 12 System Figure 91 Configuration > System > FTP The following table describes the labels in this screen. Table 70 Configuration > System > FTP LABEL DESCRIPTION Enable Select the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the NWA/WAC using this service. TLS required Select the check box to use FTP over TLS (Transport Layer Security) to encrypt communication.
Chapter 12 System Figure 92 SNMP Management Model An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the NWA/WAC). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions. It executes applications that control and monitor managed devices.
Chapter 12 System administrators collect statistical data and monitor status and performance. You can download the NWA/WAC’s MIBs from www.zyxel.com. 12.8.2 SNMP Traps The NWA/WAC will send traps to the SNMP manager when any one of the following events occurs. Table 71 SNMP Traps OBJECT LABEL OBJECT ID DESCRIPTION linkDown 1.3.6.1.6.3.1.1.5.3 This trap is sent when the Ethernet link is down. linkUp 1.3.6.1.6.3.1.1.5.4 This trap is sent when the Ethernet link is up. authenticationFailure 1.3.6.1.
Chapter 12 System Table 72 Configuration > System > SNMP (continued) LABEL DESCRIPTION Trap Community Type the trap community, which is the password sent with each trap to the SNMP manager. The default is public and allows all requests. Destination Type the IP address of the station to send your SNMP traps to. Trap Wireless Event Select this to have the NWA/WAC send a trap to the SNMP manager when a wireless client is connected to or disconnected from the NWA/WAC.
Chapter 12 System The following table describes the labels in this screen. Table 73 Configuration > System > SNMP LABEL DESCRIPTION User Name Select the user name of the user account for which this SNMPv3 user profile is configured. Authentication Select the type of authentication the SNMPv3 user must use to connect to the NWA/WAC using this SNMPv3 user profile. Select MD5 to require the SNMPv3 user’s password be encrypted by MD5 for authentication.
C H A P T E R 13 Log and Report 13.1 Overview Use the system screens to configure daily reporting and log settings. 13.1.1 What You Can Do In this Chapter • The Email Daily Report screen (Section 13.2 on page 157) configures how and where to send daily reports and what reports to send. • The Log Setting screens (Section 13.3 on page 159) specify which logs are e-mailed, where they are emailed, and how often they are e-mailed. 13.
Chapter 13 Log and Report Figure 95 Configuration > Log & Report > Email Daily Report NWA / WAC Series User’s Guide 158
Chapter 13 Log and Report The following table describes the labels in this screen. Table 74 Configuration > Log & Report > Email Daily Report LABEL DESCRIPTION Enable Email Daily Report Select this to send reports by e-mail every day. Mail Server Type the name or IP address of the outgoing SMTP server. SSL/TLS Encryption Select SSL/TLS to use Secure Sockets Layer (SSL) or Transport Layer Security (TLS) if you want encrypted communications between the mail server and the NWA/WAC.
Chapter 13 Log and Report For alerts, the Log Setting screen controls which events generate alerts and where alerts are e-mailed. The Log Setting screen provides a summary of all the settings. You can use the Edit Log Setting screen to maintain the detailed settings (such as log categories, e-mail addresses, server names, etc.) for any log.
Chapter 13 Log and Report Table 75 Configuration > Log & Report > Log Setting (continued) LABEL DESCRIPTION Log Format This field displays the format of the log. Internal - system log; you can view the log on the View Log tab. VRPT/Syslog - Zyxel’s Vantage Report, syslog-compatible format. CEF/Syslog - Common Event Format, syslog-compatible format. Summary This field is a summary of the settings for each log. Active Log Summary Click this button to open the Active Log Summary screen.
Chapter 13 Log and Report Figure 97 Configuration > Log & Report > Log Setting > Edit System Log Setting The following table describes the labels in this screen. Table 76 Configuration > Log & Report > Log Setting > Edit System Log Setting LABEL DESCRIPTION E-Mail Server 1/2 Active Select this to send log messages and alerts according to the information in this section.
Chapter 13 Log and Report Table 76 Configuration > Log & Report > Log Setting > Edit System Log Setting (continued) LABEL SSL/TLS Encryption DESCRIPTION Select SSL/TLS to use Secure Sockets Layer (SSL) or Transport Layer Security (TLS) if you want encrypted communications between the mail server and the NWA/WAC. Select STARTTLS to upgrade a plain text connection to a secure connection using SSL/TLS. Select No to not encrypt the communications.
Chapter 13 Log and Report Table 76 Configuration > Log & Report > Log Setting > Edit System Log Setting (continued) LABEL E-mail Server 2 DESCRIPTION Use the E-Mail Server 2 drop-down list to change the settings for e-mailing logs to e-mail server 2 for all log categories. Using the System Log drop-down list to disable all logs overrides your e-mail server 2 settings. enable normal logs (green check mark) - e-mail log messages for all categories to e-mail server 2.
Chapter 13 Log and Report Figure 98 Configuration > Log & Report > Log Setting > Edit Remote Server NWA / WAC Series User’s Guide 165
Chapter 13 Log and Report The following table describes the labels in this screen. Table 77 Configuration > Log & Report > Log Setting > Edit Remote Server LABEL DESCRIPTION Log Settings for Remote Server Active Select this check box to send log information according to the information in this section. You specify what kinds of messages are included in log information in the Active Log section. Log Format This field displays the format of the log information. It is read-only.
Chapter 13 Log and Report Figure 99 Active Log Summary This screen provides a different view and a different way of indicating which messages are included in each log and each alert. (The Default category includes debugging messages generated by open source software.
Chapter 13 Log and Report The following table describes the fields in this screen. Table 78 Configuration > Log & Report > Log Setting > Active Log Summary LABEL DESCRIPTION Active Log Summary If the NWA/WAC is set to controller mode, the AC section controls logs generated by the controller and the AP section controls logs generated by the managed APs. System log Use the System Log drop-down list to change the log settings for all of the log categories.
Chapter 13 Log and Report Table 78 Configuration > Log & Report > Log Setting > Active Log Summary (continued) LABEL DESCRIPTION E-mail Server 2 Email Select whether each category of events should be included in log messages when it is emailed (green check mark) and/or in alerts (red exclamation point) for the e-mail settings specified in E-Mail Server 2. The NWA/WAC does not e-mail debugging information, even if it is recorded in the System log.
C H A P T E R 14 File Manager 14.1 Overview Configuration files define the NWA/WAC’s settings. Shell scripts are files of commands that you can store on the NWA/WAC and run when you need them. You can apply a configuration file or run a shell script without the NWA/WAC restarting. You can store multiple configuration files and shell script files on the NWA/WAC. You can edit configuration files or shell scripts in a text editor and upload them to the NWA/ WAC. Configuration files use a .
Chapter 14 File Manager While configuration files and shell scripts have the same syntax, the NWA/WAC applies configuration files differently than it runs shell scripts. This is explained below. Table 79 Configuration Files and Shell Scripts in the NWA/WAC Configuration Files (.conf) Shell Scripts (.zysh) • • • • • Resets to default configuration. Goes into CLI Configuration mode. Runs the commands in the configuration file. Goes into CLI Privilege mode. Runs the commands in the shell script.
Chapter 14 File Manager Once your NWA/WAC is configured and functioning properly, it is highly recommended that you back up your configuration file before making further configuration changes. The backup configuration file will be useful in case you need to return to your previous settings. Configuration File Flow at Restart • If there is not a startup-config.
Chapter 14 File Manager The following table describes the labels in this screen. Table 80 Maintenance > File Manager > Configuration File LABEL DESCRIPTION Rename Use this button to change the label of a configuration file on the NWA/WAC. You can only rename manually saved configuration files. You cannot rename the lastgood.conf, systemdefault.conf and startup-config.conf files. You cannot rename a configuration file to the name of another configuration file in the NWA/ WAC.
Chapter 14 File Manager Table 80 Maintenance > File Manager > Configuration File (continued) LABEL DESCRIPTION Apply Use this button to have the NWA/WAC use a specific configuration file. Click a configuration file’s row to select it and click Apply to have the NWA/WAC use that configuration file. The NWA/WAC does not have to restart in order to use a different configuration file, although you will need to wait for a few minutes while the system reconfigures.
Chapter 14 File Manager Table 80 Maintenance > File Manager > Configuration File (continued) LABEL DESCRIPTION Last Modified This column displays the date and time that the individual configuration files were last changed or saved. Upload Configuration File The bottom part of the screen allows you to upload a new or previously saved configuration file from your computer to your NWA/WAC You cannot upload a configuration file named system-default.conf or lastgood.conf. If you upload startup-config.
Chapter 14 File Manager C:\>ftp 192.168.1.2 Connected to 192.168.1.2. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------220-You are user number 1 of 5 allowed. 220-Local time is now 21:28. Server port: 21. 220-This is a private system - No anonymous login 220 You will be disconnected after 600 minutes of inactivity. User (192.168.1.2:(none)): admin 331 User admin OK. Password required Password: 230 OK. Current restricted directory is / ftp> cd conf 250 OK.
Chapter 14 File Manager Figure 102 Maintenance > File Manager > Firmware Package The following table describes the labels in this screen. Table 81 Maintenance > File Manager > Firmware Package LABEL DESCRIPTION Boot Module This is the version of the boot module that is currently on the NWA/WAC. Current Version This is the firmware version and the date created. Released Date This is the date that the version of the firmware was created.
Chapter 14 File Manager 1 Connect your computer to the NWA/WAC. 2 The FTP server IP address of the NWA/WAC in standalone AP mode is 192.168.1.2, so set your computer to use a static IP address from 192.168.1.3 ~192.168.1.254. 3 Use an FTP client on your computer to connect to the NWA/WAC. For example, in the Windows command prompt, type ftp 192.168.1.2. Keep the console session connected in order to see when the firmware recovery finishes. 4 Enter your user name when prompted.
Chapter 14 File Manager Note: You should include write commands in your scripts. If you do not use the write command, the changes will be lost when the NWA/WAC restarts. You could use multiple write commands in a long script. Figure 104 Maintenance > File Manager > Shell Script Each field is described in the following table. Table 82 Maintenance > File Manager > Shell Script LABEL DESCRIPTION Rename Use this button to change the label of a shell script file on the NWA/WAC.
Chapter 14 File Manager Table 82 Maintenance > File Manager > Shell Script (continued) LABEL DESCRIPTION Last Modified This column displays the date and time that the individual shell script files were last changed or saved. Upload Shell Script The bottom part of the screen allows you to upload a new or previously saved shell script file from your computer to your NWA/WAC. File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse...
C H A P T E R 15 Diagnostics 15.1 Overview Use the diagnostics screen for troubleshooting. 15.1.1 What You Can Do in this Chapter • The Diagnostics screen (Section 15.2 on page 181) generates a file containing the NWA/WAC’s configuration and diagnostic information if you need to provide it to customer support during troubleshooting. 15.2 Diagnostics This screen provides an easy way for you to generate a file containing the NWA/WAC’s configuration and diagnostic information.
Chapter 15 Diagnostics The following table describes the labels in this screen. Table 83 Maintenance > Diagnostics LABEL DESCRIPTION Filename This is the name of the most recently created diagnostic file. Last modified This is the date and time that the last diagnostic file was created. The format is yyyy-mm-dd hh:mm:ss. Size This is the size of the most recently created diagnostic file. Diagnostic Collect Category This field displays each category of settings.
C H A P T E R 16 LEDs 16.1 Overview The LEDs of your NWA/WAC can be controlled such that they stay lit (ON) or OFF after the NWA/WAC is ready. There are two features that control the LEDs of your NWA/WAC - Locator and Suppression. 16.1.1 What You Can Do in this Chapter • The Suppression screen (Section 16.2 on page 183)) allows you to set how you want the LEDs to behave after the device is ready. • The Locator screen (Section 16.
Chapter 16 LEDs Figure 106 Maintenance > LEDs > Suppression The following table describes fields in the above screen. Table 84 Maintenance > LED > Suppression LABEL DESCRIPTION Suppression On If the Suppression On check box is checked, the LEDs of your NWA/WAC will turn off after it’s ready. If the check box is unchecked, the LEDs will stay lit after the NWA/WAC is ready. Apply Click Apply to save your changes back to the NWA/WAC. Reset Click Reset to return the screen to its last-saved settings.
Chapter 16 LEDs Figure 107 Maintenance > LEDs > Locator The following table describes fields in the above screen. Table 85 Maintenance > LED > Locator LABEL DESCRIPTION Turn On Click Turn On button to activate the locator. The Locator function will show the actual location of the WAC between several devices in the network. Turn Off Otherwise, click Turn Off to disable the locator feature.
C H A P T E R 17 Antenna Switch 17.1 Overview Use this screen to adjust coverage depending on the orientation of the antenna. 17.1.1 What You Need To Know Positioning the antennas properly increases the range and coverage area of a wireless LAN. On the NWA/WAC that comes with internal antennas and also has an antenna switch, you can adjust coverage depending on the orientation of the antenna for the NWA/WAC radios using the web configurator, the command line interface (CLI) or a physical switch.
Chapter 17 Antenna Switch Figure 109 Maintenance > Antenna > Antenna Switch Select the Enable Software Control option to use the Web configurator to adjust coverage depending on each radio’s antenna orientation for better coverage. Select Wall if you mount the NWA/WAC to a wall. Select Ceiling if the the NWA/WAC is mounted on a ceiling. You can switch from Wall to Ceiling if there are still wireless dead zones, and vice versa.
C H A P T E R 18 Reboot 18.1 Overview Use this screen to restart the device. 18.1.1 What You Need To Know If you applied changes in the Web configurator, these were saved automatically and do not change when you reboot. If you made changes in the CLI, however, you have to use the write command to save the configuration before you reboot. Otherwise, the changes are lost when you reboot. Reboot is different to reset; reset returns the device to its default configuration. 18.
C H A P T E R 19 Shutdown 19.1 Overview Use this screen to shut down the device. Always use Maintenance > Shutdown > Shutdown or the shutdown command before you turn off the NWA/WAC or remove the power. Not doing so can cause the firmware to become corrupt. 19.1.1 What You Need To Know Shutdown writes all cached data to the local storage and stops the system processes. Shutdown is different to reset; reset returns the device to its default configuration. 19.
C H A P T E R 20 Troubleshooting 20.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LED • NWA/WAC Access and Login • Internet Access • Wireless Connections • Resetting the NWA/WAC 20.2 Power, Hardware Connections, and LED The NWA/WAC does not turn on. The LED is not on.
Chapter 20 Troubleshooting 4 Disconnect and re-connect the power adaptor or PoE power injector to the NWA/WAC. 5 If the problem continues, contact the vendor. 20.3 NWA/WAC Access and Login I forgot the IP address for the NWA/WAC. 1 The default IP address (in standalone AP mode) is 192.168.1.2. 2 If you changed the IP address and have forgotten it, you have to reset the device to its factory defaults. See Section 20.6 on page 197.
Chapter 20 Troubleshooting • Try to access the NWA/WAC using another service, such as Telnet. If you can access the NWA/WAC, check the remote management settings to find out why the NWA/WAC does not respond to HTTP. • If your computer is connected wirelessly, use a computer that is connected to a LAN/ETHERNET port. I forgot the password. 1 The default password is 1234. 2 If this does not work, you have to reset the device to its factory defaults. See Section 20.6 on page 197.
Chapter 20 Troubleshooting 3 If you are trying to access the Internet wirelessly, make sure the wireless settings on the wireless client are the same as the settings on the NWA/WAC. 4 Disconnect all the cables from your device, and follow the directions in the Quick Start Guide again. 5 If the problem continues, contact your ISP. I cannot access the Internet anymore. I had access to the Internet (with the NWA/WAC), but my Internet connection is not available anymore.
Chapter 20 Troubleshooting 2 Make sure the radio or at least one of the NWA/WAC’s radios is operating in AP mode. 3 Make sure the wireless adapter (installed on your computer) is working properly. 4 Make sure the wireless adapter (installed on your computer) is IEEE 802.11 compatible and supports the same wireless standard as the NWA/WAC’s active radio. 5 Make sure your computer (with a wireless adapter installed) is within the transmission range of the NWA/ WAC.
Chapter 20 Troubleshooting • Binary PKCS#12: This is a format for transferring public key and private key certificates.The private key in a PKCS #12 file is within a password-encrypted envelope. The file’s password is not connected to your certificate’s public or private passwords. Exporting a PKCS #12 file creates this and you must provide it to decrypt the contents when you import the file into the NWA/WAC. Note: Be careful not to convert a binary file to text during the transfer process.
Chapter 20 Troubleshooting In the Monitor > Wireless > AP Information > Radio List screen, there is no load balancing indicator associated with any APs assigned to the load balancing task. • Check to be sure that the AP profile which contains the load balancing settings is correctly assigned to the APs in question. • The load balancing task may have been terminated because further load balancing on the APs in question is no longer required.
Chapter 20 Troubleshooting • Detach the WAC6500 series indoor AP from the mounting bracket. 20.6 Resetting the NWA/WAC If you cannot access the NWA/WAC by any method, try restarting it by turning the power off and then on again. If you still cannot access the NWA/WAC by any method or you forget the administrator password(s), you can reset the NWA/WAC to its factory-default settings. Any configuration files or shell scripts that you saved on the NWA/WAC should still be available afterwards.
APPENDIX A Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix A Importing Certificates 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue to this website (not recommended). 3 In the Address Bar, click Certificate Error > View certificates.
Appendix A Importing Certificates 4 In the Certificate dialog box, click Install Certificate. 5 In the Certificate Import Wizard, click Next.
Appendix A Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. 7 Otherwise, select Place all certificates in the following store and then click Browse. 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix A Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. 10 If you are presented with another Security Warning, click Yes. 11 Finally, click OK when presented with the successful certificate installation message.
Appendix A Importing Certificates 12 The next time you start Internet Explorer and go to a Zyxel Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information. Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a Zyxel Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.
Appendix A Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7 on Windows XP. 1 Open Internet Explorer and click Tools > Internet Options. 2 In the Internet Options dialog box, click Content > Certificates.
Appendix A Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. 4 In the Certificates confirmation, click Yes. 5 In the Root Certificate Store dialog box, click Yes. 6 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix A Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK. 3 The certificate is stored and you can now connect securely to the Web Configurator.
Appendix A Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a Zyxel Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click Tools > Options. 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix A Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. 4 Use the Select File dialog box to locate the certificate and then click Open. 5 The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information. Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2.
Appendix A Importing Certificates 1 Open Firefox and click Tools > Options. 2 In the Options dialog box, click Advanced > Encryption > View Certificates.
Appendix A Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. 4 In the Delete Web Site Certificates dialog box, click OK. 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
APPENDIX B IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. IPv6 Addressing The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This is an example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000. IPv6 addresses can be abbreviated in two ways: • Leading zeros in a block can be omitted.
Appendix B IPv6 Unspecified Address An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have its own address. It is similar to “0.0.0.0” in IPv4. Loopback Address A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar to “127.0.0.1” in IPv4. Multicast Address In IPv6, multicast addresses provide the same functionality as IPv4 broadcast addresses. Broadcasting is not supported in IPv6.
Appendix B IPv6 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses four bits for each character (1 ~ 10, A ~ F). Each block’s 16 bits are then represented by four hexadecimal characters. For example, FFFF:FFFF:FFFF:FFFF:FC00:0000:0000:0000. Interface ID In IPv6, an interface ID is a 64-bit identifier.
Appendix B IPv6 Each DHCP client and server has a unique DHCP Unique IDentifier (DUID), which is used for identification when they are exchanging DHCPv6 messages. The DUID is generated from the MAC address, time, vendor assigned ID and/or the vendor's private enterprise number registered with the IANA. It should not change over time even after you reboot the device.
Appendix B IPv6 ICMPv6 Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is defined in RFC 4443. ICMPv6 has a preceding Next Header value of 58, which is different from the value used to identify ICMP for IPv4. ICMPv6 is an integral part of IPv6. IPv6 nodes use ICMPv6 to report errors encountered in packet processing and perform other diagnostic functions, such as "ping".
Appendix B IPv6 MLD allows an IPv6 switch or router to discover the presence of MLD listeners who wish to receive multicast packets and the IP addresses of multicast groups the hosts want to join on its network. MLD snooping and MLD proxy are analogous to IGMP snooping and IGMP proxy in IPv4. MLD filtering controls which multicast groups a port can join. MLD Messages A multicast router or switch periodically sends general queries to MLD hosts to update the multicast forwarding table.
Appendix B IPv6 1 Install Dibbler and select the DHCPv6 client option on your computer. 2 After the installation is complete, select Start > All Programs > Dibbler-DHCPv6 > Client Install as service. 3 Select Start > Control Panel > Administrative Tools > Services. 4 Double click Dibbler - a DHCPv6 client. 5 Click Start and then OK. 6 Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default.
Appendix B IPv6 1 Select Control Panel > Network and Sharing Center > Local Area Connection. 2 Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it. 3 Click OK to save the change. 4 Click Close to exit the Local Area Connection Status screen. 5 Select Start > All Programs > Accessories > Command Prompt. 6 Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Con
APPENDIX C Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a Zyxel office for the region in which you bought the device. See http://www.zyxel.com/homepage.shtml and also http://www.zyxel.com/about_zyxel/zyxel_worldwide.shtml for the latest information. Please have the following information ready when you contact an office. Required Information • Product model and serial number.
Appendix C Customer Support Korea • Zyxel Korea Corp. • http://www.zyxel.kr Malaysia • Zyxel Malaysia Sdn Bhd. • http://www.zyxel.com.my Pakistan • Zyxel Pakistan (Pvt.) Ltd. • http://www.zyxel.com.pk Philippines • Zyxel Philippines • http://www.zyxel.com.ph Singapore • Zyxel Singapore Pte Ltd. • http://www.zyxel.com.sg Taiwan • Zyxel Communications Corporation • http://www.zyxel.com/tw/zh/ Thailand • Zyxel Thailand Co., Ltd • http://www.zyxel.co.
Appendix C Customer Support Belgium • Zyxel Communications B.V. • http://www.zyxel.com/be/nl/ • http://www.zyxel.com/be/fr/ Bulgaria • Zyxel България • http://www.zyxel.com/bg/bg/ Czech Republic • Zyxel Communications Czech s.r.o • http://www.zyxel.cz Denmark • Zyxel Communications A/S • http://www.zyxel.dk Estonia • Zyxel Estonia • http://www.zyxel.com/ee/et/ Finland • Zyxel Communications • http://www.zyxel.fi France • Zyxel France • http://www.zyxel.
Appendix C Customer Support Latvia • Zyxel Latvia • http://www.zyxel.com/lv/lv/homepage.shtml Lithuania • Zyxel Lithuania • http://www.zyxel.com/lt/lt/homepage.shtml Netherlands • Zyxel Benelux • http://www.zyxel.nl Norway • Zyxel Communications • http://www.zyxel.no Poland • Zyxel Communications Poland • http://www.zyxel.pl Romania • Zyxel Romania • http://www.zyxel.com/ro/ro Russia • Zyxel Russia • http://www.zyxel.ru Slovakia • Zyxel Communications Czech s.r.o. organizacna zlozka • http://www.
Appendix C Customer Support • http://www.zyxel.ch/ Turkey • Zyxel Turkey A.S. • http://www.zyxel.com.tr UK • Zyxel Communications UK Ltd. • http://www.zyxel.co.uk Ukraine • Zyxel Ukraine • http://www.ua.zyxel.com Latin America Argentina • Zyxel Communication Corporation • http://www.zyxel.com/ec/es/ Brazil • Zyxel Communications Brasil Ltda. • https://www.zyxel.com/br/pt/ Ecuador • Zyxel Communication Corporation • http://www.zyxel.
Appendix C Customer Support North America USA • Zyxel Communications, Inc. - North America Headquarters • http://www.zyxel.com/us/en/ Oceania Australia • Zyxel Communications Corporation • http://www.zyxel.com/au/en/ Africa South Africa • Nology (Pty) Ltd. • http://www.zyxel.co.
APPENDIX D Legal Information Copyright Copyright © 2016 by Zyxel Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of Zyxel Communications Corporation. Published by Zyxel Communications Corporation.
Appendix D Legal Information “Este equipamento opera em caráter secundário, isto é, não tem direito à proteção contra interferência prejudicial, mesmo de estações do mesmo tipo, e não pode causar interferência a sistemas operando em caráter primário.” CANADA The following information applies if you use the product within Canada area.
Appendix D Legal Information • • • The device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems. For devices with detachable antenna(s), the maximum antenna gain permitted for devices in the band 5725-5850 MHz shall be such that the equipment still complies with the e.i.r.p.
Appendix D Legal Information Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Compliance information for 2.4GHz and/or 5GHz wireless products relevant to the EU and other Countries following the EU Directive 1999/5/EC (R&TTE). Български (Bulgarian) С настоящото Zyxel декларира, че това оборудване е в съответствие със съществените изисквания и другите приложими разпоредбите на Директива 1999/5/ЕC.
Appendix D Legal Information Das Produkt kann in allen EU Staaten ohne Einschränkungen eingesetzt werden (sowie in anderen Staaten die der Richtlinie 1999/5/CE folgen) mit Außnahme der folgenden aufgeführten Staaten: In the majority of the EU and other European countries, the 2.4GHz and 5GHz bands have been made available for the use of wireless local area networks (LANs). Later in this document you will find an overview of countries in which additional restrictions or requirements or both are applicable.
Appendix D Legal Information 1 Installation personal 2 This product is designed for specific application and needs to be installed by a qualified personal who has RF and related rule knowledge. The general user shall not attempt to install or change the setting. Installation location 3 The product shall be installed at a location where the radiating antenna can be kept 30 cm from nearby person in normal operation condition to meet regulatory RF exposure requirement.
Appendix D Legal Information Standby mode power consumption < 0.5W. Wireless setting, please refer to "Wireless" chapter for more detail. European Union - Disposal and Recycling Information The symbol below means that according to local regulations your product and/or its battery shall be disposed of separately from domestic waste. If this product is end of life, take it to a recycling station designated by local authorities.
Appendix D Legal Information Environmental Product Declaration NWA / WAC Series User’s Guide 232
Appendix D Legal Information 台灣 以下訊息僅適用於產品銷售至台灣地區 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司,商號或使用者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信法規定作業之無線電通信。 低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 NCC Statement: 1) 用 20 cm 計算 MPE 能符合 1mW/cm2 電磁波曝露量 MPE 標準值 (MPE) 1mW/cm2,送測產品實值為 0.316 mW/cm2 for NWA5123-AC。 電磁波曝露量 MPE 標準值 (MPE) 1mW/cm2,送測產品實值為 0.320 mW/cm2 for WAC6502D-S。 電磁波曝露量 MPE 標準值 (MPE) 1mW/cm2,送測產品實值為 0.
Appendix D Legal Information Viewing Certifications Go to http://www.zyxel.com to view this product’s documentation and certifications. Zyxel Limited Warranty Zyxel warrants to the original end user (purchaser) that this product is free from any defects in material or workmanship for a specific period (the Warranty Period) from the date of purchase. The Warranty Period varies by region.
Index Index see certificates Symbols Certificate Management Protocol (CMP) 122 Certificate Revocation List (CRL) 116 vs OCSP 131 certificates 115 advantages of 116 and CA 116 and FTP 152 and HTTPS 138 and SSH 149 and WWW 139 certification path 116, 124, 129 expired 116 factory-default 116 file formats 116 fingerprints 125, 130 importing 119 not used for encryption 116 revoked 116 self-signed 116, 121 serial number 124, 129 storage space 118, 127 thumbprint algorithms 117 thumbprints 117 used for authenti
Index configuration files 170 at restart 172 backing up 172 downloading 173 downloading with FTP 151 editing 170 how applied 171 lastgood.conf 172, 174 managing 171 startup-config.conf 174 startup-config-bad.conf 172 syntax 170 system-default.
Index example 140 vs HTTP 138 with Internet Explorer 140 with Netscape Navigator 140 MAC 106 LED suppression 183 HyperText Transfer Protocol over Secure Socket Layer, see HTTPS LEDs 20 Blinking 21, 23, 25, 27 Flashing 21, 23, 25, 26, 27 Off 21, 23, 25, 26, 27 load balancing 71 Locator LED 184 I log messages categories 164, 166, 167, 168 debugging 57 regular 57 types of 57 IEEE 802.
Index CLI 35 warning 38 Telnet 151 WWW, see WWW mode 12 reports daily 157 daily e-mail 157 model name 44 My Certificates, see also certificates 118 reset 197 vs reboot 188 vs shutdown 189 N RESET button 28, 197 restart 188 network access control 12 RF interference 14 Network Time Protocol (NTP) 136 RFC 2510 (Certificate Management Protocol or CMP) 122 Rivest, Shamir and Adleman public-key algorithm (RSA) 121 O root AP 12 objects certificates 115 users, account user 82 RSA 121, 129, 130 RSSI
Index Get 153 GetNext 153 Manager 153 managers 153 MIB 153 network components 153 Set 153 Trap 153 traps 154 versions 152 T Telnet 151 with SSH 149 time 133 time servers (default) 136 trademarks 225 Transport Layer Security (TLS) 152 troubleshooting 181 SSH 147 and certificates 149 client requirements 149 encryption methods 148 for secure Telnet 149 how connection is established 147 versions 148 with Linux 150 with Microsoft Windows 149 Trusted Certificates, see also certificates 126 U upgrading firmwa
Index V Vantage Report (VRPT) 161, 166 Virtual Local Area Network 66 VLAN 66 introduction 66 VoIP 13 VRPT (Vantage Report) 161, 166 W warm start 28 warning message popup 38 warranty 234 note 234 WDS 12, 16 Web Configurator 17, 30 access 30 requirements 30 supported browsers 30 web configurator 12 WEP (Wired Equivalent Privacy) 90 wireless channel 193 wireless client 71 Wireless Distribution System (WDS) 16 wireless LAN 193 Wireless network overview 70 wireless network example 70 wireless profile 89 layer-