all | frequencies |
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
Installation guide I | Users Manual | 2.24 MiB | ||||
1 |
|
Installation guide II | Users Manual | 1.76 MiB | ||||
1 |
|
Installation guide III | Users Manual | 2.76 MiB | ||||
1 | Cover Letter(s) | |||||||
1 | Test Setup Photos | |||||||
1 | Cover Letter(s) | |||||||
1 | External Photos | |||||||
1 | Test Report | |||||||
1 | Internal Photos | |||||||
1 | Cover Letter(s) | |||||||
1 | RF Exposure Info | |||||||
1 | Test Setup Photos | |||||||
1 | ID Label/Location Info |
1 | Installation guide I | Users Manual | 2.24 MiB |
NWA-1100 802.11b/g Wireless Access Point Users Guide Version 1.00 7/2008 Edition 1 www.zyxel.com About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the ZyXEL Device using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access. Supporting Disk Refer to the included CD for support documents. ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications. User Guide Feedback Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. E-mail: techwriters@zyxel.com.tw ZyXEL NWA-1100 Users Guide 3 Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this Users Guide.
Warnings tell you about things that could harm you or your device.
Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions The NWA-1100 may be referred to as the ZyXEL Device, the device or the system in this Users Guide. Product labels, screen names, field labels and field choices are all in bold font. A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the enter or return key on your keyboard. Enter means for you to type one or more characters and then press the [ENTER] key. Select or choose means for you to use one of the predefined choices. A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Configuration File > Backup means you first click Maintenance in the navigation panel, then the Configuration File sub menu and finally the Backup button to get to that screen. Units of measurement may denote the metric value or the scientific value. For example, k for kilo may denote 1000 or 1024, M for mega may denote 1000000 or 1048576 and so on. e.g., is a shorthand for for instance, and i.e., means that is or in other words. 4 ZyXEL NWA-1100 Users Guide Document Conventions Icons Used in Figures Figures in this Users Guide may use the following generic icons. The ZyXEL Device icon is not an exact representation of your device. ZyXEL Device Computer Notebook computer Server Printer Firewall Ethernet Switch Switch Router ZyXEL NWA-1100 Users Guide 5 Safety Warnings Safety Warnings
For your safety, be sure to read and follow all warning notices and instructions. Do NOT use this product near water, for example, in a wet basement or near a swimming pool. Do NOT expose your device to dampness, dust or corrosive liquids. Do NOT store things on the device. Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. Connect ONLY suitable accessories to the device. ONLY qualified service personnel should service or disassemble this device. Make sure to connect the cables to the correct ports. Place connecting cables carefully so that no one will step on them or stumble over them. Always disconnect all cables from this device before servicing or disassembling. Use ONLY an appropriate power adaptor or cord for your device. Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe). Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord. Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution. If the power adaptor or cord is damaged, remove it from the power outlet. Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one. Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning. Antenna Warning! This device meets ETSI and FCC certification requirements when using the included antenna(s). Only use the included antenna(s). If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged. The PoE (Power over Ethernet) devices that supply or receive power and their connected Ethernet cables must all be completely indoors. This product is recyclable. Dispose of it properly. 6 ZyXEL NWA-1100 Users Guide Safety Warnings ZyXEL NWA-1100 Users Guide 7 Safety Warnings 8 ZyXEL NWA-1100 Users Guide Contents Overview Contents Overview Introduction ............................................................................................................................23 Introducing the ZyXEL Device ................................................................................................... 25 Introducing the Web Configurator .............................................................................................. 35 Status Screens .......................................................................................................................... 39 Tutorial ....................................................................................................................................... 43 The Web Configurator ...........................................................................................................51 System Screens ........................................................................................................................ 53 Wireless Settings Screen .......................................................................................................... 61 Wireless Security Screen .......................................................................................................... 75 RADIUS Screen ......................................................................................................................... 89 MAC Filter Screen ..................................................................................................................... 93 IP Screen ................................................................................................................................... 97 Remote Management .............................................................................................................. 101 Certificate Screen .....................................................................................................................111 Log Screens .............................................................................................................................115 Maintenance ............................................................................................................................ 121 Troubleshooting ....................................................................................................................... 129 Appendices and Index .........................................................................................................133 ZyXEL NWA-1100 Users Guide 9 Contents Overview 10 ZyXEL NWA-1100 Users Guide Table of Contents Table of Contents About This User's Guide ..........................................................................................................3 Document Conventions............................................................................................................4 Safety Warnings........................................................................................................................6 Contents Overview ...................................................................................................................9 Table of Contents....................................................................................................................11 List of Figures .........................................................................................................................17 List of Tables...........................................................................................................................21 Part I: Introduction................................................................................. 23 Chapter 1 Introducing the ZyXEL Device...............................................................................................25 1.1 Introducing the ZyXEL Device ............................................................................................. 25 1.2 Applications for the ZyXEL Device ...................................................................................... 25 1.2.1 Access Point .............................................................................................................. 25 1.2.2 Wireless Client ........................................................................................................... 26 1.2.3 Bridge ......................................................................................................................... 27 1.2.4 AP + Bridge ................................................................................................................ 29 1.3 Ways to Manage the ZyXEL Device .................................................................................... 30 1.4 Configuring Your ZyXEL Devices Security Features .......................................................... 30 1.4.1 Control Access to Your Device ................................................................................... 30 1.4.2 Wireless Security ....................................................................................................... 31 1.5 Good Habits for Managing the ZyXEL Device ..................................................................... 31 1.6 Hardware Connections ........................................................................................................ 32 1.7 LEDs .................................................................................................................................... 32 Chapter 2 Introducing the Web Configurator ........................................................................................35 2.1 Accessing the Web Configurator ......................................................................................... 35 2.2 Resetting the ZyXEL Device ................................................................................................ 36 2.2.1 Methods of Restoring Factory-Defaults ...................................................................... 36 2.3 Navigating the Web Configurator ......................................................................................... 36 ZyXEL NWA-1100 Users Guide 11 Table of Contents Chapter 3 Status Screens ........................................................................................................................39 3.1 The Status Screen ............................................................................................................... 39 3.1.1 System Statistics Screen ............................................................................................ 41 Chapter 4 Tutorial.....................................................................................................................................43 4.1 How to Configure the Wireless LAN .................................................................................... 43 4.1.1 Choosing the Wireless Mode ..................................................................................... 43 4.1.2 Wireless LAN Configuration Overview ....................................................................... 43 4.1.3 Further Reading ......................................................................................................... 44 4.2 ZyXEL Device Setup in Wireless Client Mode ..................................................................... 44 4.2.1 Scenario ..................................................................................................................... 45 4.2.2 Configuring the ZyXEL Device in Access Point Mode .............................................. 45 4.2.3 Configuring the ZyXEL Device in Wireless Client Mode ............................................ 46 4.2.4 Testing the Connection and Troubleshooting ............................................................. 49 Part II: The Web Configurator ............................................................... 51 Chapter 5 System Screens ......................................................................................................................53 5.1 Overview .............................................................................................................................. 53 5.2 What You Can Do in the System Screens ........................................................................... 53 5.3 What You Need To Know About the System Screens ......................................................... 54 5.4 General Screen ................................................................................................................... 55 5.4.1 Password Screen ....................................................................................................... 56 5.5 Time Screen ....................................................................................................................... 56 5.6 Technical Reference ............................................................................................................ 58 5.6.1 Pre-defined NTP Time Servers List ............................................................................ 58 Chapter 6 Wireless Settings Screen.......................................................................................................61 6.1 Overview .............................................................................................................................. 61 6.2 What You Can Do in the Wireless Settings Screen ............................................................. 61 6.3 What You Need To Know About Wireless Settings Screen ................................................. 62 6.4 Wireless Settings Screen .................................................................................................... 63 6.4.1 Access Point Mode .................................................................................................... 63 6.4.2 Wireless Client Mode ................................................................................................. 65 6.4.3 Bridge Mode ............................................................................................................... 68 6.4.4 AP + Bridge Mode ...................................................................................................... 70 6.5 Technical Reference ............................................................................................................ 71 12 ZyXEL NWA-1100 Users Guide Table of Contents 6.5.1 WMM QoS .................................................................................................................. 71 6.5.2 Spanning Tree Protocol (STP) ................................................................................... 71 6.5.2.1 Rapid STP ........................................................................................................ 71 6.5.2.2 STP Terminology .............................................................................................. 71 6.5.2.3 How STP Works ............................................................................................... 72 6.5.2.4 STP Port States ................................................................................................ 72 6.5.3 Additional Wireless Terms .......................................................................................... 73 Chapter 7 Wireless Security Screen.......................................................................................................75 7.1 Overview .............................................................................................................................. 75 7.2 What You Can Do in the Wireless Security Screen ............................................................. 75 7.3 What You Need To Know About Wireless Security .............................................................. 76 7.4 The Security Screen ............................................................................................................ 77 7.4.1 Security: WEP ............................................................................................................ 78 7.4.2 Security: 802.1x Only ................................................................................................. 79 7.4.2.1 Access Point ..................................................................................................... 79 7.4.2.2 Wireless Client .................................................................................................. 80 7.4.3 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ................................................... 81 7.4.4 Security: WPA ............................................................................................................ 83 7.4.4.1 Access Point ..................................................................................................... 83 7.4.4.2 Wireless Client .................................................................................................. 84 7.4.5 Security: WPA2 or WPA2-MIX .................................................................................... 85 7.4.5.1 Access Point ..................................................................................................... 85 7.4.5.2 Wireless Client .................................................................................................. 86 7.4.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX .................................................... 87 7.5 Technical Reference ............................................................................................................ 87 Chapter 8 RADIUS Screen .......................................................................................................................89 8.1 Overview .............................................................................................................................. 89 8.2 What You Can Do in the RADIUS Screen ........................................................................... 89 8.3 What You Need to Know About RADIUS ............................................................................. 89 8.4 The RADIUS Screen ........................................................................................................... 90 Chapter 9 MAC Filter Screen...................................................................................................................93 9.1 Overview .............................................................................................................................. 93 9.2 What You Can Do in the MAC Filter .................................................................................... 93 9.3 What You Need To Know About MAC Filter ........................................................................ 93 9.4 MAC Filter Screen ............................................................................................................... 94 Chapter 10 IP Screen..................................................................................................................................97 ZyXEL NWA-1100 Users Guide 13 Table of Contents 10.1 Overview ............................................................................................................................ 97 10.2 What You Can Do in the IP Screen ................................................................................... 97 10.3 What You Need to Know About IP ..................................................................................... 97 10.4 IP Screen ........................................................................................................................... 98 10.5 Technical Reference .......................................................................................................... 99 10.5.1 WAN IP Address Assignment ................................................................................... 99 Chapter 11 Remote Management............................................................................................................101 11.1 Overview .......................................................................................................................... 101 11.2 What You Can Do in the Remote Management Screens ................................................. 102 11.3 What You Need To Know About Remote Management ................................................... 102 11.4 The Telnet Screen ............................................................................................................ 104 11.5 The FTP Screen ............................................................................................................... 104 11.6 The WWW Screen ........................................................................................................... 105 11.7 The SNMP Screen ........................................................................................................... 106 11.8 Technical Reference ........................................................................................................ 108 11.8.1 MIB ......................................................................................................................... 108 11.8.2 Supported MIBs ...................................................................................................... 108 11.8.3 SNMP Traps ........................................................................................................... 108 Chapter 12 Certificate Screen ................................................................................................................. 111 12.1 Overview ...........................................................................................................................111 12.2 What You Can Do in the Certificate Screen ......................................................................111 12.3 What You Need To Know About Certificates ....................................................................111 12.4 Certificate Screen .............................................................................................................112 12.5 Technical Reference .........................................................................................................112 12.5.1 Private-Public Certificates .......................................................................................113 12.5.2 Certification Authorities ...........................................................................................113 12.5.3 Checking the Fingerprint of a Certificate on Your Computer ...................................113 Chapter 13 Log Screens .......................................................................................................................... 115 13.1 Overview ...........................................................................................................................115 13.2 What You Can Do in the Log Screens ..............................................................................115 13.3 What You Need To Know About Logs ...............................................................................116 13.4 View Log Screen ...............................................................................................................116 13.5 Log Settings Screen .........................................................................................................117 13.6 Technical Reference .........................................................................................................118 13.6.1 Example Log Messages ..........................................................................................119 13.7 Log Commands ................................................................................................................119 13.7.1 Configuring What You Want the ZyXEL Device to Log ...........................................119 14 ZyXEL NWA-1100 Users Guide Table of Contents 13.7.2 Displaying Logs ...................................................................................................... 120 13.7.3 Command List ........................................................................................................ 120 Chapter 14 Maintenance ..........................................................................................................................121 14.1 Overview .......................................................................................................................... 121 14.2 What You Can Do in the Maintenance Screens .............................................................. 121 14.3 What You Need To Know About the Maintenance Screens ............................................. 121 14.4 Association List Screen ................................................................................................... 121 14.5 Channel Usage Screen ................................................................................................... 122 14.6 F/W Upload Screen ......................................................................................................... 123 14.7 Configuration Screen ....................................................................................................... 124 14.7.1 Backup Configuration ............................................................................................. 125 14.7.2 Restore Configuration ............................................................................................ 125 14.7.3 Back to Factory Defaults ........................................................................................ 126 14.8 Restart Screen ................................................................................................................. 127 Chapter 15 Troubleshooting....................................................................................................................129 15.1 Power, Hardware Connections, and LEDs ...................................................................... 129 15.2 ZyXEL Device Access and Login .................................................................................... 129 15.3 Internet Access ................................................................................................................ 131 Part III: Appendices and Index............................................................ 133 Appendix A Product Specifications.......................................................................................135 Appendix B Power over Ethernet (PoE) Specifications ........................................................137 Appendix C Power Adaptor Specifications ...........................................................................139 Appendix D Setting up Your Computers IP Address ...........................................................141 Appendix E Wireless LANs ..................................................................................................153 Appendix F Pop-up Windows, JavaScripts and Java Permissions ......................................167 Appendix G IP Addresses and Subnetting ...........................................................................173 Appendix H Text File Based Auto Configuration ..................................................................181 Appendix I How to Access and Use the CLI.........................................................................187 Appendix J Legal Information...............................................................................................191 Appendix K Customer Support.............................................................................................195 ZyXEL NWA-1100 Users Guide 15 Table of Contents Index.......................................................................................................................................201 16 ZyXEL NWA-1100 Users Guide List of Figures List of Figures Figure 1 Access Point Application .......................................................................................................... 26 Figure 2 Wireless Client Application ....................................................................................................... 26 Figure 3 Bridge Application .................................................................................................................... 27 Figure 4 Bridging Example ..................................................................................................................... 28 Figure 5 Bridge Loop: Two Bridges Connected to Hub .......................................................................... 28 Figure 6 Bridge Loop: Bridge Connected to Wired LAN ......................................................................... 29 Figure 7 AP + Bridge Application ........................................................................................................... 30 Figure 8 LEDs ......................................................................................................................................... 32 Figure 9 Change Password Screen ........................................................................................................ 35 Figure 10 Status Screen of the Web Configurator .................................................................................. 37 Figure 11 The Status Screen .................................................................................................................. 39 Figure 12 System Status: Show Statistics .............................................................................................. 41 Figure 13 Configuring Wireless LAN ...................................................................................................... 44 Figure 14 FTP Server Connected to a Wireless Client ........................................................................... 45 Figure 15 Access Point Mode Wireless Setttings ................................................................................... 46 Figure 16 Access Point Mode Security Setttings .................................................................................... 46 Figure 17 Wireless Client Mode Wireless Settings ................................................................................. 47 Figure 18 Site Survey ............................................................................................................................. 48 Figure 19 Wireless Client Mode ............................................................................................................. 48 Figure 20 Wireless Client Mode Security Setttings ................................................................................ 49 Figure 21 Wireless Client MAC Filtering ................................................................................................. 49 Figure 22 ZyXEL Device Setup .............................................................................................................. 53 Figure 23 System: General .................................................................................................................... 55 Figure 24 System: Password. ................................................................................................................ 56 Figure 25 System: Time .......................................................................................................................... 57 Figure 26 Wireless Mode ........................................................................................................................ 61 Figure 27 Wireless: Access Point ........................................................................................................... 63 Figure 28 Wireless: Wireless Client ........................................................................................................ 66 Figure 29 Wireless: Bridge ..................................................................................................................... 68 Figure 30 Wireless: AP+Bridge .............................................................................................................. 70 Figure 31 Securing the Wireless Network .............................................................................................. 75 Figure 32 Security: None ........................................................................................................................ 78 Figure 33 Security: WEP ........................................................................................................................ 78 Figure 34 Security: 802.1x Only for Access Point .................................................................................. 80 Figure 35 Security: 802.1x Only for Wireless Client ............................................................................... 81 Figure 36 Security: 802.1x Static 64-bit, 802.1x Static 128-bit (AP mode) ............................................. 82 Figure 37 Security: WPA for Access Point ............................................................................................ 83 Figure 38 Security: WPA for Wireless Client .......................................................................................... 84 ZyXEL NWA-1100 Users Guide 17 List of Figures Figure 39 Security:WPA2 or WPA2-MIX for Access Point ...................................................................... 85 Figure 40 Security: WPA2 or WPA2-MIX for Wireless Client .................................................................. 86 Figure 41 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................. 87 Figure 42 RADIUS Server Setup ............................................................................................................ 89 Figure 43 Wireless > RADIUS ................................................................................................................ 90 Figure 44 MAC Filtering ......................................................................................................................... 93 Figure 45 Wireless > MAC Filter ............................................................................................................. 94 Figure 46 IP Setup .................................................................................................................................. 97 Figure 47 IP Setup .................................................................................................................................. 98 Figure 48 Remote Management Example ............................................................................................ 101 Figure 49 SNMP Management Mode ................................................................................................... 103 Figure 50 Remote Management: Telnet ............................................................................................... 104 Figure 51 Remote Management: FTP .................................................................................................. 105 Figure 52 Remote Management: WWW ............................................................................................... 106 Figure 53 Remote Management: SNMP .............................................................................................. 107 Figure 54 Certificates Example .............................................................................................................111 Figure 55 Certificate ..............................................................................................................................112 Figure 56 Certificates on Your Computer ..............................................................................................113 Figure 57 Certificate Details .................................................................................................................114 Figure 58 Accessing Logs in the Network ............................................................................................115 Figure 59 View Log ................................................................................................................................116 Figure 60 Log Settings ..........................................................................................................................117 Figure 61 Association List .................................................................................................................... 122 Figure 62 Channel Usage ..................................................................................................................... 122 Figure 63 Firmware Upload .................................................................................................................. 123 Figure 64 Firmware Upload In Process ................................................................................................ 124 Figure 65 Network Temporarily Disconnected ...................................................................................... 124 Figure 66 Firmware Upload Error ......................................................................................................... 124 Figure 67 Configuration ........................................................................................................................ 125 Figure 68 Configuration Upload Successful ......................................................................................... 126 Figure 69 Network Temporarily Disconnected ...................................................................................... 126 Figure 70 Configuration Upload Error ................................................................................................... 126 Figure 71 Reset Warning Message ...................................................................................................... 127 Figure 72 Restart Screen ..................................................................................................................... 127 Figure 73 WIndows 95/98/Me: Network: Configuration ........................................................................ 142 Figure 74 Windows 95/98/Me: TCP/IP Properties: IP Address ............................................................ 143 Figure 75 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ................................................ 144 Figure 76 Windows XP: Start Menu ...................................................................................................... 145 Figure 77 Windows XP: Control Panel ................................................................................................. 145 Figure 78 Windows XP: Control Panel: Network Connections: Properties ........................................... 146 Figure 79 Windows XP: Local Area Connection Properties ................................................................. 146 Figure 80 Windows XP: Advanced TCP/IP Settings ............................................................................ 147 Figure 81 Windows XP: Internet Protocol (TCP/IP) Properties ............................................................ 148 18 ZyXEL NWA-1100 Users Guide List of Figures Figure 82 Macintosh OS 8/9: Apple Menu ............................................................................................ 149 Figure 83 Macintosh OS 8/9: TCP/IP ................................................................................................... 149 Figure 84 Macintosh OS X: Apple Menu .............................................................................................. 150 Figure 85 Macintosh OS X: Network .................................................................................................... 151 Figure 86 Peer-to-Peer Communication in an Ad-hoc Network ........................................................... 153 Figure 87 Basic Service Set ................................................................................................................. 154 Figure 88 Infrastructure WLAN ............................................................................................................. 155 Figure 89 RTS/CTS .............................................................................................................................. 156 Figure 90 WPA(2) with RADIUS Application Example ......................................................................... 164 Figure 91 WPA(2)-PSK Authentication ................................................................................................. 164 Figure 92 Pop-up Blocker ..................................................................................................................... 167 Figure 93 Internet Options: Privacy ...................................................................................................... 168 Figure 94 Internet Options: Privacy ...................................................................................................... 169 Figure 95 Pop-up Blocker Settings ....................................................................................................... 169 Figure 96 Internet Options: Security ..................................................................................................... 170 Figure 97 Security Settings - Java Scripting ......................................................................................... 171 Figure 98 Security Settings - Java ........................................................................................................ 171 Figure 99 Java (Sun) ............................................................................................................................ 172 Figure 100 Network Number and Host ID ............................................................................................ 174 Figure 101 Subnetting Example: Before Subnetting ............................................................................ 176 Figure 102 Subnetting Example: After Subnetting ............................................................................... 177 Figure 103 Text File Based Auto Configuration .................................................................................... 181 Figure 104 Configuration File Format ................................................................................................... 183 Figure 105 WEP Configuration File Example ....................................................................................... 184 Figure 106 802.1X Configuration File Example .................................................................................... 184 Figure 107 WPA-PSK Configuration File Example ............................................................................... 185 Figure 108 WPA Configuration File Example ....................................................................................... 185 Figure 109 Wlan Configuration File Example ....................................................................................... 185 ZyXEL NWA-1100 Users Guide 19 List of Figures 20 ZyXEL NWA-1100 Users Guide List of Tables List of Tables Table 1 LEDs ......................................................................................................................................... 32 Table 2 The Status Screen .................................................................................................................... 39 Table 3 System Status: Show Statistics ................................................................................................. 41 Table 4 Private IP Address Ranges ....................................................................................................... 54 Table 5 System: General ....................................................................................................................... 55 Table 6 System: Password .................................................................................................................... 56 Table 7 System: Time ............................................................................................................................ 57 Table 8 Default Time Servers ................................................................................................................ 58 Table 9 Wireless: Access Point ............................................................................................................. 64 Table 10 Wireless: Wireless Client ........................................................................................................ 66 Table 11 Wireless: Bridge ...................................................................................................................... 68 Table 12 STP Path Costs ...................................................................................................................... 72 Table 13 STP Port States ...................................................................................................................... 72 Table 14 Additional Wireless Terms ....................................................................................................... 73 Table 15 Wireless Security Levels ......................................................................................................... 76 Table 16 Security: WEP ......................................................................................................................... 79 Table 17 Security: 802.1x Only for Access Point ................................................................................... 80 Table 18 Security: 802.1x Only for Wireless Client ................................................................................ 81 Table 19 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ................................................................ 82 Table 20 Security: WPA for Access Point .............................................................................................. 83 Table 21 Security: WPA for Wireless Client ........................................................................................... 84 Table 22 Security: WPA2 or WPA2-MIX for Access Point ..................................................................... 85 Table 23 Security: WPA2 or WPA2-MIX for Wireless Client .................................................................. 86 Table 24 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................. 87 Table 25 Wireless > RADIUS ................................................................................................................. 90 Table 26 Wireless > MAC Filter ............................................................................................................. 94 Table 27 IP Setup .................................................................................................................................. 98 Table 28 Private IP Address Ranges ..................................................................................................... 99 Table 29 Remote Management: Telnet ................................................................................................ 104 Table 30 Remote Management: FTP ................................................................................................... 105 Table 31 Remote Management: WWW ............................................................................................... 106 Table 32 Remote Management: SNMP ............................................................................................... 107 Table 33 SNMP Traps .......................................................................................................................... 108 Table 34 SNMP Interface Index to Physical and Virtual Port Mapping ................................................ 109 Table 35 Certificate ...............................................................................................................................112 Table 36 View Log ................................................................................................................................116 Table 37 Log Settings ...........................................................................................................................117 Table 38 System Maintenance Logs .....................................................................................................119 ZyXEL NWA-1100 Users Guide 21 List of Tables Table 39 Log Categories and Available Settings ................................................................................. 120 Table 40 Log Command List ................................................................................................................ 120 Table 41 Association List ..................................................................................................................... 122 Table 42 Channel Usage ..................................................................................................................... 123 Table 43 Firmware Upload ................................................................................................................... 123 Table 44 Restore Configuration ........................................................................................................... 125 Table 45 Hardware Specifications ....................................................................................................... 135 Table 46 Firmware Specifications ........................................................................................................ 135 Table 47 Power over Ethernet Injector Specifications ........................................................................ 137 Table 48 Power over Ethernet Injector RJ-45 Port Pin Assignments .................................................. 137 Table 49 North American Plug Standards ............................................................................................ 139 Table 50 European Plug Standards ..................................................................................................... 139 Table 51 United Kingdom Plug Standards ........................................................................................... 139 Table 52 Australia and New Zealand Plug Standards ......................................................................... 139 Table 53 IEEE 802.11g ........................................................................................................................ 157 Table 54 Wireless Security Levels ....................................................................................................... 158 Table 55 Comparison of EAP Authentication Types ............................................................................ 161 Table 56 Wireless Security Relational Matrix ...................................................................................... 165 Table 57 Subnet Masks ....................................................................................................................... 174 Table 58 Subnet Masks ....................................................................................................................... 175 Table 59 Maximum Host Numbers ...................................................................................................... 175 Table 60 Alternative Subnet Mask Notation ......................................................................................... 175 Table 61 Subnet 1 ................................................................................................................................ 177 Table 62 Subnet 2 ................................................................................................................................ 178 Table 63 Subnet 3 ................................................................................................................................ 178 Table 64 Subnet 4 ................................................................................................................................ 178 Table 65 Eight Subnets ........................................................................................................................ 178 Table 66 24-bit Network Number Subnet Planning .............................................................................. 179 Table 67 16-bit Network Number Subnet Planning .............................................................................. 179 Table 68 Auto Configuration by DHCP ................................................................................................ 182 Table 69 Configuration via SNMP ........................................................................................................ 182 Table 70 Displaying the File Version .................................................................................................... 182 Table 71 Displaying the File Version .................................................................................................... 183 Table 72 Displaying the Auto Configuration Status .............................................................................. 183 Table 73 Default Management IP Address .......................................................................................... 187 Table 74 Default User Name and Password ........................................................................................ 187 Table 75 Common Command Input Values ......................................................................................... 188 Table 76 CLI Shortcuts and Help ......................................................................................................... 189 22 ZyXEL NWA-1100 Users Guide PART I Introduction Introducing the ZyXEL Device (25) Status Screens (39) Introducing the Web Configurator (35) Tutorial (43) 23 24 CHAPTER 1 Introducing the ZyXEL Device This chapter introduces the main applications and features of the ZyXEL Device. It also discusses the ways you can manage your ZyXEL Device. 1.1 Introducing the ZyXEL Device Your ZyXEL Device extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. It controls network access with MAC address filtering and RADIUS server authentication.It also provides a high level of network traffic security, supporting IEEE 802.1x, Wi-Fi Protected Access (WPA), WPA2 and WEP data encryption. Its Quality of Service (QoS) features allow you to prioritize time-sensitive or highly important applications such as VoIP. Your ZyXEL Device is easy to install, configure and use. The embedded Web-based configurator enables simple, straightforward management and maintenance. See the Quick Start Guide for instructions on how to make hardware connections. 1.2 Applications for the ZyXEL Device The ZyXEL Device can be configured to use the following WLAN operating modes 1 AP (Access Point) 2 Wireless Client 3 Bridge 4 AP + Bridge Applications for each operating mode are shown below. 1.2.1 Access Point The ZyXEL Device is an ideal access solution for wireless Internet connection. A typical Internet access application for your ZyXEL Device is shown as follows. Stations A, B and C can access the wired network through the ZyXEL Devices. ZyXEL NWA-1100 Users Guide 25 Chapter 1 Introducing the ZyXEL Device Figure 1 Access Point Application BSS1 AP1 AP2 BSS2 A B C 1.2.2 Wireless Client The ZyXEL Device can be used as a wireless client to communicate with an existing network. In the figure below, the printer can receive requests from the wired computer clients A and B via the ZyXEL Device in Wireless Client mode. Figure 2 Wireless Client Application A B 26 ZyXEL NWA-1100 Users Guide Chapter 1 Introducing the ZyXEL Device 1.2.3 Bridge The ZyXEL Device can act as a wireless network bridge and establish wireless links with other APs. In the figure below, the ZyXEL Devices (A, B and Z) are connected to independent wired networks and have a bridge connection (A can communicate with B and Z) at the same time. Security between bridged APs (the Wireless Distribution System or WDS) is independent of the security between the wired networks and their respective APs. If you do not enable WDS security, traffic between APs is not encrypted. When WDS security is enabled, both APs must use the same pre-shared key. See Section 6.4.3 on page 68 for more details. Once the security settings of peer sides match one another, the connection between devices is made. At the time of writing, WDS security is compatible with other ZyXEL NWA-series access points only. Refer to your other access points documentation for details. Figure 3 Bridge Application In the example below, when both ZyXEL Devices are in Bridge mode, they form a WDS
(Wireless Distribution System) allowing the computers in LAN 1 to connect to the computers in LAN 2. ZyXEL NWA-1100 Users Guide 27 Chapter 1 Introducing the ZyXEL Device Figure 4 Bridging Example Be careful to avoid bridge loops when you enable bridging in the ZyXEL Device. Bridge loops cause broadcast traffic to circle the network endlessly, resulting in possible throughput degradation and disruption of communications. The following examples show two network topologies that can lead to this problem:
If two or more ZyXEL Devices (in bridge mode) are connected to the same hub. Figure 5 Bridge Loop: Two Bridges Connected to Hub If your ZyXEL Device (in bridge mode) is connected to a wired LAN while communicating with another wireless bridge that is also connected to the same wired LAN. 28 ZyXEL NWA-1100 Users Guide Figure 6 Bridge Loop: Bridge Connected to Wired LAN Chapter 1 Introducing the ZyXEL Device To prevent bridge loops, ensure that you enable STP in the Wireless screen or your ZyXEL Device is not set to bridge mode while connected to both wired and wireless segments of the same LAN. 1.2.4 AP + Bridge In AP+Bridge mode, the ZyXEL Device supports both AP and bridge connection at the same time. Using AP + Bridge mode, your ZyXEL Device can extend the range of the WLAN. In the figure below, A and B act as AP + Bridge devices that forward traffic between associated wireless workstations and the wired LAN. When the ZyXEL Device is in AP+Bridge mode, security between APs (the Wireless Distribution System or WDS) is independent of the security between the wireless stations and the AP. If you do not enable WDS security, traffic between APs is not encrypted. When WDS security is enabled, both APs must use the same pre-shared key. See Section 6.4.4 on page 70 for more details. Unless specified, the term security settings refers to the traffic between the wireless stations and the ZyXEL Device. ZyXEL NWA-1100 Users Guide 29 Chapter 1 Introducing the ZyXEL Device Figure 7 AP + Bridge Application 1.3 Ways to Manage the ZyXEL Device Use any of the following methods to manage the ZyXEL Device. Web Configurator. This is recommended for everyday management of the ZyXEL Device using a (supported) web browser. CLI (Command Line Interface). Line commands are mostly used for troubleshooting by service engineers. FTP (File Transfer Protocol) for firmware upgrades. SNMP (Simple Network Management Protocol). The device can be monitored by an SNMP manager. See the SNMP chapter in this Users Guide. 1.4 Configuring Your ZyXEL Devices Security Features Your ZyXEL Device comes with a variety of security features. This section summarizes these features and provides links to sections in the Users Guide to configure security settings on your ZyXEL Device. Follow the suggestions below to improve security on your ZyXEL Device and network. 1.4.1 Control Access to Your Device Ensure only people with permission can access your ZyXEL Device. Control physical access by locating devices in secure areas, such as locked rooms. Most ZyXEL Devices have a reset button. If an unauthorized person has access to the reset button, they can then reset the devices password to its default password, log in and reconfigure its settings. 30 ZyXEL NWA-1100 Users Guide Chapter 1 Introducing the ZyXEL Device Change any default passwords on the ZyXEL Device, such as the password used for accessing the ZyXEL Devices web configurator (if it has a web configurator). Use a password with a combination of letters and numbers and change your password regularly. Write down the password and put it in a safe place. Avoid setting a long timeout period before the ZyXEL Devices web configurator automatically times out. A short timeout reduces the risk of unauthorized person accessing the web configurator while it is left idle. See Chapter 5 on page 53 for instructions on changing your password and setting the timeout period. Configure remote management to control who can manage your ZyXEL Device. See Chapter 11 on page 101 for more information. If you enable remote management, ensure you have enabled remote management only on the IP addresses, services or interfaces you intended and that other remote management settings are disabled. 1.4.2 Wireless Security Wireless devices are especially vulnerable to attack. If your ZyXEL Device has a wireless function, take the following measures to improve wireless security. Enable wireless security on your ZyXEL Device. Choose the most secure encryption method that all devices on your network support. See Section 7.4 on page 77 for directions on configuring encryption. If you have a RADIUS server, enable IEEE 802.1x or WPA(2) user identification on your network so users must log in. This method is more common in business environments. Hide your wireless network name (SSID). The SSID can be regularly broadcast and unauthorized users may use this information to access your network. See Section 6.4 on page 63 for directions on using the web configurator to hide the SSID. Enable the MAC filter to allow only trusted users to access your wireless network or deny unwanted users access based on their MAC address. See Section 9.4 on page 94 for directions on configuring the MAC filter. 1.5 Good Habits for Managing the ZyXEL Device Do the following things regularly to make the ZyXEL Device more secure and to manage it more effectively. Change the password often. Use a password thats not easy to guess and that consists of different types of characters, such as numbers and letters. Write down the password and put it in a safe place. Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the ZyXEL Device to its factory default settings. If you backed up an earlier configuration file, you wont have to totally re-configure the ZyXEL Device; you can simply restore your last configuration. ZyXEL NWA-1100 Users Guide 31 Chapter 1 Introducing the ZyXEL Device 1.6 Hardware Connections See your Quick Start Guide for information on making hardware connections. 1.7 LEDs Figure 8 LEDs Table 1 LEDs LED LABEL 1 SYS COLOR Green STATUS On Amber Flashing Off 2 WLAN Green On DESCRIPTION The ZyXEL Device is in AP + Bridge or Bridge mode, and has successfully established a Wireless Distribution System (WDS) connection. The ZyXEL Device is starting up. Either The ZyXEL Device is in Access Point or mode and is functioning normally. The ZyXEL Device is in AP+Bridge or Bridge mode and has not established a Wireless Distribution System (WDS) connection. or The wireless adaptor WLAN is active. The ZyXEL Device is not receiving power. 32 ZyXEL NWA-1100 Users Guide Chapter 1 Introducing the ZyXEL Device Table 1 LEDs (continued) LABEL LED COLOR 3 ETHERNET Green STATUS Blinking Off On Blinking Yellow On Blinking Off DESCRIPTION The wireless adaptor WLAN is active, and transmitting or receiving data. The wireless adaptor WLAN is not active. The ZyXEL Device has a 10 Mbps Ethernet connection. The ZyXEL Device has a 10 Mbps Ethernet connection and is sending or receiving data. The ZyXEL Device has a 100 Mbps Ethernet connection. The ZyXEL Device has a 100 Mbps Ethernet connection and is sending/receiving data. The ZyXEL Device does not have an Ethernet connection. ZyXEL NWA-1100 Users Guide 33 Chapter 1 Introducing the ZyXEL Device 34 ZyXEL NWA-1100 Users Guide CHAPTER 2 Introducing the Web Configurator This chapter describes how to access the ZyXEL Devices web configurator and provides an overview of its screens. 2.1 Accessing the Web Configurator 1 Make sure your hardware is properly connected and prepare your computer or computer network to connect to the ZyXEL Device (refer to the Quick Start Guide). 2 Launch your web browser. 3 Type "192.168.1.2" as the URL (default). 4 Type "1234" (default) as the password and click Login. In some versions, the default password appears automatically - if this is the case, click Login. 5 You should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) then click Apply. Alternatively, click Ignore.
If you do not change the password, the following screen appears every time you login. Figure 9 Change Password Screen You should now see the Status screen. See Chapter 2 on page 35 for details about the Status screen. ZyXEL NWA-1100 Users Guide 35 Chapter 2 Introducing the Web Configurator
The management session automatically times out when the time period set in the Administrator Inactivity Timer field expires (default five minutes). Simply log back into the ZyXEL Device if this happens. 2.2 Resetting the ZyXEL Device If you forget your password or cannot access the web configurator, you will need to use the RESET button. This replaces the current configuration file with the factory-default configuration file. This means that you will lose all the settings you previously configured. The password will be reset to 1234. 2.2.1 Methods of Restoring Factory-Defaults You can erase the current configuration and restore factory defaults in two ways:
Use the RESET button to upload the default configuration file. Hold this button in for about 10 seconds (the lights will begin to blink). Use this method for cases when the password or IP address of the ZyXEL Device is not known. Use the web configurator to restore defaults (refer to Section 14.7 on page 124). 2.3 Navigating the Web Configurator The following summarizes how to navigate the web configurator from the Status screen. Check the status bar at the bottom of the screen when you click Apply or OK to verify that the configuration has been updated. 36 ZyXEL NWA-1100 Users Guide Figure 10 Status Screen of the Web Configurator Chapter 2 Introducing the Web Configurator Click the links on the left of the screen to configure advanced features such as SYSTEM
(General, Password and Time), WIRELESS (Wireless Settings, Security, RADIUS, MAC Filter), IP, REMOTE MGNT (Telnet, FTP, WWW and SNMP), CERTIFICATES, and LOGS (View Log and Log Settings). Click MAINTENANCE to view information about your ZyXEL Device or upgrade configuration and firmware files. Maintenance features include Association List, Channel Usage, F/W (firmware) Upload, Configuration File (Backup, Restore and Default) and Restart. Click LOGOUT at any time to exit the web configurator. ZyXEL NWA-1100 Users Guide 37 Chapter 2 Introducing the Web Configurator 38 ZyXEL NWA-1100 Users Guide CHAPTER 3 Status Screens The Status screens display when you log into the ZyXEL Device, or click Status in the navigation menu. Use the Status screens to look at the current status of the device, system resources, and interfaces. The Status screens also provide detailed information about system statistics, associated wireless clients, and logs. 3.1 The Status Screen Use this screen to get a quick view of system, Ethernet, WLAN and other information regarding your ZyXEL Device. Click Status. The following screen displays. Figure 11 The Status Screen The following table describes the labels in this screen. Table 2 The Status Screen LABEL Refresh Interval Refresh Now System Information DESCRIPTION Enter how often you want the ZyXEL Device to update this screen. Click this to update this screen immediately. ZyXEL NWA-1100 Users Guide 39 Chapter 3 Status Screens Table 2 The Status Screen LABEL Device Name Operation Mode MAC Address Firmware Version Ethernet Information IP Address Subnet Mask Gateway IP Address WLAN Information SSID Channel MAC Filter Security Mode System Resources System Up Time CPU Usage Memory Usage Interface Status Interface Status Channel Rate DESCRIPTION This field displays the ZyXEL Device system name. It is used for identification. You can change this in the System > General screens Device Name field. This field displays the current operating mode of the first wireless module
(AP, Wireless Client, Bridge or AP+Bridge). You can change the operating mode in the Wireless > Wireless Settings screen. This displays the MAC (Media Access Control) address of the ZyXEL Device on the LAN. Every network device has a unique MAC address which identifies it across the network. This field displays the current version of the firmware inside the device. It also shows the date the firmware version was created. You can change the firmware version by uploading new firmware in Maintenance > F/W Upload. This field displays the current IP address of the ZyXEL Device on the network. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks. This is the IP address of the gateway. The gateway is a router or switch on the same network segment as the device's LAN port. The gateway helps forward packets to their destinations. This field displays the SSID (Service Set Identifier). The channel or frequency used by the ZyXEL Device to send and receive information. Media Access Control filtering checks incoming frames based on MAC
(Media Access Control) address(es) that you specify. This displays the security mode the ZyXEL Device is using. This field displays the elapsed time since the ZyXEL Device was turned on. This field displays what percentage of the ZyXEL Devices processing ability is currently being used. The higher the CPU usage, the more likely the ZyXEL Device is to slow down. This field displays what percentage of the ZyXEL Devices volatile memory is currently in use. The higher the memory usage, the more likely the ZyXEL Device is to slow down. Some memory is required just to start the ZyXEL Device and to run the web configurator. This column displays each interface of the ZyXEL Device. This field indicates whether or not the ZyXEL Device is using the interface. For each interface, this field displays Up when the ZyXEL Device is using the interface and Down when the ZyXEL Device is not using the interface. Click this to see which wireless channels are currently in use in the local area. See Section 14.5 on page 122. For the LAN port this displays the port speed and duplex setting. For the WLAN interface, it displays the downstream and upstream transmission rate or N/A if the interface is not in use. 40 ZyXEL NWA-1100 Users Guide Chapter 3 Status Screens Table 2 The Status Screen LABEL LAN WLAN System Status Statistics Association List View Log DESCRIPTION This field displays the number of wireless clients currently associated to the first wireless module. Each wireless module supports up to 32 concurrent associations. This field displays the number of wireless clients currently associated to the second wireless module. Each wireless module supports up to 32 concurrent associations. Click this link to view port status and packet specific statistics. See Section 3.1.1 on page 41. Click this to see a list of wireless clients currently associated to each of the ZyXEL Devices wireless modules. See Section 14.4 on page 121. Click this to see a list of logs produced by the ZyXEL Device. See Chapter 13 on page 115. 3.1.1 System Statistics Screen Use this screen to view read-only information, including 802.11 Mode, Channel ID, Retry Count and FCS Error Count. Also provided is the "poll interval". The Poll Interval field is configurable. The fields in this screen vary according to the current wireless mode of each WLAN adaptor. Click Status > Show Statistics. The following screen pops up. Figure 12 System Status: Show Statistics The following table describes the labels in this screen. Table 3 System Status: Show Statistics LABEL Description 802.11 Mode DESCRIPTION Channel ID RX PKT TX PKT Retry Count FCS Error This field shows which mode (802.11b Only, 802.11g Only, 802.11b+g) the ZyXEL Device is using. Click this to see which wireless channels are currently in use in the local area. See Section 14.5 on page 122. This is the number of received packets on this port. This is the number of transmitted packets on this port. This is the total number of retries for transmitted packets (TX). This is the ratio percentage showing the total number of checksum error of received packets (RX) over total RX. ZyXEL NWA-1100 Users Guide 41 Chapter 3 Status Screens 42 ZyXEL NWA-1100 Users Guide CHAPTER 4 Tutorial This chapter first provides an overview of how to configure the wireless LAN on your ZyXEL Device, and then gives step-by-step guidelines showing how to configure your ZyXEL Device for some example scenarios. 4.1 How to Configure the Wireless LAN This section illustrates how to choose which wireless operating mode to use on the ZyXEL Device and how to set up the wireless LAN in each wireless mode. See Section 4.1.3 on page 44 for links to more information on each step. 4.1.1 Choosing the Wireless Mode Use Access Point operating mode if you want to allow wireless clients to access your wired network, all using the same security and Quality of Service (QoS) settings. See Section 1.2.1 on page 25 for details. Use Wireless Client operating mode if you want to use the ZyXEL Device to access a wireless network. See Section 1.2.2 on page 26 for details. Use Bridge operating mode if you want to use the ZyXEL Device to communicate with other access points. See Section 1.2.2 on page 26 for details. The ZyXEL Device is a bridge when other APs access your wired Ethernet network through the ZyXEL Device. Use AP + Bridge operating mode if you want to use the ZyXEL Device as an access point
(see above) while also communicating with other access points. See Section 1.2.4 on page 29 for details. 4.1.2 Wireless LAN Configuration Overview The following figure shows the steps you should take to configure the wireless settings according to the operating mode you select. Use the Web Configurator to set up your ZyXEL Devices wireless network (see your Quick Start Guide for information on setting up your ZyXEL Device and accessing the Web Configurator). ZyXEL NWA-1100 Users Guide 43 Chapter 4 Tutorial Figure 13 Configuring Wireless LAN Select the WLAN Adaptor you want to configure. Select Operating Mode. Access Point Mode. Select 802.11 Mode and Channel ID. Wireless Client Mode. Select AP you want to connect to. AP + Bridge Mode. Bridge Mode. Select 802.11 Mode and Channel ID. Select 802.11 Mode and Channel ID. Configure RADIUS authentication (optional). Configure Security Settings. Configure RADIUS authentication
(optional). Configure RADIUS authentication
(optional). Configure MAC Filter
(optional). Configure MAC Filter
(optional). Check your settings and test. 4.1.3 Further Reading Use these links to find more information on the steps:
Selecting a WLAN Adaptor: see Section 6.4.1 on page 63. Choosing 802.11 Mode: see Section 6.4.1 on page 63. Choosing a wireless Channel ID: see Section 6.4.1 on page 63. Choosing a Security mode: see Section 7.4.1 on page 78. Configuring an external RADIUS server: see Section 8.4 on page 90. Configuring MAC Filtering: see Section 9.1 on page 93. 4.2 ZyXEL Device Setup in Wireless Client Mode This example shows you how to restrict wireless access to your ZyXEL Device. 44 ZyXEL NWA-1100 Users Guide Chapter 4 Tutorial 4.2.1 Scenario In the figure below, there are two ZyXEL Devices (A and B) in the network. A is in Access Point (AP) mode while B is in Wireless Client mode. Station B is connected to a File Transfer Protocol (FTP) server. You want only specified wireless clients to be able to access station B. You also want to allow wireless traffic between B and wireless clients connected to A (W, Y and Z). Other wireless devices (X) must not be able to connect to the FTP server. Figure 14 FTP Server Connected to a Wireless Client Access Denied 4.2.2 Configuring the ZyXEL Device in Access Point Mode Before setting up the ZyXEL Device as a wireless client (B), you need to make sure there is an access point to connect to. Use the Ethernet port on your ZyXEL Device to configure it via a wired connection. Open the Web Configurator and go to the Wireless > Wireless Settings screen. ZyXEL NWA-1100 Users Guide 45 Chapter 4 Tutorial Figure 15 Access Point Mode Wireless Setttings 1 Set the Operation Mode to AP. 2 Enter an SSID name, such as NWA-1100 A. 3 Choose the channel you want the ZyXEL Device to use. 4 Select the Wireless Mode. 5 Set the Intra-BSS Traffic to Enable. 6 Go to Wireless > Security to configure the ZyXEL Device to use WPA-PSK security mode. Figure 16 Access Point Mode Security Setttings 4.2.3 Configuring the ZyXEL Device in Wireless Client Mode Your ZyXEL Device should have a wired connection before it can be set to wireless client operating mode. Connect your ZyXEL Device to the FTP server. Open the Web Configurator ZyXEL Device and go to the Wireless > Wireless Settings screen. Follow these steps to configure Station B. 1 Select Wireless Client as Operating Mode. Wait for the screen to refresh. 46 ZyXEL NWA-1100 Users Guide Chapter 4 Tutorial 2 You should now see a tab that says Site Survey (refer to Figure 18). Click on this. A window should pop up which contains a list of all available wireless devices within your ZyXEL Devices range. Copy the SSID of the AP you want your wireless client to connect to (refer to Figure 19). 3 For this example, you want to connect to the access point, A.The SSID that you should copy is ZyXEL NWA-1100 A (refer to Figure 15 to check the SSID of Station A). 4 Go back to the screen in Figure 17. In the SSID field, enter ZyXEL NWA-1100 A (refer to Figure 18). 5 Set the Wireless Mode to the same one set for the access point. Click Apply. Figure 17 Wireless Client Mode Wireless Settings ZyXEL NWA-1100 Users Guide 47 Chapter 4 Tutorial Figure 18 Site Survey Figure 19 Wireless Client Mode 6 Go to Wireless > Security to configure the ZyXEL Device to use WPA-PSK security mode. 48 ZyXEL NWA-1100 Users Guide Figure 20 Wireless Client Mode Security Setttings Chapter 4 Tutorial 7 One way to ensure that only specified wireless clients can access the FTP server is by enabling MAC filtering on the ZyXEL Device. See Chapter 9 on page 93 for more information on the MAC Filter screen. 8 Still in the Web Configurator, go to Wireless > MAC Filter. Click on Active then highlight Allow the following MAC Address to associate. Enter the MAC Addresses of the wireless clients (W, Y and Z) you want to associate with the ZyXEL Device. Click Apply. Figure 21 Wireless Client MAC Filtering After following this tutorial, you should now have the same setup as shown in Figure 14. 4.2.4 Testing the Connection and Troubleshooting This section discusses how you can check if you have correctly configured your network setup as described in this tutorial. Try accessing the FTP server from wireless clients W, Y or Z. Test if you can send or retrieve a file. If you cannot establish a connection with the FTP server, do the following steps. 1 Make sure W, Y and Z use the same wireless security settings as A and can access A. 2 Make sure B uses the same wireless and wireless security settings as A and can access A. 3 Make sure intra-BSS traffic is enabled on A. Try accessing the FTP server from X. If you are able to access the FTP server, do the following. 1 Make sure MAC filtering is enabled. 2 Make sure Xs MAC address is not entered in the list of allowed devices. ZyXEL NWA-1100 Users Guide 49 Chapter 4 Tutorial 50 ZyXEL NWA-1100 Users Guide PART II The Web Configurator System Screens (53) Wireless Settings Screen (61) Wireless Security Screen (75) RADIUS Screen (89) MAC Filter Screen (93) IP Screen (97) Remote Management (101) Certificate Screen (111) Log Screens (115) Maintenance (121) Troubleshooting (129) 51 52 CHAPTER 5 System Screens 5.1 Overview This chapter provides information and instructions on how to identify and manage your ZyXEL Device over the network. Figure 22 ZyXEL Device Setup In the figure above, the ZyXEL Device connects to a Domain Name Server (DNS) server to avail of a domain name. It also connects to an Network Time Protocol (NTP) server to set the time on the device. 5.2 What You Can Do in the System Screens Use the System > General screen (see Section on page 55) to specify the Device name and Administrator Inactivity Timer value. You can also configure your System DNS Servers in this screen. Use the System > Password screen (see Section 5.4.1 on page 56) to manage the password for your ZyXEL Device. Use the System > Time Setting screen (see Section 5.5 on page 56) to change your ZyXEL Devices time and date. This screen allows you to configure the ZyXEL Devices time based on your local time zone. ZyXEL NWA-1100 Users Guide 53 Chapter 5 System Screens 5.3 What You Need To Know About the System Screens IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private networks. Table 4 Private IP Address Ranges 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 You can obtain your IP address from the IANA, from an ISP or have it assigned by a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses.
Regardless of your particular situation, do not create an arbitrary IP address;
always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466, Guidelines for Management of IP Address Space. IP Address and Subnet Mask Similar to the way houses on a street share a common street name, computers on a LAN share one common network number. Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask. If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. The Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private use; please do not use any other number unless you are told otherwise. Let's say you select 192.168.1.0 as the network number; which covers 254 individual addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other words, the first three numbers specify the network number while the last number identifies an individual computer on that network. Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.2, for your device, but make sure that no other device on your network is using that IP address. 54 ZyXEL NWA-1100 Users Guide Chapter 5 System Screens The subnet mask specifies the network number portion of an IP address. Your device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the device unless you are instructed to do otherwise. 5.4 General Screen Use the General screen to identify your ZyXEL Device over the network. Click System >
General. The following screen displays. Figure 23 System: General The following table describes the labels in this screen. Table 5 System: General LABEL Device Settings Device Name DESCRIPTION Administrator Inactivity Timer System DNS Servers First DNS Server Second DNS Server Third DNS Server Type a descriptive name to identify the ZyXEL Device in the Ethernet network. This name can be up to 15 alphanumeric characters long. Spaces are not allowed, but dashes "-" are accepted. Type how many minutes a management session (via web configurator) can be left idle before the session times out. The default is 5 minutes. After it times out you have to log in with your password again. Very long idle timeouts may have security risks. A value of "0" means a management session never times out, no matter how long it has been left idle (not recommended). The field to the right displays the (read-only) DNS server IP address that the DHCP assigns. Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. Select None if you do not want to configure DNS servers. If you do not configure a DNS server, you must know the IP address of a machine in order to access it. The default setting is None. ZyXEL NWA-1100 Users Guide 55 Chapter 5 System Screens Table 5 System: General LABEL Apply Reset DESCRIPTION Click Apply to save your changes. Click Reset to reload the previous configuration for this screen. 5.4.1 Password Screen Use this screen to control access to your ZyXEL Device by assigning a password to it. Click System > Password. The following screen displays. Figure 24 System: Password. The following table describes the labels in this screen. Table 6 System: Password LABEL Password Setup Current Password New Password DESCRIPTIONS Type in your existing system password (1234 is the default password). Type your new system password (max 19 characters). Note that as you type a password, the screen displays an asterisk (*) for each character you type. Retype your new system password for confirmation. Click Apply to save your changes. Click Reset to reload the previous configuration for this screen. Retype to Confirm Apply Reset 5.5 Time Screen Use this screen to change your ZyXEL Devices time and date, click System > Time. The following screen displays. 56 ZyXEL NWA-1100 Users Guide Figure 25 System: Time Chapter 5 System Screens The following table describes the labels in this screen. Table 7 System: Time LABEL Current Time and Date Current Date Current Time DESCRIPTION This field displays the last updated date from the time server. This field displays the time of your ZyXEL Device. Each time you reload this page, the ZyXEL Device synchronizes the time with the time server (if configured). Time and Date Setup Enable NTP client update Random User Defined Time Server Time Zone Setup Time Zone Daylight Saving Setup Daylight Savings Select this to have the ZyXEL Device use the predefined list of Network Time Protocol (NTP) servers. Select this to have the ZyXEL Device select which NTP server to use. Enter the IP address or URL of your time server. Check with your ISP/network administrator if you are unsure of this information. Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT). Select this option if you use daylight savings time. Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening. ZyXEL NWA-1100 Users Guide 57 Chapter 5 System Screens Table 7 System: Time LABEL Start Date End Date Apply Reset DESCRIPTION Configure the day and time when Daylight Saving Time starts if you selected Enable Daylight Saving. The at field uses the 24 hour format. Here are a couple of examples:
Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time. So in the United States you would select Second, Sunday, March and 2:00. Daylight Saving Time starts in the European Union on the last Sunday of March. All of the time zones in the European Union start using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Last, Sunday, March. The time you type in the at field depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1). Configure the day and time when Daylight Saving Time ends if you selected Enable Daylight Saving. The o'clock field uses the 24 hour format. Here are a couple of examples:
Daylight Saving Time ends in the United States on the first Sunday of November. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time. So in the United States you would select First, Sunday, November and 2:00. Daylight Saving Time ends in the European Union on the last Sunday of October. All of the time zones in the European Union stop using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Last, Sunday, October. The time you type in the at field depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1). Click Apply to save your changes. Click Reset to reload the previous configuration for this screen. 5.6 Technical Reference This section provides some technical information about the topics covered in this chapter. 5.6.1 Pre-defined NTP Time Servers List When you turn on the ZyXEL Device for the first time, the date and time start at 2000-01-01 00:00:00. When you select Auto in the System > Time Setting screen, the ZyXEL Device then attempts to synchronize with one of the following pre-defined list of NTP time servers. The ZyXEL Device continues to use the following pre-defined list of NTP time servers if you do not specify a time server or it cannot synchronize with the time server you specified. Table 8 Default Time Servers ntp1.cs.wisc.edu ntp1.gbg.netnod.se ntp2.cs.wisc.edu tock.usno.navy.mil 58 ZyXEL NWA-1100 Users Guide Chapter 5 System Screens Table 8 Default Time Servers (continued) ntp3.cs.wisc.edu ntp.cs.strath.ac.uk ntp1.sp.se time1.stupi.se tick.stdtime.gov.tw tock.stdtime.gov.tw time.stdtime.gov.tw When the ZyXEL Device uses the pre-defined list of NTP time servers, it randomly selects one server and tries to synchronize with it. If the synchronization fails, then the ZyXEL Device goes through the rest of the list in order from the first one tried until either it is successful or all the pre-defined NTP time servers have been tried. ZyXEL NWA-1100 Users Guide 59 Chapter 5 System Screens 60 ZyXEL NWA-1100 Users Guide CHAPTER 6 Wireless Settings Screen 6.1 Overview This chapter discusses the steps to configure the Wireless Settings screen on the ZyXEL Device. It also introduces the wireless LAN (WLAN) and some basic scenarios. Figure 26 Wireless Mode In the figure above, the ZyXEL Device allows access to another bridge device (A) and a notebook computer (B) upon verifying their settings and credentials. It denies access to other devices (C and D) with configurations that do not match those specified in your ZyXEL Device. 6.2 What You Can Do in the Wireless Settings Screen Use the Wireless > Wireless Settings screen (see Section 6.4 on page 63) to configure the ZyXEL Device to operate in AP (Access Point), Wireless Client, Bridge or AP + Bridge. ZyXEL NWA-1100 Users Guide 61 Chapter 6 Wireless Settings Screen 6.3 What You Need To Know About Wireless Settings Screen BSS A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point (AP). Intra-
BSS traffic is traffic between wireless clients in the BSS. ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). Operating Mode The ZyXEL Device can run in four operating modes as follows:
AP (Access Point). The ZyXEL Device is wireless access point that allows wireless communication to other devices in the network. Wireless Client. The ZyXEL Device acts as a wireless client to access a wireless network. Bridge. The ZyXEL Device acts as a wireless network bridge and establishes wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode. The ZyXEL Device can establish up to five wireless links with other APs. AP+Bridge Mode. The ZyXEL Device functions as a bridge and access point simultaneously. Refer to Chapter 1 on page 25 for illustrations of these wireless applications. SSID The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID. Normally, the ZyXEL Device acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the ZyXEL Device does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess. This type of security is fairly weak, however, because there are ways for unauthorized wireless devices to get the SSID. In addition, unauthorized wireless devices can still see the information that is sent in the wireless network. Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference. 62 ZyXEL NWA-1100 Users Guide Chapter 6 Wireless Settings Screen Wireless Mode The IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. Your ZyXEL Device can support 802.11b Only, 802.11g Only and 802.11b+g. 6.4 Wireless Settings Screen Use this screen to choose the operating mode for your ZyXEL Device. Click Wireless >
Wireless Settings. The screen varies depending upon the operating mode you select. 6.4.1 Access Point Mode Use this screen to use your ZyXEL Device as an access point. Select AP as the Operation Mode. The following screen displays. Figure 27 Wireless: Access Point ZyXEL NWA-1100 Users Guide 63 Chapter 6 Wireless Settings Screen The following table describes the general wireless LAN labels in this screen. Table 9 Wireless: Access Point LABEL DESCRIPTION Basic Settings Operation Mode Select AP from the drop-down list. SSID The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID. Select an SSID Profile from the drop-down list box. Note: If you are configuring the ZyXEL Device from a computer connected to the wireless LAN and you change the ZyXEL Devices SSID or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the ZyXEL Devices new settings. If you hide the SSID, then the ZyXEL Device cannot be seen when a wireless client scans for local APs. The trade-off for the extra security of hiding the ZyXEL Device may be inconvenience for some valid WLAN clients. Set the operating frequency/channel depending on your particular region. To manually set the ZyXEL Device to use a channel, select a channel from the drop-down list box. Click MAINTENANCE and then the Channel Usage tab to open the Channel Usage screen to make sure the channel is not already used by another AP or independent peer-to-peer wireless network. To have the ZyXEL Device automatically select a channel, click Scan instead. Select 802.11b Only to allow only IEEE 802.11b compliant WLAN devices to associate with the ZyXEL Device. Select 802.11g Only to allow only IEEE 802.11g compliant WLAN devices to associate with the ZyXEL Device. Select 802.11b+g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the ZyXEL Device. The transmission rate of your ZyXEL Device might be reduced. Hide SSID Channel Wireless Mode Intra-BSS Traffic Advanced Settings Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interval. This specifies the time period before the device sends the beacon again. The interval tells receiving devices on the network how long they can wait in lowpower mode before waking up to handle the beacon. This value can be set from 20ms to 1000ms. A high value helps save current consumption of the access point. When Intra-BSS is enabled, wireless client can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client can still access the wired network but cannot communicate with each other. Delivery Traffic Indication Message (DTIM) is the time period after which broadcast and multicast packets are transmitted to mobile clients in the Power Saving mode. A high DTIM value can cause clients to lose connectivity with the network. This value can be set from 1 to 100. Select this to turn on WMM QoS (Wireless MultiMedia Quality of Service). The ZyXEL Device assigns priority to packets based on the IEEE 802.1q or DSCP information in their headers. If a packet has no WMM information in its header, it is assigned the default priority. DTIM Interval WMM 64 ZyXEL NWA-1100 Users Guide Chapter 6 Wireless Settings Screen Table 9 Wireless: Access Point LABEL DESCRIPTION Specify how many wireless stations can associate with your ZyXEL Device. Number of Wireless Stations Allowed to Associate Radio Enable Select Yes to enable WLAN radio, and No to turn it off. The ZyXEL Device cannot be accessed wirelessly if radio is turned off. Set the output power of the ZyXEL Device in this field. If there is a high density of APs in an area, decrease the output power of the ZyXEL Device to reduce interference with other APs. Select one of the following Full (Full Power), 50%, 25%, 12.5% or Min (Minimum). See the product specifications for more information on your ZyXEL Devices output power. Select Dynamic to have the AP automatically use short preamble when wireless adapters support it, otherwise the AP uses long preamble. Select Long if you are unsure what preamble mode the wireless adapters support, and to provide more reliable communications in busy wireless networks.
(Request To Send) The threshold (number of bytes) for enabling RTS/CTS handshake. Data with its frame size larger than this value will perform the RTS/CTS handshake. Setting this attribute to be larger than the maximum MSDU (MAC service data unit) size turns off the RTS/CTS handshake. Setting this attribute to its smallest value (1) turns on the RTS/CTS handshake. Enter a value between 1 and 2346. The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter an even number between 256 and 2346. This section controls the data rates permitted for clients. For each Rate, select an option from the Configuration list. The options are:
Basic (1~11 Mbps only): Clients can always connect to the access point at this Optional: Clients can connect to the access point at this speed, when permitted speed. to do so by the AP. Disable: Clients cannot connect to the access point at this speed. Select this to use antenna diversity. Antenna diversity uses multiple antennas to reduce signal interference.
(R)STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a bridge to interact with other (R)STP -
compliant bridges in your network to ensure that only one path exists between any two stations on the network. Select the check box to activate STP on the ZyXEL Device. Click Apply to save your changes. Click Reset to begin configuring this screen afresh. Output Power Management Preamble Type RTS/CTS Threshold Fragmentation Rates Configuration Enable Antenna Diversity Enable Spanning Tree Control (STP) Apply Reset 6.4.2 Wireless Client Mode Use this screen to turn your ZyXEL Device into a wireless client. Select Wireless Client as the Operation Mode. The following screen displays. ZyXEL NWA-1100 Users Guide 65 Chapter 6 Wireless Settings Screen Figure 28 Wireless: Wireless Client DESCRIPTION The following table describes the general wireless LAN labels in this screen. Table 10 Wireless: Wireless Client LABEL Basic Settings Operation Mode Select Wireless Client from the drop-down list. Click Apply to make the Site Survey button appear next to the SSID field. Click this button to get a pop up window of available APs. The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID. In this field, enter the SSID of the AP you want to use (click Site Survey button for a list of available APs). Click Apply. Set the security configuration for this operating mode in the Wireless > Security screen. Check the Status screen to check if the settings you set show in the WLAN information. SSID Note: If you are configuring the ZyXEL Device from a computer connected to the wireless LAN and you change the ZyXEL Devices SSID or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the ZyXEL Devices new settings. 66 ZyXEL NWA-1100 Users Guide Chapter 6 Wireless Settings Screen Table 10 Wireless: Wireless Client LABEL Site Survey Wireless Mode DESCRIPTION Click this to view a list of available wireless access points within the range. Select 802.11b Only to allow only IEEE 802.11b compliant WLAN devices to associate with the ZyXEL Device. Select 802.11g Only to allow only IEEE 802.11g compliant WLAN devices to associate with the ZyXEL Device. Select 802.11b+g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the ZyXEL Device. The transmission rate of your ZyXEL Device might be reduced. Advanced Settings MAC Address Clone Radio Enable Output Power Management Preamble Type RTS/CTS Threshold Fragmentation Rates Configuration Enable Antenna Diversity Enable Spanning Tree Control (STP) Apply Reset Choose Manual to configure the ZyXEL Device's MAC address by cloning the MAC address from a computer on your LAN. Choose Auto to use the factory default MAC address of your ZyXEL Device. Select Yes to enable WLAN radio, and No to turn it off. The ZyXEL Device cannot be accessed wirelessly if radio is turned off. Set the output power of the ZyXEL Device in this field. If there is a high density of APs in an area, decrease the output power of the ZyXEL Device to reduce interference with other APs. Select one of the following Full (Full Power), 50%, 25%, 12.5% or Min (Minimum). See the product specifications for more information on your ZyXEL Devices output power. Select Dynamic to have the ZyXEL Device automatically use short preamble when the wireless network your ZyXEL Device is connected to supports it, otherwise the ZyXEL Device uses long preamble. Select Long preamble if you are unsure what preamble mode the wireless device your ZyXEL Device is connected to supports, and to provide more reliable communications in busy wireless networks.
(Request To Send) The threshold (number of bytes) for enabling RTS/CTS handshake. Data with its frame size larger than this value will perform the RTS/CTS handshake. Setting this attribute to be larger than the maximum MSDU (MAC service data unit) size turns off the RTS/CTS handshake. Setting this attribute to its smallest value (1) turns on the RTS/CTS handshake. Enter a value between 1 and 2346. The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter an even number between 256 and 2346. This section controls the data rates permitted for clients. For each Rate, select an option from the Configuration list. The options are:
Basic (1~11 Mbps only): Clients can always connect to the access point at this Optional: Clients can connect to the access point at this speed, when permitted speed. to do so by the AP. Disable: Clients cannot connect to the access point at this speed. Select this to use antenna diversity. Antenna diversity uses multiple antennas to reduce signal interference.
(R)STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a bridge to interact with other (R)STP -
compliant bridges in your network to ensure that only one path exists between any two stations on the network. Select the check box to activate STP on the ZyXEL Device. Click Apply to save your changes. Click Reset to begin configuring this screen afresh. ZyXEL NWA-1100 Users Guide 67 Chapter 6 Wireless Settings Screen 6.4.3 Bridge Mode Use this screen to have the ZyXEL Device act as a wireless network bridge and establish wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode. Use this screen to use the ZyXEL Device as a wireless bridge. Select Bridge as the Operation Mode. Figure 29 Wireless: Bridge The following table describes the bridge labels in this screen. Table 11 Wireless: Bridge LABEL Basic Settings Operation Mode Select Bridge in this field. DESCRIPTIONS 68 ZyXEL NWA-1100 Users Guide Table 11 Wireless: Bridge LABEL Channel Wireless Mode WDS Settings Local Mac Address Remote MAC Address 1 - 4 Advanced Settings Radio Enable Output Power Management Preamble Type RTS/CTS Threshold Fragmentation Rates Configuration Chapter 6 Wireless Settings Screen DESCRIPTIONS Set the operating frequency/channel depending on your particular region. To manually set the ZyXEL Device to use a channel, select a channel from the drop-down list box. Click MAINTENANCE and then the Channel Usage tab to open the Channel Usage screen to make sure the channel is not already used by another AP or independent peer-to-peer wireless network. To have the ZyXEL Device automatically select a channel, click Scan instead. Select 802.11b Only to allow only IEEE 802.11b compliant WLAN devices to associate with the ZyXEL Device. Select 802.11g Only to allow only IEEE 802.11g compliant WLAN devices to associate with the ZyXEL Device. Select 802.11b+g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the ZyXEL Device. The transmission rate of your ZyXEL Device might be reduced. A Wireless Distribution System is a wireless connection between two or more APs. Note: WDS security is independent of the security settings between the ZyXEL Device and any wireless clients. Local MAC Address is the MAC address of your ZyXEL Device. You can specify up to 4 remote devices MAC addresses in this section. Select Yes to enable WLAN radio, and No to turn it off. The ZyXEL Device cannot be accessed wirelessly if radio is turned off. Set the output power of the ZyXEL Device in this field. If there is a high density of APs in an area, decrease the output power of the ZyXEL Device to reduce interference with other APs. Select one of the following Full (Full Power), 50%, 25%, 12.5% or Min (Minimum). See the product specifications for more information on your ZyXEL Devices output power. Select Dynamic to have the ZyXEL Device automatically use short preamble when wireless adapters support it, otherwise the AP uses long preamble. Select Long preamble if you are unsure what preamble mode the wireless adapters support, and to provide more reliable communications in busy wireless networks.
(Request To Send) The threshold (number of bytes) for enabling RTS/CTS handshake. Data with its frame size larger than this value will perform the RTS/
CTS handshake. Setting this attribute to be larger than the maximum MSDU
(MAC service data unit) size turns off the RTS/CTS handshake. Setting this attribute to 1 turns on the RTS/CTS handshake. Enter a value between 1 and 2346. The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter an even number between 256 and 2346. This section controls the data rates permitted for clients. For each Rate, select an option from the Configuration list. The options are:
Basic (1~11 Mbps only): Clients can always connect to the access point at this speed. Optional: Clients can connect to the access point at this speed, when permitted to do so by the AP. Disable: Clients cannot connect to the access point at this speed. ZyXEL NWA-1100 Users Guide 69 Chapter 6 Wireless Settings Screen Table 11 Wireless: Bridge LABEL Enable Antenna Diversity Enable Spanning Tree Protocol(STP) DESCRIPTIONS Select this to use antenna diversity. Antenna diversity uses multiple antennas to reduce signal interference.
(R)STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a bridge to interact with other (R)STP -
compliant bridges in your network to ensure that only one path exists between any two stations on the network. Select the check box to activate STP on the ZyXEL Device. 6.4.4 AP + Bridge Mode Use this screen to have the ZyXEL Device function as a bridge and access point simultaneously. Select AP + Bridge as the Operation Mode. The following screen diplays. Figure 30 Wireless: AP+Bridge 70 ZyXEL NWA-1100 Users Guide
1 | Installation guide II | Users Manual | 1.76 MiB |
Chapter 6 Wireless Settings Screen See the tables describing the fields in the Access Point and Bridge operating modes for descriptions of the fields in this screen. 6.5 Technical Reference This section provides technical background information about the topics covered in this chapter. Refer to Appendix E on page 153 for further readings on Wireless LAN. 6.5.1 WMM QoS WMM (Wi-Fi MultiMedia) QoS (Quality of Service) ensures quality of service in wireless networks. It controls WLAN transmission priority on packets to be transmitted over the wireless network. WMM QoS prioritizes wireless traffic according to the delivery requirements of the individual and applications. WMM QoS is a part of the IEEE 802.11e QoS enhancement to certified Wi-
Fi wireless networks. On APs without WMM QoS, all traffic streams are given the same access priority to the wireless network. If the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity, then the new traffic stream reduces the throughput of the other traffic streams. The ZyXEL Device uses WMM QoS to prioritize traffic streams according to the IEEE 802.1q or DSCP information in each packets header. The ZyXEL Device automatically determines the priority to use for an individual traffic stream. This prevents reductions in data transmission for applications that are sensitive to latency and jitter (variations in delay). 6.5.2 Spanning Tree Protocol (STP) STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a bridge to interact with other STP-compliant bridges in your network to ensure that only one route exists between any two stations on the network. 6.5.2.1 Rapid STP The ZyXEL Device uses IEEE 802.1w RSTP (Rapid Spanning Tree Protocol) that allow faster convergence of the spanning tree (while also being backwards compatible with STP-only aware bridges). Using RSTP topology change information does not have to propagate to the root bridge and unwanted learned addresses are flushed from the filtering database. In RSTP, the port states are Discarding, Learning, and Forwarding. 6.5.2.2 STP Terminology The root bridge is the base of the spanning tree; it is the bridge with the lowest identifier value
(MAC address). ZyXEL NWA-1100 Users Guide 71 Chapter 6 Wireless Settings Screen Path cost is the cost of transmitting a frame onto a LAN through that port. It is assigned according to the speed of the link to which a port is attached. The slower the media, the higher the cost - see the following table. Table 12 STP Path Costs Path Cost Path Cost Path Cost Path Cost Path Cost Path Cost LINK SPEED 4Mbps 10Mbps 16Mbps 100Mbps 1Gbps 10Gbps RECOMMENDED VALUE 250 100 62 19 4 2 RECOMMENDED RANGE 100 to 1000 50 to 600 40 to 400 10 to 60 3 to 10 1 to 5 ALLOWED RANGE 1 to 65535 1 to 65535 1 to 65535 1 to 65535 1 to 65535 1 to 65535 On each bridge, the root port is the port through which this bridge communicates with the root. It is the port on this switch with the lowest path cost to the root (the root path cost). If there is no root port, then this bridge has been accepted as the root bridge of the spanning tree network. For each LAN segment, a designated bridge is selected. This bridge has the lowest cost to the root among the bridges connected to the LAN. 6.5.2.3 How STP Works After a bridge determines the lowest cost-spanning tree with STP, it enables the root port and the ports that are the designated ports for connected LANs, and disables all other ports that participate in STP. Network packets are therefore only forwarded between enabled ports, eliminating any possible network loops. STP-aware bridges exchange Bridge Protocol Data Units (BPDUs) periodically. When the bridged LAN topology changes, a new spanning tree is constructed. Once a stable network topology has been established, all bridges listen for Hello BPDUs
(Bridge Protocol Data Units) transmitted from the root bridge. If a bridge does not get a Hello BPDU after a predefined interval (Max Age), the bridge assumes that the link to the root bridge is down. This bridge then initiates negotiations with other bridges to reconfigure the network to re-establish a valid network topology. 6.5.2.4 STP Port States STP assigns five port states (see next table) to eliminate packet looping. A bridge port is not allowed to go directly from blocking state to forwarding state so as to eliminate transient loops. Table 13 STP Port States PORT STATES Disabled Blocking Listening Learning DESCRIPTIONS STP is disabled (default). Only configuration and management BPDUs are received and processed. All BPDUs are received and processed. All BPDUs are received and processed. Information frames are submitted to the learning process but not forwarded. All BPDUs are received and processed. All information frames are received and forwarded. ZyXEL NWA-1100 Users Guide Forwarding 72 6.5.3 Additional Wireless Terms Table 14 Additional Wireless Terms Chapter 6 Wireless Settings Screen TERM Intra-BSS Traffic RTS/CTS Threshold Preamble Fragmentation Threshold Roaming Antenna DESCRIPTION This describes direct communication (not through the ZyXEL Device) between two wireless devices within a wireless network. You might disable this kind of communication to enhance security within your wireless network. In a wireless network which covers a large area, wireless devices are sometimes not aware of each others presence. This may cause them to send information to the AP at the same time and result in information colliding and not getting through. By setting this value lower than the default value, the wireless devices must sometimes get permission to send information to the ZyXEL Device. The lower the value, the more often the devices must get permission. If this value is greater than the fragmentation threshold value (see below), then wireless devices never have to get permission to send information to the ZyXEL Device. A preamble affects the timing in your wireless network. There are two preamble modes: long and short. If a device uses a different preamble mode than the ZyXEL Device does, it cannot communicate with the ZyXEL Device. A small fragmentation threshold is recommended for busy networks, while a larger threshold provides faster performance if the network is not very busy. If you have two or more ZyXEL Devices (or other wireless access points) on your wireless network, you can enable this option so that wireless devices can change locations without having to log in again. This is useful for devices, such as notebooks, that move around a lot. An antenna couples Radio Frequency (RF) signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. ZyXEL NWA-1100 Users Guide 73 Chapter 6 Wireless Settings Screen 74 ZyXEL NWA-1100 Users Guide CHAPTER 7 Wireless Security Screen 7.1 Overview This chapter describes how to use the Wireless Security screen. This screen allows you to configure the security mode for your ZyXEL Device. Wireless security is vital to your network. It protects communications between wireless stations, access points and the wired network. Figure 31 Securing the Wireless Network In the figure above, the ZyXEL Device checks the identity of devices before giving them access to the network. In this scenario, Computer A is denied access to the network, while Computer B is granted connectivity. The ZyXEL Device secure communications via data encryption, wireless client authentication and MAC address filtering. It can also hide its identity in the network. 7.2 What You Can Do in the Wireless Security Screen Use the Wireless > Security screen (see Section 7.4 on page 77) to choose the security mode for your ZyXEL Device. ZyXEL NWA-1100 Users Guide 75 Chapter 7 Wireless Security Screen 7.3 What You Need To Know About Wireless Security User Authentication Authentication is the process of verifying whether a wireless device is allowed to use the wireless network. You can make every user log in to the wireless network before they can use it. However, every device in the wireless network has to support IEEE 802.1x to do this. For wireless networks, you can store the user names and passwords for each user in a RADIUS server. This is a server used in businesses more than in homes. If you do not have a RADIUS server, you cannot set up user names and passwords for your users. Unauthorized wireless devices can still see the information that is sent in the wireless network, even if they cannot use the wireless network. Furthermore, there are ways for unauthorized wireless users to get a valid user name and password. Then, they can use that user name and password to use the wireless network. The following table shows the relative effectiveness of wireless security methods:. Table 15 Wireless Security Levels SECURITY LEVEL Least Secure SECURITY TYPE Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication Wi-Fi Protected Access (WPA) WPA2 Most Secure The available security modes in your ZyXEL Device are as follows:
None. No data encryption. WEP. Wired Equivalent Privacy (WEP) encryption scrambles the data transmitted between the wireless stations and the access points to keep network communications private. 802.1x-Only. This is a standard that extends the features of IEEE 802.11 to support extended authentication. It provides additional accounting and control features. This option does not support data encryption. 802.1x-Static64. This provides 802.1x-Only authentication with a static 64bit WEP key and an authentication server. 802.1x-Static128. This provides 802.1x-Only authentication with a static 128bit WEP key and an authentication server. WPA. Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. WPA2-MIX. This commands the ZyXEL Device to use either WPA2 or WPA depending on which security mode the wireless client uses. WPA2-PSK. This adds a pre-shared key on top of WPA2 standard. 76 ZyXEL NWA-1100 Users Guide Chapter 7 Wireless Security Screen WPA2-PSK-MIX. This commands the ZyXEL Device to use either WPA-PSK or WPA2-PSK depending on which security mode the wireless client uses.
In Bridge and Bridge + AP operating modes, the only available security modes are WEP and WPA2-PSK. Passphrase A passphrase functions like a password. In WEP security mode, it is further converted by the ZyXEL Device into a complicated string that is referred to as the key. This key is requested from all devices wishing to connect to a wireless network. PSK The Pre-Shared Key (PSK) is a password shared by a wireless access point and a client during a previous secure connection. The key can then be used to establish a connection between the two parties. Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. Encryption is the process of converting data into unreadable text. This secures information in network communications. The intended recipient of the data can unlock it with a pre-assigned key, making the information readable only to him. The ZyXEL Device when used as a wireless client employs Temporal Key Integrity Protocol (TKIP) data encryption. EAP Extensible Authentication Protocol (EAP) is a protocol used by a wireless client, an access point and an authentication server to negotiate a connection. The EAP methods employed by the ZyXEL Device when in Wireless Client operating mode are Transport Layer Security (TLS), Protected Extensible Authentication Protocol (PEAP), Lightweight Extensible Authentication Protocol (LEAP) and Tunneled Transport Layer Security (TTLS). The authentication protocol may either be Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAPv2) or Generic Token Card (GTC). Further information on these terms can be found in Appendix E on page 153. 7.4 The Security Screen Use this screen to choose the security mode for your ZyXEL Device. Click Wireless > Security. The screen varies depending upon the security mode you select. ZyXEL NWA-1100 Users Guide 77 Chapter 7 Wireless Security Screen Figure 32 Security: None The default security mode is set to None. Note that some screens display differently depending on the operating mode selected in the Wireless > Wireless Settings screen.
You must enable the same wireless security settings on the ZyXEL Device and on all wireless clients that you want to associate with it. 7.4.1 Security: WEP Use this screen to use WEP as the security mode for your ZyXEL Device. Select WEP in the Security Mode field to display the following screen. Figure 33 Security: WEP 78 ZyXEL NWA-1100 Users Guide Chapter 7 Wireless Security Screen The following table describes the labels in this screen. Table 16 Security: WEP LABEL Security Mode Authentication Method DESCRIPTION Choose WEP in this field. Select Open or Shared Key from the drop-down list box. The default setting is Auto. Select Disable to allow wireless stations to communicate with the access points without any data encryption. Select 64-bit WEP, 128-bit WEP or 152-bit WEP to enable data encryption. Enter the passphrase or string of text used for automatic WEP key generation on wireless client adapters. Click this to get the keys from the Passphrase you entered. The WEP keys are used to encrypt data. Both the ZyXEL Device and the wireless stations must use the same WEP key for data transmission. If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F"). If you chose 152-bit WEP, then enter 16 ASCII characters or 32 hexadecimal characters ("0-9", "A-F"). You must configure all four keys, but only one key can be activated at any one time. The default key is key 1. Click Apply to save your changes. Click Reset to begin configuring this screen afresh. Data Encryption Passphrase Generate Key 1 to Key 4 Apply Reset 7.4.2 Security: 802.1x Only This screen varies depending on whether you select Access Point or Wireless Client in the Wireless > Wireless Settings screen. 7.4.2.1 Access Point Use this screen to use 802.1x-Only security mode for your ZyXEL Device that is in Access Point operating mode. Select 802.1x-Only in the Security Mode field to display the following screen. ZyXEL NWA-1100 Users Guide 79 Chapter 7 Wireless Security Screen Figure 34 Security: 802.1x Only for Access Point The following table describes the labels in this screen. Table 17 Security: 802.1x Only for Access Point LABEL Security Mode ReAuthentication Time DESCRIPTION Choose 802.1x Only in this field. Specify how often wireless stations have to resend user names and passwords in order to stay connected. Enter a time interval between 10 and 9999 seconds. The default time interval is 1800 seconds (30 minutes). Alternatively, enter 0 to turn reauthentication off. Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority. The ZyXEL Device automatically disconnects a wireless station from the wired network after a period of inactivity. The wireless station needs to enter the user name and password again before access to the wired network is allowed. The default time interval is 3600 seconds (or 1 hour). Click Apply to save your changes. Click Reset to begin configuring this screen afresh. Group-Key Update Apply Reset 7.4.2.2 Wireless Client Use this screen to use 802.1x-Only security mode for your ZyXEL Device that is in Wireless Client operating mode. Select 802.1x-Only in the Security Mode field to display the following screen. 80 ZyXEL NWA-1100 Users Guide Figure 35 Security: 802.1x Only for Wireless Client Chapter 7 Wireless Security Screen The following table describes the labels in this screen. Table 18 Security: 802.1x Only for Wireless Client LABEL Security Mode Data Encryption DESCRIPTION Choose the same security mode used by the AP. Select between None and Dynamic WEP. Refer to Section on page 161 for information on using Dynamic WEP. IEEE802.1x Authentication EAP Type User Information Username Password Apply Reset The options on the left refer to EAP methods. You can choose either TLS, LEAP, PEAP or TTLS. The default value is PEAP. The options on the right refer to authentication protocols. You can choose between MSCHAPv2 and GTC.The default value is MSCHAPv2. Supply the username of the account created in the RADIUS server. Supply the password of the account created in the RADIUS server. Click Apply to save your changes. Click Reset to begin configuring this screen afresh. 7.4.3 Security: 802.1x Static 64-bit, 802.1x Static 128-bit Use this screen to use 802.1x Static 64 or 802.1x Static 128 security mode for your ZyXEL Device. Select 802.1x Static 64 or 802.1x Static 128 in the Security Mode field to display the following screen. ZyXEL NWA-1100 Users Guide 81 Chapter 7 Wireless Security Screen Figure 36 Security: 802.1x Static 64-bit, 802.1x Static 128-bit (AP mode) The following table describes the labels in this screen. Table 19 Security: 802.1x Static 64-bit, 802.1x Static 128-bit LABEL Security Mode Passphrase DESCRIPTION Choose 802.1x Static 64 or 802.1x Static 128 in this field. Enter the passphrase or string of text used for automatic WEP key generation on wireless client adapters (AP mode). Click this to get the keys from the Passphrase you entered (AP mode). If you chose 802.1x Static 64, then enter any 5 characters (ASCII string) or 10 hexadecimal characters ("0-9", "A-F") preceded by 0x for each key. If you chose 802.1x Static 128-bit, then enter 13 characters (ASCII string) or 26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each key. There are four data encryption keys to secure your data from eavesdropping by unauthorized wireless users. The values for the keys must be set up exactly the same on the access points as they are on the wireless stations. The preceding 0x is entered automatically. You must configure all four keys, but only one key can be activated at any one time. The default key is key 1. Specify how often wireless stations have to resend user names and passwords in order to stay connected. Enter a time interval between 10 and 9999 seconds. The default time interval is 1800 seconds (30 minutes). Alternatively, enter 0 to turn reauthentication off. Generate Key 1 to Key 4 ReAuthentication Timer Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority. 82 ZyXEL NWA-1100 Users Guide Chapter 7 Wireless Security Screen Table 19 Security: 802.1x Static 64-bit, 802.1x Static 128-bit LABEL Group-Key Update DESCRIPTION The ZyXEL Device automatically disconnects a wireless station from the wired network after a period of inactivity. The wireless station needs to enter the user name and password again before access to the wired network is allowed. The default time interval is 3600 seconds (or 1 hour). Click Apply to save your changes. Click Reset to begin configuring this screen afresh. Apply Reset 7.4.4 Security: WPA This screen varies depending on whether you select Access Point or Wireless Client in the Wireless > Wireless Settings screen. 7.4.4.1 Access Point Use this screen to employ WPA as the security mode for your ZyXEL Device that is in Access Point operating mode. Select WPA in the Security Mode field to display the following screen. Figure 37 Security: WPA for Access Point The following table describes the labels in this screen. Table 20 Security: WPA for Access Point LABEL Security Mode ReAuthentication Timer DESCRIPTION Choose WPA in this field. Specify how often wireless stations have to resend user names and passwords in order to stay connected. Enter a time interval between 10 and 9999 seconds. The default time interval is 1800 seconds (30 minutes). Alternatively, enter 0 to turn reauthentication off. Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority. ZyXEL NWA-1100 Users Guide 83 Chapter 7 Wireless Security Screen Table 20 Security: WPA for Access Point LABEL Group Key Update DESCRIPTION The Group Key Update Timer is the rate at which the AP sends a new group key out to all clients. The re-keying process is the WPA equivalent of automatically changing the group key for an AP and all stations in a WLAN on a periodic basis. Setting of the Group Key Update Timer is also supported in WPA-PSK mode. The ZyXEL Device default is 3800 seconds (or 1 hour). Click Apply to save your changes. Click Reset to begin configuring this screen afresh. Apply Reset 7.4.4.2 Wireless Client Use this screen to employ WPA as the security mode for your ZyXEL Device that is in Wireless Client operating mode. Select WPA in the Security Mode field to display the following screen. Figure 38 Security: WPA for Wireless Client The following table describes the labels in this screen. Table 21 Security: WPA for Wireless Client LABEL Security Mode Data Encryption IEEE802.1x Authentication EAP Type DESCRIPTION Choose the same security mode used by the AP. Select between None and TKIP. The options on the left refer to EAP methods. You can choose either TLS, LEAP, PEAP or TTLS. The default value is PEAP. The options on the right refer to authentication protocols. You can choose between MSCHAPv2 and GTC.The default value is MSCHAPv2. User Information Username Password Supply the username of the account created in the RADIUS server. Supply the password of the account created in the RADIUS server. 84 ZyXEL NWA-1100 Users Guide Chapter 7 Wireless Security Screen Table 21 Security: WPA for Wireless Client LABEL Apply Reset DESCRIPTION Click Apply to save your changes. Click Reset to begin configuring this screen afresh. 7.4.5 Security: WPA2 or WPA2-MIX This screen varies depending on whether you select Access Point or Wireless Client in the Wireless > Wireless Settings screen. 7.4.5.1 Access Point Use this screen to use WAP2 or WPA2-MIX as the security mode for your ZyXEL Device that is in Access Point operating mode. Select WPA2 or WPA2-MIX in the Security Mode field to display the following screen. Figure 39 Security:WPA2 or WPA2-MIX for Access Point The following table describes the labels not previously discussed Table 22 Security: WPA2 or WPA2-MIX for Access Point LABEL Security Mode ReAuthentication Timer DESCRIPTIONS Choose WPA2 or WPA2-MIX in this field. Specify how often wireless stations have to resend usernames and passwords in order to stay connected. Enter a time interval between 10 and 9999 seconds. The default time interval is 1800 seconds (30 minutes). Alternatively, enter 0 to turn reauthentication off. Group Key Update Timer Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority. The Group Key Update Timer is the rate at which the AP sends a new group key out to all clients. The re-keying process is the WPA equivalent of automatically changing the group key for an AP and all stations in a WLAN on a periodic basis. Setting of the Group Key Update Timer is also supported in WPA-PSK mode. The ZyXEL Devices default is 3600 seconds (or 1 hour). ZyXEL NWA-1100 Users Guide 85 Chapter 7 Wireless Security Screen Table 22 Security: WPA2 or WPA2-MIX for Access Point LABEL Apply Reset DESCRIPTIONS Click Apply to save your changes. Click Reset to begin configuring this screen afresh. 7.4.5.2 Wireless Client Use this screen to employ WPA2 or WPA2-MIX as the security mode of your ZyXEL Device that is in Wireless Client operating mode. Select WPA2 or WPA2-MIX in the Security Mode field to display the following screen. Figure 40 Security: WPA2 or WPA2-MIX for Wireless Client The following table describes the labels in this screen. Table 23 Security: WPA2 or WPA2-MIX for Wireless Client LABEL Security Mode IEEE802.1x Authentication EAP Type DESCRIPTION Choose the same security mode used by the AP. The options on the left refer to EAP methods. You can choose either TLS, LEAP, PEAP or TTLS. The default value is PEAP. The options on the right refer to authentication protocols. You can choose between MSCHAPv2 and GTC.The default value is MSCHAPv2. User Information Username Password Apply Reset Supply the username of the account created in the RADIUS server. Supply the password of the account created in the RADIUS server. Click Apply to save your changes. Click Reset to begin configuring this screen afresh. 86 ZyXEL NWA-1100 Users Guide Chapter 7 Wireless Security Screen 7.4.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX Use this screen to employ WPA-PSK, WPA2-PSK or WPA2-PSK-MIX as the security mode of your ZyXEL Device. Select WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in the Security Mode field to display the following screen. Figure 41 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX The following table describes the labels not previously discussed Table 24 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX LABEL Security Mode Pre-Shared Key DESCRIPTION Choose WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in this field. The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials. Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and symbols). Click Apply to save your changes. Click Reset to begin configuring this screen afresh. Apply Reset 7.5 Technical Reference This section provides technical background information on the topics discussed in this chapter. The following is a general guideline in choosing the security mode for your ZyXEL Device. Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server. WPA has user authentication and improved data encryption over WEP. Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server. If you dont have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher bit key offers better security. You can manually enter 64-bit, 128-bit or 152-bit WEP keys. More information on Wireless Security can be found in Appendix E on page 153. ZyXEL NWA-1100 Users Guide 87 Chapter 7 Wireless Security Screen 88 ZyXEL NWA-1100 Users Guide CHAPTER 8 RADIUS Screen 8.1 Overview This chapter describes how you can use the Wireless > RADIUS screen. Remote Authentication Dial In User Service (RADIUS) is a protocol that can be used to manage user access to large networks. It is based on a client-server model that supports authentication, authorization and accounting. The access point is the client and the server is the RADIUS server. Figure 42 RADIUS Server Setup Authentication In the figure above, wireless clients A and B are trying to access the Internet via the ZyXEL Device. The ZyXEL Device in turn queries the RADIUS server if the identity of clients A and U are allowed access to the Internet. In this scenario, only client Us identity is verified by the RADIUS server and allowed access to the Internet. 8.2 What You Can Do in the RADIUS Screen Use the Security > RADIUS screen (see Section 7.4.1 on page 78) if you want to authenticate wireless users using a RADIUS Server and/or Accounting Server. 8.3 What You Need to Know About RADIUS The RADIUS server handles the following tasks:
Authentication which determines the identity of the users. Authorization which determines the network services available to authenticated users once they are connected to the network. ZyXEL NWA-1100 Users Guide 89 Chapter 8 RADIUS Screen Accounting which keeps track of the clients network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. You should know the IP addresses, ports and share secrets of the external RADIUS server and/
or the external RADIUS accounting server you want to use with your ZyXEL Device. You can configure a primary and backup RADIUS and RADIUS accounting server for your ZyXEL Device. 8.4 The RADIUS Screen Use this screen to set up your ZyXEL Devices RADIUS server settings. Click Wireless >
RADIUS. The screen appears as shown. Figure 43 Wireless > RADIUS The following table describes the labels in this screen. Table 25 Wireless > RADIUS LABEL Primary Backup DESCRIPTION Configure the fields below to set up user authentication and accounting. If the ZyXEL Device cannot communicate with the Primary accounting server, you can have the ZyXEL Device use a Backup RADIUS server. Make sure the Active check boxes are selected if you want to use backup servers. The ZyXEL Device will attempt to communicate three times before using the Backup servers. Requests can be issued from the client interface to use the backup server. The length of time for each authentication is decided by the wireless client or based on the configuration of the ReAuthentication Timer field in the Security Settings screen. RADIUS Option Active RADIUS Server IP Address Select the check box to enable user authentication through an external authentication server. This check box is not available when you select Internal. Enter the IP address of the external authentication server in dotted decimal notation. This field is not available when you select Internal. 90 ZyXEL NWA-1100 Users Guide Chapter 8 RADIUS Screen Table 25 Wireless > RADIUS LABEL RADIUS Server Port DESCRIPTION Enter the port number of the external authentication server. The default port number is 1812. You need not change this value unless your network administrator instructs you to do so. This field is not available when you select Internal. Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external authentication server and the ZyXEL Device. The key must be the same on the external authentication server and your ZyXEL Device. The key is not sent over the network. This field is not available when you select Internal. Select the check box to enable user accounting through an external authentication server. Enter the IP address of the external accounting server in dotted decimal notation. Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information. Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the ZyXEL Device. The key must be the same on the external accounting server and your ZyXEL Device. The key is not sent over the network. Click Apply to save your changes. Click Reset to begin configuring this screen afresh. Share Secret Active Accounting Server IP Address Accounting Server Port Share Secret Apply Reset ZyXEL NWA-1100 Users Guide 91 Chapter 8 RADIUS Screen 92 ZyXEL NWA-1100 Users Guide CHAPTER 9 MAC Filter Screen 9.1 Overview This chapter discusses how you can use the Wireless > MAC Filter screen. The MAC filter function allows you to configure the ZyXEL Device to grant access to the ZyxEL Device from other wireless devices (Allow Association) or exclude devices from accessing the ZyXEL Device (Deny Association). Figure 44 MAC Filtering In the figure above, wireless client U is able to connect to the Internet because its MAC address is in the allowed association list specified in the ZyXEL Device. The MAC address of client A is either denied association or is not in the list of allowed wireless clients specified in the ZyXEL Device. 9.2 What You Can Do in the MAC Filter Use the Wireless > MAC Filter screen (see Section 9.4 on page 94) to specify which wireless station is allowed or denied access to the ZyXEL Device. 9.3 What You Need To Know About MAC Filter Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of each device to configure MAC filtering on the ZyXEL Device. ZyXEL NWA-1100 Users Guide 93 Chapter 9 MAC Filter Screen 9.4 MAC Filter Screen Use this screen to enable MAC address filtering in your ZyXEL Device.You can specify up to 64 MAC addresses to either allow or deny association with your ZyXEL Device. Click Wireless > MAC Filter. The screen displays as shown. Figure 45 Wireless > MAC Filter The following table describes the labels in this screen. Table 26 Wireless > MAC Filter LABEL Active Allow the following MAC Address to associate DESCRIPTION Click this to enable this feature. Define the filter action for the list of MAC addresses in the MAC address filter table. Select this to permit access to the ZyXEL Device. MAC addresses not listed will be denied access to the ZyXEL Device. Select this to block access to theZyXEL Device. MAC addresses not listed will be allowed to access the ZyXEL Device. Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless station to be allowed or denied access to the ZyXEL Device. Type a name to identify this wireless station. Deny the following MAC Address to associate MAC Address Description 94 ZyXEL NWA-1100 Users Guide Chapter 9 MAC Filter Screen Table 26 Wireless > MAC Filter LABEL Apply Reset DESCRIPTION Click Apply to save your changes. Click Reset to begin configuring this screen afresh. ZyXEL NWA-1100 Users Guide 95 Chapter 9 MAC Filter Screen 96 ZyXEL NWA-1100 Users Guide CHAPTER 10 IP Screen 10.1 Overview This chapter describes how you can configure the IP address of your ZyXEL Device. The Internet Protocol (IP) address identifies a device on a network. Every networking device
(including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Figure 46 IP Setup The figure above illustrates one possible setup of your ZyXEL Device. The gateway IP address is 192.168.1.2 and the IP address of the ZyXEL Device is 192.168.1.2 (default). The gateway and the device must belong in the same subnet mask to be able to communicate with each other. 10.2 What You Can Do in the IP Screen Use the IP screen (see Section 10.4 on page 98) to configure the IP address of your ZyXEL Device. 10.3 What You Need to Know About IP The Ethernet parameters of the ZyXEL Device are preset in the factory with the following values:
1 IP address of 192.168.1.2 2 Subnet mask of 255.255.255.0 (24 bits) ZyXEL NWA-1100 Users Guide 97 Chapter 10 IP Screen 10.4 IP Screen Use this screen to configure the IP address for your ZyXEL Device. Click IP to display the following screen. Figure 47 IP Setup The following table describes the labels in this screen. Table 27 IP Setup LABEL IP Address Assignment Get automatically from DHCP DESCRIPTION Select this option if your ZyXEL Device is using a dynamically assigned IP address from a DHCP server each time. Note: You must know the IP address assigned to the ZyXEL Device (by the DHCP server) to access the ZyXEL Device again. Select this option if your ZyXEL Device is using a static IP address. When you select this option, fill in the fields below. Enter the IP address of your ZyXEL Device in dotted decimal notation. Note: If you change the ZyXEL Device's IP address, you must use the new IP address if you want to access the web configurator again. Type the subnet mask. Type the IP address of the gateway. The gateway is an immediate neighbor of your ZyXEL Device that will forward the packet to the destination. On the LAN, the gateway must be a router on the same segment as your ZyXEL Device; over the WAN, the gateway must be the IP address of one of the remote nodes. Click Apply to save your changes. Click Reset to begin configuring this screen afresh. Use fixed IP address IP Address Subnet Mask Gateway IP Address Apply Reset 98 ZyXEL NWA-1100 Users Guide Chapter 10 IP Screen 10.5 Technical Reference This section provides the technical background information about the topics covered in this chapter. 10.5.1 WAN IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet (only between your two branch offices, for instance) you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private networks. Table 28 Private IP Address Ranges 10.255.255.255 10.0.0.0 172.31.255.255 172.16.0.0 192.168.0.0 192.168.255.255
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses.
Regardless of your particular situation, do not create an arbitrary IP address;
always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466, Guidelines for Management of IP Address Space. ZyXEL NWA-1100 Users Guide 99 Chapter 10 IP Screen 100 ZyXEL NWA-1100 Users Guide CHAPTER 11 Remote Management 11.1 Overview This chapter shows you how to enable remote management of your ZyXEL Device. It provides information on determining which services or protocols can access which of the ZyXEL Devices interfaces. Remote Management allows a user to administrate the device over the network. You can manage your ZyXEL Device from a remote location via the following interfaces:
WLAN LAN Both WLAN and LAN Neither (Disable) Figure 48 Remote Management Example In the figure above, the ZyXEL Device (A) is being managed by a desktop computer (B) connected via LAN (Land Area Network). It is also being accessed by a notebook (C) connected via WLAN (Wireless LAN). ZyXEL NWA-1100 Users Guide 101 Chapter 11 Remote Management 11.2 What You Can Do in the Remote Management Screens Use the Telnet screen (see Section 11.4 on page 104) to configure through which interface(s) and from which IP address(es) you can use Telnet to manage the ZyXEL Device. A Telnet connection is prioritized by the ZyXEL Device over other remote management sessions. Use the FTP screen (see Section 11.5 on page 104) to configure through which interface(s) and from which IP address(es) you can use File Transfer Protocol (FTP) to manage the ZyXEL Device. You can use FTP to upload the latest firmware for example. Use the WWW screen (see Section 11.6 on page 105) to configure through which interface(s) and from which IP address(es) you can use the Web Browser to manage the ZyXEL Device. Use the SNMP screen (see Section 11.7 on page 106) to configure through which interface(s) and from which IP address(es) a network systems manager can access the ZyXEL Device. 11.3 What You Need To Know About Remote Management Telnet Telnet is short for Telecommunications Network, which is a client-side protocol that enables you to access a device over the network. FTP File Transfer Protocol (FTP) allows you to upload or download a file or several files to and from a remote location using a client or the command console. WWW The World Wide Web allows you to access files hosted in a remote server. For example, you can view text files (usually referred to as pages) using your web browser via HyperText Transfer Protocol (HTTP). SNMP Simple Network Management Protocol (SNMP) is a member of the TCP/IP protocol suite used for exchanging management information between network devices. Your ZyXEL Device supports SNMP agent functionality, which allows a manager station to manage and monitor the ZyXEL Device through the network. The ZyXEL Device supports SNMP version one (SNMPv1) and version two (SNMPv2c). The next figure illustrates an SNMP management operation.
SNMP is only available if TCP/IP is configured. 102 ZyXEL NWA-1100 Users Guide Figure 49 SNMP Management Mode Chapter 11 Remote Management An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the ZyXEL Device). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions. It executes applications that control and monitor managed devices. SNMP allows a manager and agents to communicate for the purpose of accessing information such as packets received, node port status, etc. Remote Management Limitations Remote management over LAN or WLAN will not work when:
You have disabled that service in one of the remote management screens. The IP address in the Secured Client IP field does not match the client IP address. If it does not match, the ZyXEL Device will disconnect the session immediately. You may only have one remote management session running at one time. The ZyXEL Device automatically disconnects a remote management session of lower priority when another remote management session of higher priority starts. The priorities for the different types of remote management sessions are as follows:
1. Telnet 2. HTTP System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The ZyXEL Device automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling. You can change the timeout period in the SYSTEM screen. ZyXEL NWA-1100 Users Guide 103 Chapter 11 Remote Management 11.4 The Telnet Screen Use this screen to configure your ZyXEL Device for remote Telnet access. You can use Telnet to access the ZyXEL Devices Command Line Interface (CLI). Click REMOTE MGNT > TELNET. The following screen displays. Figure 50 Remote Management: Telnet The following table describes the labels in this screen. Table 29 Remote Management: Telnet LABEL TELNET DESCRIPTION Server Port Server Access Secured Client IP Address Secured Client MAC Address Apply Reset You can change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Select the interface(s) through which a computer may access the ZyXEL Device using Telnet. A secured client is a trusted computer that is allowed to communicate with the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the IP address that you specify to access the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the MAC address that you specify to access the ZyXEL Device using this service. Click Apply to save your customized settings and exit this screen. Click Reset to begin configuring this screen afresh. 11.5 The FTP Screen Use this screen to upload and download the ZyXEL Devices firmware using FTP. To use this feature, your computer must have an FTP client. To change your ZyXEL Devices FTP settings, click REMOTE MGMT > FTP. The following screen displays. 104 ZyXEL NWA-1100 Users Guide Figure 51 Remote Management: FTP Chapter 11 Remote Management The following table describes the labels in this screen. Table 30 Remote Management: FTP LABEL Server Port DESCRIPTION You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Select the interface(s) through which a computer may access the ZyXEL Device using this service. A secured client is a trusted computer that is allowed to communicate with the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the IP address that you specify to access the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the MAC address that you specify to access the ZyXEL Device using this service. Click Apply to save your customized settings and exit this screen. Click Reset to begin configuring this screen afresh. Server Access Secured Client IP Address Secured Client MAC Address Apply Reset 11.6 The WWW Screen Use this screen to configure your ZyXEL Device via the World Wide Web (WWW) using a Web browser. This lets you specify which IP addresses or computers are able to communicate with and access the ZyXEL Device. To change your ZyXEL Devices WWW settings, click REMOTE MGNT > WWW. The following screen shows. ZyXEL NWA-1100 Users Guide 105 Chapter 11 Remote Management Figure 52 Remote Management: WWW The following table describes the labels in this screen. Table 31 Remote Management: WWW LABEL WWW Server Port DESCRIPTION Server Access Secured Client IP Address Secured Client MAC Address Apply Reset You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Select the interface(s) through which a computer may access the ZyXEL Device using this service. A secured client is a trusted computer that is allowed to communicate with the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the IP address that you specify to access the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the MAC address that you specify to access the ZyXEL Device using this service. Click Apply to save your customized settings and exit this screen. Click Reset to begin configuring this screen afresh. 11.7 The SNMP Screen Use this screen to have a manager station administrate your ZyXEL Device over the network. To change your ZyXEL Devices SNMP settings, click REMOTE MGMT > SNMP. The following screen displays. 106 ZyXEL NWA-1100 Users Guide Figure 53 Remote Management: SNMP Chapter 11 Remote Management The following table describes the labels in this screen. Table 32 Remote Management: SNMP LABEL SNMP Configuration Get Community DESCRIPTION Set Community Trap Destination Trap Community Configure SNMPv3 User Profile SNMP Service Port Service Access Secured Client IP Address Enter the Get Community, which is the password for the incoming Get and GetNext requests from the management station. The default is public and allows all requests. Enter the Set community, which is the password for incoming Set requests from the management station. The default is public and allows all requests. Type the IP address of the station to send your SNMP traps to. Type the trap community, which is the password sent with each trap to the SNMP manager. The default is public and allows all requests. This field is available only when SNMPv1 or SNMPv2 is selected in the SNMP Version field. Click this to go to the SNMPv3 User Profile screen, where you can configure administration and user login details. You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Select the interface(s) through which a computer may access the ZyXEL Device using this service. A secured client is a trusted computer that is allowed to communicate with the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the IP address that you specify to access the ZyXEL Device using this service. ZyXEL NWA-1100 Users Guide 107 Chapter 11 Remote Management Table 32 Remote Management: SNMP LABEL Secured Client MAC Address DESCRIPTION Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the MAC address that you specify to access the ZyXEL Device using this service. Click Apply to save your customized settings and exit this screen. Click Reset to begin configuring this screen afresh. Apply Reset 11.8 Technical Reference This section provides some technical background information about the topics covered in this chapter. 11.8.1 MIB Managed devices in an SMNP managed network contain object variables or managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.SNMP itself is a simple request/response protocol based on the manager/agent model. The manager issues a request and the agent returns responses using the following protocol operations:
Get - Allows the manager to retrieve an object variable from the agent. GetNext - Allows the manager to retrieve the next object variable from a table or list within an agent. In SNMPv1, when a manager wants to retrieve all elements of a table from an agent, it initiates a Get operation, followed by a series of GetNext operations. Set - Allows the manager to set values for object variables within an agent. Trap - Used by the agent to inform the manager of some events. 11.8.2 Supported MIBs The ZyXEL Device supports MIB II that is defined in RFC-1213 and RFC-1215 as well as the proprietary ZyXEL private MIB. The purpose of the MIBs is to let administrators collect statistical data and monitor status and performance. 11.8.3 SNMP Traps SNMP traps are messages sent by the agents of each managed device to the SNMP manager. These messages inform the administrator of events in data networks handled by the device. The ZyXEL Device can send the following traps to the SNMP manager. Table 33 SNMP Traps TRAP NAME Generic Traps coldStart OBJECT IDENTIFIER #
(OID) DESCRIPTION 1.3.6.1.6.3.1.1.5.1 This trap is sent after booting (power on). This trap is defined in RFC-1215. 108 ZyXEL NWA-1100 Users Guide Table 33 SNMP Traps TRAP NAME warmStart OBJECT IDENTIFIER #
(OID) 1.3.6.1.6.3.1.1.5.2 linkDown 1.3.6.1.6.3.1.1.5.3 linkUp authenticationFailure
(defined in RFC-1215) 1.3.6.1.6.3.1.1.5.4 1.3.6.1.6.3.1.1.5.5 Chapter 11 Remote Management DESCRIPTION This trap is sent after booting (software reboot). This trap is defined in RFC-1215. This trap is sent when the Ethernet link is down. This trap is sent when the Ethernet link is up. The device sends this trap when it receives any SNMP get or set requirements with the wrong community (password). Note: snmpEnableAuthenTraps, OID 1.3.6.1.2.1.11.30 (defined in RFC 1214 and RFC 1907) must be enabled on in order for the device to send authenticationFailure traps. Use a MIB browser to enable or disable snmpEnableAuthenTraps. Traps defined in the ZyXEL Private MIB. whyReboot 1.3.6.1.4.1.890.1.5.13.0.1 This trap is sent with the reason for restarting before the system reboots (warm start).
"System reboot by user!" is added for an intentional reboot (for example, download new files, CI command "sys reboot"). If the system reboots because of fatal errors, a code for the error is listed. This trap is sent to indicate the status and result of a TFTP client session that has ended. pwTFTPStatus 1.3.6.1.4.1.890.1.9.2.3.3. 1 Some traps include an SNMP interface index. The following table maps the SNMP interface indexes to the ZyXEL Devices physical and virtual ports. Table 34 SNMP Interface Index to Physical and Virtual Port Mapping TYPE Physical Virtual INTERFACE enet0 enet1 enet2 enet3 ~ enet9 enet10 ~ enet16 enet17 ~ enet21 enet22 ~ enet26 PORT Wireless LAN adaptor WLAN1 Ethernet port (LAN) Wireless LAN adaptor WLAN2 WLAN1 in MBSSID mode WLAN2 in MBSSID mode WLAN1 in WDS mode WLAN2 in WDS mode ZyXEL NWA-1100 Users Guide 109 Chapter 11 Remote Management 110 ZyXEL NWA-1100 Users Guide CHAPTER 12 Certificate Screen 12.1 Overview This chapter describes how your ZyXEL Device can use certificates as a means of authenticating wireless clients. It gives background information about public-key certificates and explains how to use them. A certificate contains the certificate owners identity and public key. Certificates provide a way to exchange public keys for use in authentication. Figure 54 Certificates Example In the figure above, the ZyXEL Device (Z) checks the identity of the notebook (A) using a certificate before granting access to the network. 12.2 What You Can Do in the Certificate Screen Use the CERTIFICATES > Certificate screen (seen Section 12.4 on page 112) to view, delete and import certificates. 12.3 What You Need To Know About Certificates The certification authority certificate that you can import to your ZyXEL Device should be in PFX PKCS#12 file format. This format referred to as the Personal Information Exchange Syntax Standard is comprised of a private key-public certificate pair that is further encrypted with a password. Before you import a certificate into the ZyXEL Device, you should verify that you have the correct certificate. Key distribution is simple and very secure since you can freely distribute public keys and you never need to transmit private keys. ZyXEL NWA-1100 Users Guide 111 Chapter 12 Certificate Screen 12.4 Certificate Screen Use this screen to view, delete and import certificates. Click CERTIFICATE to open the ZyXEL Devices summary list of certificates and to import a new certificate. See the following figure. Figure 55 Certificate The following table describes the labels in this screen. Table 35 Certificate LABEL Delete Certificate DESCRIPTION You can delete a certificate Delete Import Certificate File Path Browse Import Select the certificate from the list that you want to delete. Click this to delete the selected certificate. Enter the location of a previously-saved certificate to upload to the ZyXEL Device. Alternatively, click the Browse button to locate a list. Click this button to locate a previously-saved certificate to upload to the ZyXEL Device. Click this button to upload the previously-saved certificate displayed in the File Path field to the ZyXEL Device. 12.5 Technical Reference This section provides technical background information about the topics covered in this chapter. 112 ZyXEL NWA-1100 Users Guide Chapter 12 Certificate Screen 12.5.1 Private-Public Certificates When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure. These keys work like a handwritten signature (in fact, certificates are often referred to as digital signatures). Only you can write your signature exactly as it should look. When people know what your signature looks like, they can verify whether something was signed by you, or by someone else. In the same way, your private key writes your digital signature and your public key allows people to verify whether data was signed by you, or by someone else. This process works as follows. 1 Tim wants to send a message to Jenny. He needs her to be sure that it comes from him, and that the message content has not been altered by anyone else along the way. Tim generates a public key pair (one public key and one private key). 2 Tim keeps the private key and makes the public key openly available. This means that anyone who receives a message seeming to come from Tim can read it and verify whether it is really from him or not. 3 Tim uses his private key to sign the message and sends it to Jenny. 4 Jenny receives the message and uses Tims public key to verify it. Jenny knows that the message is from Tim, and that although other people may have been able to read the message, no-one can have altered it (because they cannot re-sign the message with Tims private key). 5 Additionally, Jenny uses her own private key to sign a message and Tim uses Jennys public key to verify the message. 12.5.2 Certification Authorities A Certification Authority (CA) issues certificates and guarantees the identity of each certificate owner. There are commercial certification authorities like CyberTrust or VeriSign and government certification authorities. You can use the ZyXEL Device to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority. 12.5.3 Checking the Fingerprint of a Certificate on Your Computer A certificates fingerprints are message digests calculated using the MD5 or SHA1 algorithms. The following procedure describes how to check a certificates fingerprint to verify that you have the actual certificate. 1 Browse to where you have the certificate saved on your computer. 2 Make sure that the certificate has a .cer or .crt file name extension. Figure 56 Certificates on Your Computer ZyXEL NWA-1100 Users Guide 113 Chapter 12 Certificate Screen 3 Double-click the certificates icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Figure 57 Certificate Details 4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may vary according to your situation. Possible examples would be over the telephone or through an HTTPS connection. 114 ZyXEL NWA-1100 Users Guide CHAPTER 13 Log Screens 13.1 Overview This chapter provides information on viewing and generating logs on your ZyXEL Device. Logs are files that contain recorded network activity over a set period. They are used by administrators to monitor the health of the system(s) they are managing. Logs enable administrators to effectively monitor events, errors, progress, etc. so that when network problems or system failures occur, the cause or origin can be traced. Logs are also essential for auditing and keeping track of changes made by users. Figure 58 Accessing Logs in the Network The figure above illustrates three ways to access logs. The user (U) can access logs directly from the ZyXEL Device (A) via the Web configurator. Logs can also be located in an external log server (B). An email server (C) can also send harvested logs to the users email account. 13.2 What You Can Do in the Log Screens Use the View Log screen (Section 13.4 on page 116) to display all logs or logs for a certain category. You can view logs and alert messages in this page. Once the log entries are all used, the log will wrap around and the old logs will be deleted. Use the Log Settings screen (Section 13.5 on page 117) to configure where and when the ZyXEL Device will send the logs, and which logs and/or immediate alerts it will send. ZyXEL NWA-1100 Users Guide 115 Chapter 13 Log Screens 13.3 What You Need To Know About Logs Alerts and Logs An alert is a type of log that warrants more serious attention. Some categories such as System Errors consist of both logs and alerts. You can differentiate them by their color in the View Log screen. Alerts are displayed in red and logs are displayed in black. Receiving Logs via E-mail If you want to receive logs in your e-mail account, you need to have the necessary details ready, such as the Server Name or Simple Mail Transfer Protocol (SMTP) Address of your e-
mail account. Ensure that you have a valid e-mail address. Enabling Syslog Logging To enable Syslog Logging, obtain your Syslog servers IP address (or server name). 13.4 View Log Screen Use this screen to view all the ZyXEL Devices logs in one location. Click Logs > View Log. Use the View Log screen to see the logs for the categories that you selected in the Log Settings screen (see Figure 60 on page 117). Options include logs about system maintenance, system errors and access control. Click a column heading to sort the entries. A triangle indicates the direction of the sort order. Figure 59 View Log The following table describes the labels in this screen. Table 36 View Log LABEL Time Source DESCRIPTION This field displays the time the log was recorded. This field lists the source IP address and the port number of the incoming packet. This field states the reason for the log. Click Refresh to renew the log screen. Click Clear Log to clear all the logs. Message Refresh Clear Log 116 ZyXEL NWA-1100 Users Guide Chapter 13 Log Screens 13.5 Log Settings Screen Use this screen to configure to where and when the ZyXEL Device is to send the logs and which logs and/or immediate alerts it is to send. To change your ZyXEL Devices log settings, click LOGS > Log Settings. The screen appears as shown. Figure 60 Log Settings The following table describes the labels in this screen. Table 37 Log Settings LABEL Address Info DESCRIPTION Mail Server Mail Subject Send Log to SMTP Authentication Enter the server name or the IP address of the mail server for the e-mail addresses specified below. If this field is left blank, logs and alert messages will not be sent via e-mail. Type a title that you want to be in the subject line of the log e-mail message that the ZyXEL Device sends. Logs are sent to the e-mail address specified in this field. If this field is left blank, logs will not be sent via e-mail. If you use SMTP authentication, the mail receiver should be the owner of the SMTP account. ZyXEL NWA-1100 Users Guide 117 Chapter 13 Log Screens Table 37 Log Settings LABEL User Name Password Syslog Logging DESCRIPTION If your e-mail account requires SMTP authentication, enter the username here. Enter the password associated with the above username. Syslog logging sends a log to an external syslog server used to store logs. Click Active to enable syslog logging. Active Syslog IP Address Enter the IP address of the syslog server that will log the selected categories of logs. Enter the port number of the syslog server that will log the selected categories of logs. Syslog Port Number Send Log Log Schedule Day for Sending Log Time for Sending Log Clear log after sending mail Email log now Log System Maintenance System Errors 802.1x Wireless Apply Reset This drop-down menu is used to configure the frequency of log messages being sent as E-mail:
Daily Weekly Hourly When Log is Full None. If the Weekly or the Daily option is selected, specify a time of day when the E-mail should be sent. If the Weekly option is selected, then also specify which day of the week the E-mail should be sent. If the When Log is Full option is selected, an alert is sent when the log fills up. If you select None, no log messages are sent. This field is only available when you select Weekly in the Log Schedule field. Use the drop down list box to select which day of the week to send the logs. Enter the time of the day in 24-hour format (for example 23:00 equals 11:00 pm) to send the logs. Select the check box to clear all logs after logs and alert messages are sent via e-mail. Select the categories of alerts for which you want the ZyXEL Device to immediately send e-mail alerts. Click this to receive logs related to system maintenance. Click this to receive logs related to system errors. Click this to receive logs related to the 802.1x mode. Click this to receive logs related to the wireless function. Click Apply to save your customized settings and exit this screen. Click Reset to reconfigure all the fields in this screen. 13.6 Technical Reference This section provides some technical background information about the topics covered in this chapter. 118 ZyXEL NWA-1100 Users Guide 13.6.1 Example Log Messages Chapter 13 Log Screens The following tables provide descriptions of some example log messages that the ZyXEL Device generates. Table 38 System Maintenance Logs LOG MESSAGE WLAN: Radar interference 2412 MHz. WLAN: CW interference 2412 MHz. WLAN service started. WLAN service stopped. AP MIC failed. AP MIC attacked. Station authenticated. DESCRIPTION Wireless driver receives radar pulse at center frequency 2412 MHz. Wireless driver receives noise interference pulse at center frequency 2412 MHz. Wireless port ath0 started. Wireless port ath0 stopped. Wireless driver MIC checked failed. Wireless driver received MIC attack packet. AP received the request for authentication from station and authenticated the station successfully. AP received the request for authentication from station but the authentication failed. Station authentication failed. Station deauthenticated. AP receive the deauthenticated packet from the STA which Station associated. Station disassociated. Station refused. Remote Bridge AP configured. Remote Bridge AP deleted. CLI: Authorized user from IP. CLI: Unauthorized user from IP. WEB: Authorized user from IP. WEB: Unauthorized user from IP. connected with AP. AP receive the association request packet from the STA which connected with AP. AP receive the disassociation request packet from the STA, which connected with AP. A STA wanted to connect to the AP but was refused. Remote AP MAC address was configured. Remote AP MAC address was deleted. A device succesfully logs into the AP via Telnet (the devices IP address shows in the log message.) A device fails to log into the AP via Telnet (the devices IP address shows in the log message.) A device successfully logs into the AP via WWW (the devices IP address shows in the log message.) A device fails to log into the AP via WWW (the devices IP address shows in the log message.) 13.7 Log Commands Go to the command interpreter interface (refer to Appendix I on page 187 for the Command Interpreter appendix explains how to access and use the commands). 13.7.1 Configuring What You Want the ZyXEL Device to Log Use the sys logs load command to load the log setting buffer that allows you to configure which logs the ZyXEL Device is to record. ZyXEL NWA-1100 Users Guide 119 Chapter 13 Log Screens Use sys logs category followed by a log category and a parameter to decide what to record Table 39 Log Categories and Available Settings LOG CATEGORIES error mten Use 0 to not record logs for that category, 1 to record only logs for that category, 2 to record only alerts for that category, and 3 to record both logs and alerts for that category. Use the sys logs save command to store the settings in the ZyXEL Device (you must do this in order to record logs). AVAILABLE PARAMETERS 0, 1, 2, 3 0, 1 13.7.2 Displaying Logs Use the sys logs display command to show all of the logs in the ZyXEL Devices log. Use the sys logs category display command to show the log settings for all of the log categories. Use the sys logs display [log category] command to show the logs in an individual ZyXEL Device log category. Use the sys logs clear command to erase all of the ZyXEL Devices logs. 13.7.3 Command List The following table provides the commands that can be used for your ZyXEL Device to configure the log settings. Table 40 Log Command List KEYWORD client ipaddr port Email server Email subject Email Address Email SmtpAuthEnable Email User Email Password Email Schedule Email Day Email Hour Email Minute Email Clear Email Now DESCRIPTION Enable SYSLOG client SYSLOG server IP address SYSLOG server port E-mail server address E-mail subject E-mail address SMPTP auth enable when e-mail log E-mail user name E-mail password E-mail schedule mode E-mail schedule day E-mail schedule hour E-mail schedule minute Clear log after e-mail Send e-mail now 120 ZyXEL NWA-1100 Users Guide CHAPTER 14 Maintenance 14.1 Overview This chapter describes the maintenance screens. It discusses how you can view the association list and channel usage, upload new firmware, manage configuration and restart your ZyXEL Device without turning it off and on. 14.2 What You Can Do in the Maintenance Screens Use the Association List screen (see Section 14.4 on page 121) to view the wireless stations that are currently associated with the ZyXEL Device. Use the Channel Usage screen (see Section 14.5 on page 122) to view whether a channel is used by another wireless network or not. If a channel is being used, you should select a channel removed from it by five channels to completely avoid overlap. Use the F/W Upload screen (see Section 14.6 on page 123) to upload the latest firmware for your ZyXEL Device. Use the Configuration screen (see Section 14.7 on page 124) to view information related to factory defaults, backup configuration, and restoring configuration. Use Restart screen (see Section 14.8 on page 127) to reboot the ZyXEL Device without turning the power off. 14.3 What You Need To Know About the Maintenance Screens You can find the firmware for your device at www.zyxel.com. It is a file that (usually) uses the system model name with a "*.bin" extension, for example "NWA-1100.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. 14.4 Association List Screen Use this screen to view the wireless stations that are currently associated with the ZyXEL Device. Click Maintenance > Association List. The following screen displays. ZyXEL NWA-1100 Users Guide 121 Chapter 14 Maintenance Figure 61 Association List The following table describes the labels in this screen. Table 41 Association List LABEL
MAC Address IP Address Association Time DESCRIPTION This is the index number of an associated wireless station. This field displays the MAC address of an associated wireless station. This identifies the individual devices on a network. This field displays the time a wireless station first associated with the ZyXEL Device. This field displays the RSSI (Received Signal Strength Indicator) of the wireless connection. Click Rescan to reload the screen. Signal Strength Rescan 14.5 Channel Usage Screen Use this screen to know whether a channel is used by another wireless network or not. If a channel is being used, you should select a channel removed from it by five channels to completely avoid overlap. Click Maintenance > Channel Usage to display the screen shown next. Wait a moment while the ZyXEL Device compiles the information. Figure 62 Channel Usage 122 ZyXEL NWA-1100 Users Guide Chapter 14 Maintenance The following table describes the labels in this screen. Table 42 Channel Usage LABEL SSID DESCRIPTION This is the Service Set IDentification name of the AP in an Infrastructure wireless network or wireless station in an Ad-Hoc wireless network. For our purposes, we define an Infrastructure network as a wireless network that uses an AP and an Ad-Hoc network (also known as Independent Basic Service Set
(IBSS)) as one that doesnt. See the chapter on wireless configuration for more information on basic service sets (BSS) and extended service sets (ESS). This field displays the MAC address of the AP in an Infrastructure wireless network. It is randomly generated (so ignore it) in an Ad-Hoc wireless network. This is the index number of the channel currently used by the associated AP in an Infrastructure wireless network or wireless station in an Ad-Hoc wireless network. This is the IEEE 802.1x standard used by your ZyXEL Device to apply enhanced security methods for both the authentication of wireless stations and encryption key management. This is the wireless security method used by your ZyXEL Device protect wireless communication between wireless stations, access points and the wired network. Click Restart to reload the screen. BSSID Channel Wireless Mode Security Restart 14.6 F/W Upload Screen Use this screen to upload a firmware to your ZyXEL Device. Click Maintenance > F/W Upload. Follow the instructions in this section to upload firmware to your ZyXEL Device. Figure 63 Firmware Upload The following table describes the labels in this screen. Table 43 Firmware Upload LABEL File Path DESCRIPTION Type in the location of the file you want to upload in this field or click Browse ... to find it. Click Browse... to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Click Upload to begin the upload process. This process may take up to two minutes. Browse... Upload ZyXEL NWA-1100 Users Guide 123 Chapter 14 Maintenance
Do not turn off the ZyXEL Device while firmware upload is in progress!
After you see the Firmware Upload in Process screen, wait two minutes before logging into the ZyXEL Device again. Figure 64 Firmware Upload In Process The ZyXEL Device automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 65 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen. If the upload was not successful, the following screen will appear. Click Return to go back to the F/W Upload screen. Figure 66 Firmware Upload Error 14.7 Configuration Screen Use this screen to backup, restore and reset the configuration of your ZyXEL Device. Click Maintenance > Configuration. The screen appears as shown next. 124 ZyXEL NWA-1100 Users Guide Figure 67 Configuration Chapter 14 Maintenance 14.7.1 Backup Configuration Backup configuration allows you to back up (save) the ZyXEL Devices current configuration to a file on your computer. Once your ZyXEL Device is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings. Click Backup to save the ZyXEL Devices current configuration to your computer. 14.7.2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your ZyXEL Device. Table 44 Restore Configuration LABEL File Path DESCRIPTION Type in the location of the file you want to upload in this field or click Browse ... to find it. Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them. Click Upload to begin the upload process. Browse... Upload
Do not turn off the ZyXEL Device while configuration file upload is in progress. ZyXEL NWA-1100 Users Guide 125 Chapter 14 Maintenance After you see a restore configuration successful screen, you must then wait one minute before logging into the ZyXEL Device again. Figure 68 Configuration Upload Successful The ZyXEL Device automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 69 Network Temporarily Disconnected If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default ZyXEL Device IP address
(192.168.1.2). See your Quick Start Guide for details on how to set up your computers IP address. If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration screen. Figure 70 Configuration Upload Error 14.7.3 Back to Factory Defaults Pressing the Reset button in this section clears all user-entered configuration information and returns the ZyXEL Device to its factory defaults as shown on the screen. The following warning screen will appear. 126 ZyXEL NWA-1100 Users Guide Figure 71 Reset Warning Message Chapter 14 Maintenance You can also press the RESET button to reset your ZyXEL Device to its factory default settings. Refer to Section 2.2 on page 36 for more information. 14.8 Restart Screen Use this screen to reboot the ZyXEL Device without turning the power off. Click Maintenance > Restart. The following screen displays. Figure 72 Restart Screen Click Restart to have the ZyXEL Device reboot. This does not affect the ZyXEL Device's configuration. ZyXEL NWA-1100 Users Guide 127 Chapter 14 Maintenance 128 ZyXEL NWA-1100 Users Guide CHAPTER 15 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. Power, Hardware Connections, and LEDs ZyXEL Device Access and Login Internet Access 15.1 Power, Hardware Connections, and LEDs
The ZyXEL Device does not turn on. None of the LEDs turn on. 1 Make sure you are using the power adaptor or cord included with the ZyXEL Device. 2 Make sure the power adaptor or cord is connected to the ZyXEL Device and plugged in to an appropriate power source. Make sure the power source is turned on. 3 Disconnect and re-connect the power adaptor or cord to the ZyXEL Device. 4 If the problem continues, contact the vendor.
One of the LEDs does not behave as expected. 1 Make sure you understand the normal behavior of the LED. See Section 1.7 on page 32. 2 Check the hardware connections. See the Quick Start Guide. 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adaptor to the ZyXEL Device. 5 If the problem continues, contact the vendor. 15.2 ZyXEL Device Access and Login
I forgot the IP address for the ZyXEL Device. ZyXEL NWA-1100 Users Guide 129 Chapter 15 Troubleshooting 1 The default IP address is 192.168.1.2. 2 If you changed the IP address and have forgotten it, you might get the IP address of the ZyXEL Device by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig. The IP address of the Default Gateway might be the IP address of the ZyXEL Device (it depends on the network), so enter this IP address in your Internet browser. 3 If this does not work, you have to reset the device to its factory defaults. See Section 2.2 on page 36.
I forgot the password. 1 The default password is 1234. 2 If this does not work, you have to reset the device to its factory defaults. See Section 2.2 on page 36.
I cannot see or access the Login screen in the web configurator. 1 Make sure you are using the correct IP address. The default IP address is 192.168.1.2. If you changed the IP address (Section 10.4 on page 98), use the new IP address. If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the ZyXEL Device. 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.7 on page 32. 3 Make sure your Internet browser does not block pop-up windows and has JavaScripts and Java enabled. See Section 15.1 on page 129. 4 Make sure your computer is in the same subnet as the ZyXEL Device. (If you know that there are routers between your computer and the ZyXEL Device, skip this step.) If there is no DHCP server on your network, make sure your computers IP address is in the same subnet as the ZyXEL Device. 5 Reset the device to its factory defaults, and try to access the ZyXEL Device with the default IP address. See your Quick Start Guide. 6 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestions Try to access the ZyXEL Device using another service, such as Telnet. If you can access the ZyXEL Device, check the remote management settings to find out why the ZyXEL Device does not respond to HTTP. If your computer is connected to the WAN port or is connected wirelessly, use a computer that is connected to a LAN/ETHERNET port. 130 ZyXEL NWA-1100 Users Guide
I can see the Login screen, but I cannot log in to the ZyXEL Device. Chapter 15 Troubleshooting 1 Make sure you have entered the user name and password correctly. The default password is 1234. This fields are case-sensitive, so make sure [Caps Lock] is not on. 2 You cannot log in to the web configurator while someone is using the Telnet to access the ZyXEL Device. Log out of the ZyXEL Device in the other session, or ask the person who is logged in to log out. 3 Disconnect and re-connect the power adaptor or cord to the ZyXEL Device. 4 If this does not work, you have to reset the device to its factory defaults. See Section 2.2 on page 36.
I cannot use FTP to upload new firmware. See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser. 15.3 Internet Access
I cannot access the Internet. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 15.1 on page 129. 2 2. Make sure your ZyXEL Device is connected to a networking device that provides Internet access. 3 If you are trying to access the Internet wirelessly, make sure the wireless settings on the wireless client are the same as the settings on the AP. 4 Disconnect all the cables from your device, and follow the directions in the Quick Start Guide again. 5 If the problem continues, contact your ISP.
I cannot access the Internet anymore. I had access to the Internet (with the ZyXEL Device), but my Internet connection is not available anymore. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.7 on page 32. 2 Reboot the ZyXEL Device. ZyXEL NWA-1100 Users Guide 131 Chapter 15 Troubleshooting 3 If the problem continues, contact your ISP or network administrator.
The Internet connection is slow or intermittent. 1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.7 on page 32. If the ZyXEL Device is sending or receiving a lot of information, try closing some programs that use the Internet, especially peer-to-peer applications. 2 Check the signal strength. If the signal is weak, try moving the ZyXEL Device (in wireless client mode) closer to the AP (if possible), and look around to see if there are any devices that might be interfering with the wireless network (microwaves, other wireless networks, and so on). 3 Reboot the ZyXEL Device. 4 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestions Check the settings for QoS. If it is disabled, you might consider activating it. 132 ZyXEL NWA-1100 Users Guide PART III Appendices and Index Product Specifications (135) Power over Ethernet (PoE) Specifications (137) Power Adaptor Specifications (139) Setting up Your Computers IP Address (141) Wireless LANs (153) Pop-up Windows, JavaScripts and Java Permissions (167) IP Addresses and Subnetting (173) Text File Based Auto Configuration (181) How to Access and Use the CLI (187) Legal Information (191) Customer Support (195) Index (201) 133 134 APPENDIX A Product Specifications The following tables summarize the ZyXEL Devices hardware and firmware features. Table 45 Hardware Specifications Power Specification Reset button Ethernet Port 12 V DC, 1 A Returns all settings to their factory defaults. Auto-negotiating: 10 Mbps or 100 Mbps in either half-duplex or full-
Auto-crossover: Use either crossover or straight-through Ethernet duplex mode. cables. Power over Ethernet
(PoE) Antenna Operation Temperature Storage Temperature Operation Humidity Storage Humidity Dimensions IEEE 802.3af compliant. SMA antenna connectors, equipped by default with 3dBi omni antenna, 60 0 ~ 50 C
-30 ~ 60 C 20 ~ 90 % (non-condensing) 10 ~ 90 % (non-condensing) 152mm x 92mm x 45mm Table 46 Firmware Specifications Default IP Address Default Subnet Mask Default Password Wireless LAN Standards Wireless security STP (Spanning Tree Protocol) / RSTP (Rapid STP) WMM QoS Certificates 192.168.1.2 255.255.255.0 (24 bits) 1234 IEEE 802.11b, IEEE 802.11g WEP, WPA(2), WPA(2)-PSK, 802.1x
(R)STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a bridge to interact with other (R)STP-compliant bridges in your network to ensure that only one path exists between any two stations on the network. WMM (Wi-Fi MultiMedia) QoS (Quality of Service) allows you to prioritize wireless traffic. The ZyXEL Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. Certificates provide a way to exchange public keys for use in authentication. ZyXEL NWA-1100 Users Guide 135 Appendix A Product Specifications Table 46 Firmware Specifications SSL Passthrough MAC Address Filter Wireless Association List Logging and Tracing Embedded FTP and TFTP Servers Auto Configuration SNMP SSL (Secure Sockets Layer) uses a public key to encrypt data that's transmitted over an SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https instead of http. The ZyXEL Device allows SSL connections to take place through the ZyXEL Device. Your ZyXEL Device checks the MAC address of the wireless station against a list of allowed or denied MAC addresses. With the wireless association list, you can see the list of the wireless stations that are currently using the ZyXEL Device to access your wired network. Built-in message logging and packet tracing. The embedded FTP and TFTP servers enable fast firmware upgrades as well as configuration file backups and restoration. Administrators can use text configuration files to configure the wireless LAN settings for multiple APs. The AP can automatically get a configuration file from a TFTP server at start up or after renewing DHCP client information. SNMP (Simple Network Management Protocol) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your ZyXEL Device supports SNMP agent functionality, which allows a manger station to manage and monitor the ZyXEL Device through the network. The ZyXEL Device supports SNMP version one (SNMPv1) and version two c (SNMPv2c). 136 ZyXEL NWA-1100 Users Guide APPENDIX B Power over Ethernet (PoE) Specifications You can use a power over Ethernet injector to power this device. The injector must comply to IEEE 802.3af.-7 Table 47 Power over Ethernet Injector Specifications Power Output Power Current 15.4 Watts maximum 400 mA maximum Table 48 Power over Ethernet Injector RJ-45 Port Pin Assignments 1 2 3 4 5 6 7 8 PIN NO 1 2 3 4 5 6 7 8 RJ-45 SIGNAL ASSIGNMENT Output Transmit Data +
Output Transmit Data -
Receive Data +
Power +
Power +
Receive Data -
Power -
Power -
ZyXEL NWA-1100 Users Guide 137 Appendix B Power over Ethernet (PoE) Specifications 138 ZyXEL NWA-1100 Users Guide APPENDIX C Power Adaptor Specifications Table 49 North American Plug Standards AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards Table 50 European Plug Standards AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards Table 51 United Kingdom Plug Standards AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards ADS6818-1812-W 1215 100~240 Volts AC, 50~60 Hz, 0.5 A 12 Volts DC, 1.5A, 18W 6 W Max UL, CUL (UL60950 Third Edition, CSA C22.2 No. 60950) ADS6818-1812-B 1215 100~240 Volts AC, 50~60 Hz, 0.5 A 12 Volts DC, 1.5 A, 18 W 6 W Max TUV-GS, CE (EN 60950) ADS6818-1812-D 1215 100~240 Volts AC, 50~60 Hz,0.5 A 12 Volts DC, 1.5 A, 18 W 6 W Max TUV-GS (BS EN 60950) Table 52 Australia and New Zealand Plug Standards AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards ADS6818-1812-A 1215 100~240 Volts AC, 50~60 Hz, 0.5 A 12 Volts DC, 1.5 A, 18 W 6 W Max DOFT (AS/NZS 60950, AS/NZSB 3112:1-2) ZyXEL NWA-1100 Users Guide 139 Appendix C Power Adaptor Specifications 140 ZyXEL NWA-1100 Users Guide
1 | Installation guide III | Users Manual | 2.76 MiB |
D APPENDIX Setting up Your Computers IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/
IP on your computer. Windows 3.1 requires the purchase of a third-party TCP/IP application package. TCP/IP should already be installed on computers using Windows NT/2000/XP, Macintosh OS 7 and later operating systems. After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the ZyXEL Devices LAN port. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window ZyXEL NWA-1100 Users Guide 141 Appendix D Setting up Your Computers IP Address Figure 73 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter:
1 In the Network window, click Add. 2 Select Adapter and then click Add. 3 Select the manufacturer and model of your network adapter and then click OK. If you need TCP/IP:
1 In the Network window, click Add. 2 Select Protocol and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select TCP/IP from the list of network protocols and then click OK. If you need Client for Microsoft Networks:
1 Click Add. 2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click OK. 5 Restart your computer so the changes you made take effect. 142 ZyXEL NWA-1100 Users Guide Configuring Appendix D Setting up Your Computers IP Address 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. If your IP address is dynamic, select Obtain an IP address automatically. If you have a static IP address, select Specify an IP address and type your information into the IP Address and Subnet Mask fields. Figure 74 Windows 95/98/Me: TCP/IP Properties: IP Address 3 Click the DNS Configuration tab. If you do not know your DNS information, select Disable DNS. If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). ZyXEL NWA-1100 Users Guide 143 Appendix D Setting up Your Computers IP Address Figure 75 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. If you do not know your gateways IP address, remove previously installed gateways. If you have a gateway IP address, type it in the New gateway field and click Add. 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your ZyXEL Device and restart your computer when prompted. Verifying Settings 1 Click Start and then Run. 2 In the Run window, type "winipcfg" and then click OK to open the IP Configuration 3 Select your network adapter. You should see your computer's IP address, subnet mask window. and default gateway. Windows 2000/NT/XP 1 For Windows XP, click start, Control Panel. In Windows 2000/NT, click Start, Settings, Control Panel. 144 ZyXEL NWA-1100 Users Guide Appendix D Setting up Your Computers IP Address Figure 76 Windows XP: Start Menu 2 For Windows XP, click Network Connections. For Windows 2000/NT, click Network and Dial-up Connections. Figure 77 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. ZyXEL NWA-1100 Users Guide 145 Appendix D Setting up Your Computers IP Address Figure 78 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties. Figure 79 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). If you have a dynamic IP address click Obtain an IP address automatically. If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. Click Advanced. 146 ZyXEL NWA-1100 Users Guide Appendix D Setting up Your Computers IP Address Figure 80 Windows XP: Advanced TCP/IP Settings 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses:
In the IP Settings tab, in IP addresses, click Add. In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add. Repeat the above two steps for each IP address you want to add. Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways. In TCP/IP Gateway Address, type the IP address of the default gateway in Gateway. To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric. Click Add. Repeat the previous three steps for each default gateway you want to add. Click OK when finished. 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP):
Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. ZyXEL NWA-1100 Users Guide 147 Appendix D Setting up Your Computers IP Address Figure 81 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click OK to close the Local Area Connection Properties window. 10 Turn on your ZyXEL Device and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab. Macintosh OS 8/9 1 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel. 148 ZyXEL NWA-1100 Users Guide Appendix D Setting up Your Computers IP Address Figure 82 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 83 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following:
From the Configure box, select Manually. ZyXEL NWA-1100 Users Guide 149 Appendix D Setting up Your Computers IP Address Type your IP address in the IP Address box. Type your subnet mask in the Subnet mask box. Type the IP address of your ZyXEL Device in the Router address box. 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration. 7 Turn on your ZyXEL Device and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the TCP/IP Control Panel window. Macintosh OS X 1 Click the Apple menu, and click System Preferences to open the System Preferences window. Figure 84 Macintosh OS X: Apple Menu 2 Click Network in the icon bar. Select Automatic from the Location list. Select Built-in Ethernet from the Show list. Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure list. 150 ZyXEL NWA-1100 Users Guide Appendix D Setting up Your Computers IP Address Figure 85 Macintosh OS X: Network 4 For statically assigned settings, do the following:
From the Configure box, select Manually. Type your IP address in the IP Address box. Type your subnet mask in the Subnet mask box. Type the IP address of your ZyXEL Device in the Router address box. 5 Click Apply Now and close the window. 6 Turn on your ZyXEL Device and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window. ZyXEL NWA-1100 Users Guide 151 Appendix D Setting up Your Computers IP Address 152 ZyXEL NWA-1100 Users Guide APPENDIX E Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS). The following diagram shows an example of notebook computers using wireless adapters to form an ad-hoc wireless LAN. Figure 86 Peer-to-Peer Communication in an Ad-hoc Network BSS A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless client A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. ZyXEL NWA-1100 Users Guide 153 Appendix E Wireless LANs Figure 87 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN. The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate neighborhood. An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. 154 ZyXEL NWA-1100 Users Guide Figure 88 Infrastructure WLAN Appendix E Wireless LANs Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference. Interference occurs when radio signals from different access points overlap causing interference and degrading performance. Adjacent channels partially overlap however. To avoid interference due to overlap, your AP should be on a channel at least five channels away from a channel that an adjacent AP is using. For example, if your region has 11 channels and an adjacent AP is using channel 1, then you need to select a channel between 6 or 11. RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node. Both stations (STA) are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. ZyXEL NWA-1100 Users Guide 155 Appendix E Wireless LANs Figure 89 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations. RTS/CTS is designed to prevent collisions due to hidden nodes. An RTS/CTS defines the biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send) handshake is invoked. When a data frame exceeds the RTS/CTS value you set (between 1 to 2432 bytes), the station that wants to transmit this frame must first send an RTS (Request To Send) message to the AP for permission to send it. The AP then responds with a CTS (Clear to Send) message to all other stations within its range to notify them to defer their transmission. It also reserves and confirms with the requesting station the time frame for the requested transmission. Stations can send frames smaller than the specified RTS/CTS directly to the AP without the RTS (Request To Send)/CTS (Clear to Send) handshake. You should only configure RTS/CTS if the possibility of hidden nodes exists on your network and the "cost" of resending large frames is more than the extra network overhead involved in the RTS (Request To Send)/CTS (Clear to Send) handshake. If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size.
Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy. 156 ZyXEL NWA-1100 Users Guide Appendix E Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver. Short and Long refer to the length of the synchronization field in a packet. Short preamble increases performance as less time sending preamble means more time for sending data. All IEEE 802.11b/g compliant wireless adapters support long preamble, but not all support short preamble. Select Long preamble if you are unsure what preamble mode the wireless adapters support, and to provide more reliable communications in busy wireless networks. Select Dynamic to have the AP automatically use short preamble when wireless adapters support it, otherwise the AP uses long preamble.
The AP and the wireless adapters MUST use the same preamble mode in order to communicate. IEEE 802.11g Wireless LAN IEEE 802.11g is fully compatible with the IEEE 802.11b standard. This means an IEEE 802.11b adapter can interface directly with an IEEE 802.11g access point (and vice versa) at 11 Mbps or lower depending on range. IEEE 802.11g has several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows:
Table 53 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 2 5.5 / 11 6/9/12/18/24/36/48/54 OFDM (Orthogonal Frequency Division Multiplexing) DBPSK (Differential Binary Phase Shift Keyed) DQPSK (Differential Quadrature Phase Shift Keying) CCK (Complementary Code Keying) ZyXEL NWA-1100 Users Guide 157 Appendix E Wireless LANs Wireless Security Overview Wireless security is vital to your network to protect wireless communication between wireless clients, access points and the wired network. Wireless security methods available on the ZyXEL Device are data encryption, wireless client authentication, restricting access by device MAC address and hiding the ZyXEL Device identity. The following figure shows the relative effectiveness of these wireless security methods available on your ZyXEL Device. Table 54 Wireless Security Levels SECURITY LEVEL Least Secure SECURITY TYPE Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication Wi-Fi Protected Access (WPA) WPA2 Most Secure
You must enable the same wireless security settings on the ZyXEL Device and on all wireless clients that you want to associate with it. IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are:
User based identification that allows for roaming. Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for centralized user profile and accounting management on a network RADIUS server. Support for EAP (Extensible Authentication Protocol, RFC 2486) that allows additional authentication methods to be deployed with no changes to the access point or the wireless clients. 158 ZyXEL NWA-1100 Users Guide Appendix E Wireless LANs RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The access point is the client and the server is the RADIUS server. The RADIUS server handles the following tasks:
Authentication Determines the identity of the users. Authorization Determines the network services available to authenticated users once they are connected to the network. Accounting Keeps track of the clients network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication:
Access-Request Sent by an access point requesting authentication. Access-Reject Sent by a RADIUS server rejecting access. Access-Accept Sent by a RADIUS server allowing access. Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting:
Accounting-Request Sent by the access point requesting accounting. Accounting-Response Sent by the RADIUS server to indicate that it has started or stopped accounting. In order to ensure network security, the access point and the RADIUS server use a shared secret key, which is a password, they both know. The key is not sent over the network. In addition to the shared key, password information exchanged is also encrypted to protect the network from unauthorized access. Types of EAP Authentication This section discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and LEAP. Your wireless LAN device may not support all authentication types. ZyXEL NWA-1100 Users Guide 159 Appendix E Wireless LANs EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that supports IEEE 802.1x. For EAP-TLS authentication type, you must first have a wired connection to the network and obtain the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs) can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client proves that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text. However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication. Finally, MD5 authentication method does not support data encryption with dynamic session key. You must configure WEP encryption keys for data encryption. EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by both the server and the wireless clients for mutual authentication. The server presents a certificate to the client. After validating the identity of the server, the client sends a different certificate to the server. The exchange of certificates is done in the open before a secured tunnel is created. This makes user identity vulnerable to passive attacks. A digital certificate is an electronic ID card that authenticates the senders identity. However, to implement EAP-TLS, you need a Certificate Authority (CA) to handle certificates, which imposes a management overhead. EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection. Client authentication is then done by sending username and password through the secure connection, thus client identity is protected. For client authentication, EAP-TTLS supports EAP methods and legacy authentication methods such as PAP, CHAP, MS-CHAP and MS-CHAP v2. PEAP (Protected EAP) Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection, then use simple username and password methods through the secured connection to authenticate the clients, thus hiding client identity. However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is implemented only by Cisco. 160 ZyXEL NWA-1100 Users Guide Appendix E Wireless LANs LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled.
EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical. The following table is a comparison of the features of authentication types. Table 55 Comparison of EAP Authentication Types EAP-TLS Yes Yes Yes Yes Strong Hard No Mutual Authentication Certificate Client Certificate Server Dynamic Key Exchange Credential Integrity Deployment Difficulty Client Identity Protection EAP-TTLS Yes Optional Yes Yes Strong Moderate Yes EAP-MD5 No No No No None Easy No LEAP Yes No No Yes Moderate Moderate No PEAP Yes Optional Yes Yes Strong Moderate Yes WPA and WPA2 Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA or WPA2 and WEP are improved data encryption and user authentication. ZyXEL NWA-1100 Users Guide 161 Appendix E Wireless LANs If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical) password entered into each access point, wireless gateway and wireless client. As long as the passwords match, a wireless client will be granted access to a WLAN. If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. Encryption Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol
(TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA and WPA2 use Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server. AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit mathematical algorithm called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. This all happens in the background automatically. The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped. By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi network than WEP and difficult for an intruder to break into the network. The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but its still an improvement over WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys. This prevent all wireless devices sharing the same encryption keys.
(a weakness of WEP) 162 ZyXEL NWA-1100 Users Guide Appendix E Wireless LANs User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a network. Other WPA2 authentication features that are different from WPA include key caching and pre-authentication. These two features are optional and may not be supported in all wireless devices. Key caching allows a wireless client to store the PMK it derived through a successful authentication with an AP. The wireless client uses the PMK when it tries to connect to the same AP and does not need to go with the authentication process again. Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an AP) to perform IEEE 802.1x authentication with another AP before connecting to it. Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicant is the WPA patch for Windows XP, Funk Software's Odyssey client. The Windows XP patch is a free download that adds WPA capability to Windows XP's built-
in "Zero Configuration" wireless client. However, you must run Windows XP to use it. WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server. 2 The RADIUS server then checks the user's identification against its database and grants or denies network access accordingly. 3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. ZyXEL NWA-1100 Users Guide 163 Appendix E Wireless LANs Figure 90 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters
(including spaces and symbols). 2 The AP checks each wireless client's password and (only) allows it to join the network if 3 The AP and wireless clients use the pre-shared key to generate a common PMK 4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data the password matches.
(Pairwise Master Key). exchanged between them. Figure 91 WPA(2)-PSK Authentication 164 ZyXEL NWA-1100 Users Guide Security Parameters Summary Appendix E Wireless LANs Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 56 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL Open ENTER MANUAL KEY ENCRYPTIO N METHOD IEEE 802.1X None No Open Shared WPA WPA-PSK WPA2 WPA2-PSK WEP WEP TKIP/AES TKIP/AES TKIP/AES TKIP/AES No Yes Yes No Yes Yes No Yes No Yes Disable Enable without Dynamic WEP Key Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable Enable Disable Enable Disable Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b) or 5GHz(IEEE 802.11a) is needed to communicate efficiently in a wireless LAN. Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antennas coverage area. ZyXEL NWA-1100 Users Guide 165 Appendix E Wireless LANs Antenna Gain Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width. Higher antenna gain improves the range of the signal for better communications. For an indoor site, each 1 dB increase in antenna gain results in a range increase of approximately 2.5%. For an unobstructed outdoor site, each 1dB increase in gain results in a range increase of approximately 5%. Actual results may vary depending on the network environment. Antenna gain is sometimes specified in dBi, which is how much the antenna increases the signal power compared to using an isotropic antenna. An isotropic antenna is a theoretical perfect antenna that sends out radio signals equally well in all directions. dBi represents the true gain that the antenna provides. Types of Antennas for WLAN There are two types of antennas used for wireless LAN applications. Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points. Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light from its bulb. The angle of the beam determines the width of the coverage pattern. Angles typically range from 20 degrees (very directional) to 120 degrees (less directional). Directional antennas are ideal for hallways and outdoor point-to-point applications. Positioning Antennas In general, antennas should be mounted as high as practically possible and free of obstructions. In point-topoint application, position both antennas at the same height and in a direct line of sight to each other to attain the best performance. For omni-directional antennas mounted on a table, desk, and so on, point the antenna up. For omni-directional antennas mounted on a wall or ceiling, point the antenna down. For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. For directional antennas, point the antenna in the direction of the desired coverage area. 166 ZyXEL NWA-1100 Users Guide F APPENDIX Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow:
Web browser pop-up windows from your device. JavaScripts (enabled by default). Java permissions (enabled by default).
Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device. Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your devices IP address. Disable pop-up Blockers 1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 92 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. ZyXEL NWA-1100 Users Guide 167 Appendix F Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 93 Internet Options: Privacy 3 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settingsto open the Pop-up Blocker Settings screen. 168 ZyXEL NWA-1100 Users Guide Appendix F Pop-up Windows, JavaScripts and Java Permissions Figure 94 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix http://. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 95 Pop-up Blocker Settings ZyXEL NWA-1100 Users Guide 169 Appendix F Pop-up Windows, JavaScripts and Java Permissions 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 96 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window. 170 ZyXEL NWA-1100 Users Guide Appendix F Pop-up Windows, JavaScripts and Java Permissions Figure 97 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window. Figure 98 Security Settings - Java ZyXEL NWA-1100 Users Guide 171 Appendix F Pop-up Windows, JavaScripts and Java Permissions JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Figure 99 Java (Sun) 172 ZyXEL NWA-1100 Users Guide APPENDIX G IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks. Introduction to IP Addresses One part of the IP address is the network number, and the other part is the host ID. In the same way that houses on a street share a common street name, the hosts on a network share a common network number. Similarly, as each house has its own house number, each host on the network has its own unique identifying number - the host ID. Routers use the network number to send packets to the correct network, while the host ID determines to which host on the network the packets are delivered. Structure An IP address is made up of four parts, written in dotted decimal notation (for example, 192.168.1.1). Each of these four parts is known as an octet. An octet is an eight-digit binary number (for example 11000000, which is 192 in decimal notation). Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal. The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. ZyXEL NWA-1100 Users Guide 173 Appendix G IP Addresses and Subnetting Figure 100 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation). The term subnet is short for sub-
network. A subnet mask has 32 bits. If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network number. If a bit in the subnet mask is 0 then the corresponding bit in the IP address is part of the host ID. The following example shows a subnet mask identifying the network number (in bold text) and host ID of an IP address (192.168.1.2 in decimal). Table 57 Subnet Masks IP Address (Binary) Subnet Mask (Binary) Network Number Host ID 1ST OCTET:
(192) 11000000 11111111 11000000 2ND OCTET:
(168) 10101000 11111111 10101000 3RD OCTET:
(1) 00000001 11111111 00000001 4TH OCTET
(2) 00000010 00000000 00000010 By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a 1 value). For example, an 8-bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. 174 ZyXEL NWA-1100 Users Guide Appendix G IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 58 Subnet Masks BINARY 1ST OCTET 11111111 11111111 11111111 11111111 8-bit mask 16-bit mask 24-bit mask 29-bit mask 2ND OCTET 00000000 11111111 11111111 11111111 3RD OCTET 00000000 00000000 11111111 11111111 4TH OCTET DECIMAL 00000000 00000000 00000000 11111000 255.0.0.0 255.255.0.0 255.255.255.0 255.255.255.248 Network Size The size of the network number determines the maximum number of possible hosts you can have on your network. The larger the number of network number bits, the smaller the number of remaining host ID bits. An IP address with host IDs of all zeros is the IP address of the network (192.168.1.0 with a 24-bit subnet mask, for example). An IP address with host IDs of all ones is the broadcast address for that network (192.168.1.255 with a 24-bit subnet mask, for example). As these two IP addresses cannot be used for individual hosts, calculate the maximum number of possible hosts in a network as follows:
Table 59 Maximum Host Numbers SUBNET MASK 8 bits 16 bits 24 bits 29 bits HOST ID SIZE 24 bits 255.0.0.0 16 bits 255.255.0.0 255.255.255.0 8 bits 255.255.255.248 3 bits MAXIMUM NUMBER OF HOSTS 16777214 65534 254 6 224 2 216 2 28 2 23 2 Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a / followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. The following table shows some possible subnet masks using both notations. Table 60 Alternative Subnet Mask Notation SUBNET MASK 255.255.255.0 255.255.255.128 ALTERNATIVE NOTATION
/24
/25 LAST OCTET
(BINARY) 0000 0000 1000 0000 LAST OCTET
(DECIMAL) 0 128 ZyXEL NWA-1100 Users Guide 175 Appendix G IP Addresses and Subnetting Table 60 Alternative Subnet Mask Notation (continued) SUBNET MASK 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252 ALTERNATIVE NOTATION
/26
/27
/28
/29
/30 LAST OCTET
(BINARY) 1100 0000 1110 0000 1111 0000 1111 1000 1111 1100 LAST OCTET
(DECIMAL) 192 224 240 248 252 Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons. In this example, the company network address is 192.168.1.0. The first three octets of the address (192.168.1) are the network number, and the remaining octet is the host ID, allowing a maximum of 28 2 or 254 possible hosts. The following figure shows the company network before subnetting. Figure 101 Subnetting Example: Before Subnetting You can borrow one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The borrowed host ID bit can have a value of either 0 or 1, allowing two subnets;
192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting. There are now two sub-
networks, A and B. 176 ZyXEL NWA-1100 Users Guide Figure 102 Subnetting Example: After Subnetting Appendix G IP Addresses and Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 2 or 126 possible hosts (a host ID of all zeroes is the subnets address itself, all ones is the subnets broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.128 is its broadcast address. Therefore, the lowest IP address that can be assigned to an actual host for subnet A is 192.168.1.1 and the highest is 192.168.1.126. Similarly, the host ID range for subnet B is 192.168.1.129 to 192.168.1.254. Example: Four Subnets The previous example illustrated using a 25-bit subnet mask to divide a 24-bit address into two subnets. Similarly, to divide a 24-bit address into four subnets, you need to borrow two host ID bits to give four possible combinations (00, 01, 10 and 11). The subnet mask is 26 bits
(11111111.11111111.11111111.11000000) or 255.255.255.192. Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnets broadcast address). Table 61 Subnet 1 IP/SUBNET MASK NETWORK NUMBER IP Address (Decimal) IP Address (Binary) Subnet Mask (Binary) Subnet Address:
192.168.1.0 Broadcast Address:
192.168.1.63 192.168.1. 11000000.10101000.00000001. 11111111.11111111.11111111. Lowest Host ID: 192.168.1.1 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE 0 00000000 11000000 ZyXEL NWA-1100 Users Guide 177 Appendix G IP Addresses and Subnetting Table 62 Subnet 2 IP/SUBNET MASK NETWORK NUMBER IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address:
192.168.1.64 Broadcast Address:
192.168.1.127 Table 63 Subnet 3 192.168.1. 11000000.10101000.00000001. 11111111.11111111.11111111. Lowest Host ID: 192.168.1.65 Highest Host ID: 192.168.1.126 IP/SUBNET MASK NETWORK NUMBER IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address:
192.168.1.128 Broadcast Address:
192.168.1.191 Table 64 Subnet 4 192.168.1. 11000000.10101000.00000001. 11111111.11111111.11111111. Lowest Host ID: 192.168.1.129 Highest Host ID: 192.168.1.190 LAST OCTET BIT VALUE 64 01000000 11000000 LAST OCTET BIT VALUE 128 10000000 11000000 IP/SUBNET MASK NETWORK NUMBER IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address:
192.168.1.192 Broadcast Address:
192.168.1.255 192.168.1. 11000000.10101000.00000001. 11111111.11111111.11111111. Lowest Host ID: 192.168.1.193 Highest Host ID: 192.168.1.254 LAST OCTET BIT VALUE 192 11000000 11000000 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Table 65 Eight Subnets SUBNET ADDRESS 0 32 64 96 BROADCAST ADDRESS 31 63 95 127 LAST ADDRESS 30 62 94 126 FIRST ADDRESS 1 33 65 97 SUBNET 1 2 3 4 178 ZyXEL NWA-1100 Users Guide Appendix G IP Addresses and Subnetting Table 65 Eight Subnets (continued) SUBNET 5 6 7 8 SUBNET ADDRESS 128 160 192 224 FIRST ADDRESS 129 161 193 225 LAST ADDRESS 158 190 222 254 BROADCAST ADDRESS 159 191 223 255 Subnet Planning SUBNET MASK The following table is a summary for subnet planning on a network with a 24-bit network number. Table 66 24-bit Network Number Subnet Planning NO. BORROWED HOST BITS 1 2 3 4 5 6 7 NO. HOSTS PER SUBNET 126 62 30 14 6 2 1 255.255.255.128 (/25) 255.255.255.192 (/26) 255.255.255.224 (/27) 255.255.255.240 (/28) 255.255.255.248 (/29) 255.255.255.252 (/30) 255.255.255.254 (/31) 2 4 8 16 32 64 128 NO. SUBNETS NO. SUBNETS SUBNET MASK The following table is a summary for subnet planning on a network with a 16-bit network number. Table 67 16-bit Network Number Subnet Planning NO. BORROWED HOST BITS 1 2 3 4 5 6 7 8 9 10 11 12 13 255.255.128.0 (/17) 255.255.192.0 (/18) 255.255.224.0 (/19) 255.255.240.0 (/20) 255.255.248.0 (/21) 255.255.252.0 (/22) 255.255.254.0 (/23) 255.255.255.0 (/24) 255.255.255.128 (/25) 255.255.255.192 (/26) 255.255.255.224 (/27) 255.255.255.240 (/28) 255.255.255.248 (/29) NO. HOSTS PER SUBNET 32766 16382 8190 4094 2046 1022 510 254 126 62 30 14 6 2 4 8 16 32 64 128 256 512 1024 2048 4096 8192 ZyXEL NWA-1100 Users Guide 179 Appendix G IP Addresses and Subnetting Table 67 16-bit Network Number Subnet Planning (continued) NO. BORROWED HOST BITS 14 15 255.255.255.252 (/30) 255.255.255.254 (/31) SUBNET MASK 16384 32768 NO. SUBNETS NO. HOSTS PER SUBNET 2 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask. If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. If this is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0. The Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private use; please do not use any other number unless you are told otherwise. You must also enable Network Address Translation (NAT) on the ZyXEL Device. Once you have decided on the network number, pick an IP address for your ZyXEL Device that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address. Your ZyXEL Device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the ZyXEL Device unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private networks:
10.0.0.0 10.255.255.255 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 You can obtain your IP address from the IANA, from an ISP, or it can be assigned from a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses. Regardless of your particular situation, do not create an arbitrary IP address; always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466, Guidelines for Management of IP Address Space. 180 ZyXEL NWA-1100 Users Guide APPENDIX H Text File Based Auto Configuration This chapter describes how administrators can use text configuration files to configure the wireless LAN settings for multiple APs. Text File Based Auto Configuration Overview You can use plain text configuration files to configure the wireless LAN settings on multiple APs. The AP can automatically get a configuration file from a TFTP server at startup or after renewing DHCP client information. Figure 103 Text File Based Auto Configuration Use one of the following methods to give the AP the IP address of the TFTP server where you store the configuration files and the name of the configuration file that it should download. You can have a different configuration file for each AP. You can also have multiple APs use the same configuration file. ZyXEL NWA-1100 Users Guide 181 Appendix H Text File Based Auto Configuration
If adjacent APs use the same configuration file, you should leave out the channel setting since they could interfere with each others wireless traffic. Auto Configuration by DHCP A DHCP response can use options 66 and 67 to assign a TFTP server IP address and a filename. If the AP is configured as a DHCP client, these settings can be used to perform auto configuration. Table 68 Auto Configuration by DHCP COMMAND wcfg autocfg dhcp [enable |
disable]
DESCRIPTION Turn configuration of TFTP server IP address and filename through DHCP on or off. If this feature is enabled and the DHCP response provides a TFTP server IP address and a filename, the AP will try to download the file from the specified TFTP server. The AP then uses the file to configure wireless LAN settings.
Not all DHCP servers allow you to specify options 66 and 67. Configuration Via SNMP You can configure and trigger the auto configuration remotely via SNMP. Use the following procedure to have the AP download the configuration file. Table 69 Configuration via SNMP STEPS Step 1 Step 2 Step 3 Step 4 VALUE Set the IP address of the TFTP server. Set the file name, for example, g3000hcfg.txt. Set to 3 (text configuration file). Set to 2 (download). MIB VARIABLE pwTftpServer pwTftpFileName pwTftpFileType pwTftpOpCommand Verifying Your Configuration File Upload Via SNMP You can use SNMP management software to display the configuration file version currently on the device by using the following MIB. Table 70 Displaying the File Version ITEM pwCfgVersion DESCRIPTION This displays the current configuration file version. OBJECT ID 1.3.6.1.4.1.890.1.9.1.2 182 ZyXEL NWA-1100 Users Guide Troubleshooting Via SNMP Appendix H Text File Based Auto Configuration If you have any difficulties with the configuration file upload, you can try using the following MIB 10 to 20 seconds after using SNMP to have the AP download the configuration file. Table 71 Displaying the File Version ITEM pwTftpOpStatus DESCRIPTION This displays the current operating status of the TFTP client. OBJECT ID 1.3.6.1.4.1.890.1.9.1.6 Configuration File Format The text based configuration file must use the following format. Figure 104 Configuration File Format
!#ZYXEL PROWLAN
!#VERSION 12 wcfg security 1 xxx wcfg security save wcfg ssid 1 xxx wcfg ssid save The first line must be !#ZYXEL PROWLAN. The second line must specify the file version. The AP compares the file version with the version of the last configuration file that it downloaded. If the version of the downloaded file is the same or smaller (older), the AP ignores the file. If the version of the downloaded file is larger (newer), the AP uses the file. Configuration File Rules You can only use the wlan and wcfg commands in the configuration file. The AP ignores other ZyNOS commands but continues to check the next command. The AP ignores any improperly formatted commands and continues to check the next line. If there are any errors while processing the configuration file, the AP generates a message with the line number and reason for the first error (subsequent errors during the processing of an individual configuration file are not recorded). You can use SNMP management software to display the message by using the following MIB. Table 72 Displaying the Auto Configuration Status ITEM pwAutoCfgMessage DESCRIPTION Auto configuration status message string OBJECT ID 1.3.6.1.4.1.890.1.9.1.9 The commands will be executed line by line just like if you entered them in a console or Telnet CI session. Be careful to ensure the integrity of the whole AP configuration. If there are existing settings in the AP, the newly loaded configuration file will either coexist with the previous settings or replace them. ZyXEL NWA-1100 Users Guide 183 Appendix H Text File Based Auto Configuration You can zip each configuration file. You must use the store compression method and a .zip file extension. When zipping a configuration file, you can also add password protection using the same password that you use to log into the AP. Wcfg Command Configuration File Examples These example configuration files use the wcfg command to configure security and SSID profiles. Figure 105 WEP Configuration File Example
!#ZYXEL PROWLAN
!#VERSION 11 wcfg security 1 name Test-wep wcfg security 1 security wep wcfg security 1 wep keysize 64 ascii wcfg security 1 wep key1 abcde wcfg security 1 wep key2 bcdef wcfg security 1 wep key3 cdefg wcfg security 1 wep key4 defgh wcfg security 1 wep keyindex 1 wcfg security save wcfg ssid 1 name ssid-wep wcfg ssid 1 security Test-wep wcfg ssid 1 l2iolation disable wcfg ssid 1 macfilter disable wcfg ssid save Figure 106 802.1X Configuration File Example
!#ZYXEL PROWLAN
!#VERSION 12 wcfg security 2 name Test-8021x wcfg security 2 mode 8021x-static128 wcfg security 2 wep key1 abcdefghijklm wcfg security 2 wep key2 bcdefghijklmn wcfg security 2 wep keyindex 1 wcfg security 2 reauthtime 1800 wcfg security 2 idletime 3600 wcfg security save wcfg radius 2 name radius-rd wcfg radius 2 primary 172.23.3.4 1812 1234 enable wcfg radius 2 backup 172.23.3.5 1812 1234 enable wcfg radius save wcfg ssid 2 name ssid-8021x wcfg ssid 2 security Test-8021x wcfg ssid 2 radius radius-rd wcfg ssid 2 qos 4 wcfg ssid 2 l2isolation disable wcfg ssid 2 macfilter disable wcfg ssid save 184 ZyXEL NWA-1100 Users Guide Appendix H Text File Based Auto Configuration Figure 107 WPA-PSK Configuration File Example
!#ZYXEL PROWLAN
!#VERSION 13 wcfg security 3 name Test-wpapsk wcfg security 3 mode wpapsk wcfg security 3 passphrase qwertyuiop wcfg security 3 reauthtime 1800 wcfg security 3 idletime 3600 wcfg security 3 groupkeytime 1800 wcfg security save wcfg ssid 3 name ssid-wpapsk wcfg ssid 3 security Test-wpapsk wcfg ssid 3 qos 4 wcfg ssid 3 l2siolation disable wcfg ssid 3 macfilter disable wcfg ssid save Figure 108 WPA Configuration File Example
!#ZYXEL PROWLAN
!#VERSION 14 wcfg security 4 name Test-wpa wcfg security 4 mode wpa wcfg security 4 reauthtime 1800 wcfg security 4 idletime 3600 wcfg security 4 groupkeytime 1800 wcfg security save wcfg radius 4 name radius-rd1 wcfg radius 4 primary 172.0.20.38 1812 20 enable wcfg radius 4 backup 172.0.20.39 1812 20 enable wcfg radius save wcfg ssid 4 name ssid-wpa wcfg ssid 4 security Test-wpa wcfg ssid 4 qos 4 wcfg ssid 4 l2isolation disable wcfg ssid 4 macfilter disable wcfg ssid save Wlan Command Configuration File Example This example configuration file uses the wlan command to configure the AP to use the security and SSID profiles from the wcfg command configuration file examples and general wireless settings. You could actually combine all of this chapters example configuration files into a single configuration file. Remember that the commands are applied in order. So for example, you would place the commands that create security and SSID profiles before the commands that tell the AP to use those profiles. Figure 109 Wlan Configuration File Example ZyXEL NWA-1100 Users Guide 185 Appendix H Text File Based Auto Configuration
!#ZYXEL PROWLAN
!#VERSION 15 wcfg ssid 1 name ssid-wep wcfg ssid 1 security Test-wep wcfg ssid 2 name ssid-8021x wcfg ssid 2 security Test-8021x wcfg ssid 2 radius radius-rd wcfg ssid 3 name ssid-wpapsk wcfg ssid 3 security Test-wpapsk wcfg ssid 4 name ssid-wpa2psk wcfg ssid 4 security Test-wpa2psk wcfg ssid save
!line starting with '!' is comment
!change to channel 8 wlan chid 8
!change operating mode -> AP mode,
!then select ssid-wep as running WLAN profile wlan opmode 0 wlan ssidprofile ssid-wep
!change operating mode -> MBSSID mode,
!then select ssid-wpapsk, ssid-wpa2psk as running WLAN profiles wlan opmode 3 wlan ssidprofile ssid-wpapsk ssid-wpa2psk
! set output power level to 50%
wlan output power 2 186 ZyXEL NWA-1100 Users Guide I APPENDIX How to Access and Use the CLI This chapter introduces the command line interface (CLI). Accessing the CLI Use Telnet to access the CLI. 1 Connect your computer to one of the Ethernet ports. 2 Open a Telnet session to the ZyXEL Devices IP address. If this is your first login, use the default values. Table 73 Default Management IP Address DEFAULT VALUE SETTING 192.168.1.1 IP Address Subnet Mask 255.255.255.0 Make sure your computer IP address is in the same subnet, unless you are accessing the ZyXEL Device through one or more routers. In the latter case, make sure remote management of the ZyXEL Device is allowed via Telnet. Logging in Use the administrator username and password. If this is your first login, use the default values. in some ZyXEL Device models you may not need to enter the user name. Table 74 Default User Name and Password SETTING User Name Password DEFAULT VALUE admin 1234 The ZyXEL Device automatically logs you out of the management interface after five minutes of inactivity. If this happens, simply log back in again. Use the sys stdio set command to extend the idle timeout. For example, the ZyXEL Device automatically logs you out of the management interface after 60 minutes of inactivity after you use the sys stdio set 60 command. Use the sys stdio show command to display the current idle timeout setting. ZyXEL NWA-1100 Users Guide 187 Appendix I How to Access and Use the CLI Command Conventions Command descriptions follow these conventions:
Commands are in courier new font. Required input values are in angle brackets <>; for example, ping <ip-address>
means that you must specify an IP address for this command. Optional fields are in square brackets []; for instance in the show logins
[name]command, the name field is optional. The following is an example of a required field within an optional field: snmp-server
[contact <system contact>], the contact field is optional. However, if you use contact, then you must provide the system contact information. The | (bar) symbol means or. italic terms represent user-defined input values; for example, in sys datetime date [year month date], year month date can be replaced by the actual year month and date that you want to set, for example, 2007 08 15. A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the Enter or Return key on your keyboard.
<cr> means press the [ENTER] key. An arrow (-->) indicates that this line is a continuation of the previous line. A long list of pre-defined values may be replaced by a command input value variable so as to avoid a very long command in the description table. Refer to the command input values table if you are unsure of what to enter. Table 75 Common Command Input Values LABEL description ip-address mask mask-bits DESCRIPTION Used when a command has a description field in order to add more detail. An IP address in dotted decimal notation. For example, 192.168.1.3. The subnet mask in dotted decimal notation, for example, 255.255.255.0. The number of bits in an addresss subnet mask. For example type /24 for a subnet mask of 255.255.255.0. A port number. The hostname can be an IP address or domain name. Used for the name of a rule, policy, set, group and so on. Used for a number, for example 10, that you have to enter. port hostname name number
Commands are case sensitive! Enter commands exactly as seen in the command interface. Remember to also include underscores if required. 188 ZyXEL NWA-1100 Users Guide Appendix I How to Access and Use the CLI Copy and Paste Commands You can copy and paste commands directly from this document into your terminal emulation console window (such as HyperTerminal). Use right-click (not [CTRL]-[V]) to paste your command into the console window as shown next. Using Shortcuts and Getting Help This table identifies some shortcuts in the CLI, as well as how to get help. Table 76 CLI Shortcuts and Help COMMAND / KEY(S)
(up/down arrow keys) DESCRIPTION Scrolls through the list of recently-used commands. You can edit any command or press [ENTER] to run it again. Displays the keywords and/or input values that are allowed in place of the ?. Displays the (full) commands that are allowed in place of help.
help
Use of undocumented commands or misconfiguration can damage the unit and possibly render it unusable. Use the help command to view the executable commands on the ZyXEL Device. Follow these steps to create a list of supported commands:
1 Log into the CLI. 2 Type help and press [ENTER]. A list comes up which shows all the commands available for this device. ras> help alarm chsh config exit ip statistics switch sys voip ras>
ZyXEL NWA-1100 Users Guide 189 Appendix I How to Access and Use the CLI Saving Your Configuration In the ZyXEL Device some commands are saved as you run them and others require you to run a save command. See the related section of this guide to see if a save command is required.
Unsaved configuration changes are lost once you restart the ZyXEL Device Logging Out Use the exit command to log out of the CLI. 190 ZyXEL NWA-1100 Users Guide APPENDIX J Legal Information Copyright Copyright 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice. Trademarks ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners. Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. ZyXEL NWA-1100 Users Guide 191 Appendix J Legal Information If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1 Reorient or relocate the receiving antenna. 2 Increase the separation between the equipment and the receiver. 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 4 Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11. To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons.
Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device has been designed for the WLAN 2.4 GHz and 5 GHz networks throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numrique de la classe B est conforme la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 192 ZyXEL NWA-1100 Users Guide Appendix J Legal Information 3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country. Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products. ZyXEL NWA-1100 Users Guide 193 Appendix J Legal Information 194 ZyXEL NWA-1100 Users Guide APPENDIX K Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. Regional offices are listed below (see also http://
www.zyxel.com/web/contact_us.php). Please have the following information ready when you contact an office. Required Information Product model and serial number. Warranty Information. Date that you received your device. Brief description of the problem and the steps you took to solve it.
+ is the (prefix) number you dial to make an international telephone call. Corporate Headquarters (Worldwide) Support E-mail: support@zyxel.com.tw Sales E-mail: sales@zyxel.com.tw Telephone: +886-3-578-3942 Fax: +886-3-578-2439 Web: www.zyxel.com Regular Mail: ZyXEL Communications Corp., 6 Innovation Road II, Science Park, Hsinchu 300, Taiwan China - ZyXEL Communications (Beijing) Corp. Support E-mail: cso.zycn@zyxel.cn Sales E-mail: sales@zyxel.cn Telephone: +86-010-82800646 Fax: +86-010-82800587 Address: 902, Unit B, Horizon Building, No.6, Zhichun Str, Haidian District, Beijing Web: http://www.zyxel.cn China - ZyXEL Communications (Shanghai) Corp. Support E-mail: cso.zycn@zyxel.cn Sales E-mail: sales@zyxel.cn Telephone: +86-021-61199055 Fax: +86-021-52069033 ZyXEL NWA-1100 Users Guide 195 Appendix K Customer Support Address: 1005F, ShengGao International Tower, No.137 XianXia Rd., Shanghai Web: http://www.zyxel.cn Costa Rica Support E-mail: soporte@zyxel.co.cr Sales E-mail: sales@zyxel.co.cr Telephone: +506-2017878 Fax: +506-2015098 Web: www.zyxel.co.cr Regular Mail: ZyXEL Costa Rica, Plaza Roble Escaz, Etapa El Patio, Tercer Piso, San Jos, Costa Rica Czech Republic E-mail: info@cz.zyxel.com Telephone: +420-241-091-350 Fax: +420-241-091-359 Web: www.zyxel.cz Regular Mail: ZyXEL Communications, Czech s.r.o., Modransk 621, 143 01 Praha 4 -
Modrany, Cesk Republika Denmark Support E-mail: support@zyxel.dk Sales E-mail: sales@zyxel.dk Telephone: +45-39-55-07-00 Fax: +45-39-55-07-07 Web: www.zyxel.dk Regular Mail: ZyXEL Communications A/S, Columbusvej, 2860 Soeborg, Denmark Finland Support E-mail: support@zyxel.fi Sales E-mail: sales@zyxel.fi Telephone: +358-9-4780-8411 Fax: +358-9-4780-8448 Web: www.zyxel.fi Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland France E-mail: info@zyxel.fr Telephone: +33-4-72-52-97-97 Fax: +33-4-72-52-19-20 Web: www.zyxel.fr Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France 196 ZyXEL NWA-1100 Users Guide Appendix K Customer Support Germany Support E-mail: support@zyxel.de Sales E-mail: sales@zyxel.de Telephone: +49-2405-6909-69 Fax: +49-2405-6909-99 Web: www.zyxel.de Regular Mail: ZyXEL Deutschland GmbH., Adenauerstr. 20/A2 D-52146, Wuerselen, Germany Hungary Support E-mail: support@zyxel.hu Sales E-mail: info@zyxel.hu Telephone: +36-1-3361649 Fax: +36-1-3259100 Web: www.zyxel.hu Regular Mail: ZyXEL Hungary, 48, Zoldlomb Str., H-1025, Budapest, Hungary India Support E-mail: support@zyxel.in Sales E-mail: sales@zyxel.in Telephone: +91-11-30888144 to +91-11-30888153 Fax: +91-11-30888149, +91-11-26810715 Web: http://www.zyxel.in Regular Mail: India - ZyXEL Technology India Pvt Ltd., II-Floor, F2/9 Okhla Phase -1, New Delhi 110020, India Japan Support E-mail: support@zyxel.co.jp Sales E-mail: zyp@zyxel.co.jp Telephone: +81-3-6847-3700 Fax: +81-3-6847-3705 Web: www.zyxel.co.jp Regular Mail: ZyXEL Japan, 3F, Office T&U, 1-10-10 Higashi-Gotanda, Shinagawa-ku, Tokyo 141-0022, Japan Kazakhstan Support: http://zyxel.kz/support Sales E-mail: sales@zyxel.kz Telephone: +7-3272-590-698 Fax: +7-3272-590-689 Web: www.zyxel.kz Regular Mail: ZyXEL Kazakhstan, 43 Dostyk Ave., Office 414, Dostyk Business Centre, 050010 Almaty, Republic of Kazakhstan ZyXEL NWA-1100 Users Guide 197 Appendix K Customer Support Malaysia Support E-mail: support@zyxel.com.my Sales E-mail: sales@zyxel.com.my Telephone: +603-8076-9933 Fax: +603-8076-9833 Web: http://www.zyxel.com.my Regular Mail: ZyXEL Malaysia Sdn Bhd., 1-02 & 1-03, Jalan Kenari 17F, Bandar Puchong Jaya, 47100 Puchong, Selangor Darul Ehsan, Malaysia North America Support E-mail: support@zyxel.com Support Telephone: +1-800-978-7222 Sales E-mail: sales@zyxel.com Sales Telephone: +1-714-632-0882 Fax: +1-714-632-0858 Web: www.zyxel.com Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806-
2001, U.S.A. Norway Support E-mail: support@zyxel.no Sales E-mail: sales@zyxel.no Telephone: +47-22-80-61-80 Fax: +47-22-80-61-81 Web: www.zyxel.no Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway Poland E-mail: info@pl.zyxel.com Telephone: +48-22-333 8250 Fax: +48-22-333 8251 Web: www.pl.zyxel.com Regular Mail: ZyXEL Communications, ul. Okrzei 1A, 03-715 Warszawa, Poland Russia Support: http://zyxel.ru/support Sales E-mail: sales@zyxel.ru Telephone: +7-095-542-89-29 Fax: +7-095-542-89-25 Web: www.zyxel.ru Regular Mail: ZyXEL Russia, Ostrovityanova 37a Str., Moscow 117279, Russia 198 ZyXEL NWA-1100 Users Guide Appendix K Customer Support Singapore Support E-mail: support@zyxel.com.sg Sales E-mail: sales@zyxel.com.sg Telephone: +65-6899-6678 Fax: +65-6899-8887 Web: http://www.zyxel.com.sg Regular Mail: ZyXEL Singapore Pte Ltd., No. 2 International Business Park, The Strategy
#03-28, Singapore 609930 Spain Support E-mail: support@zyxel.es Sales E-mail: sales@zyxel.es Telephone: +34-902-195-420 Fax: +34-913-005-345 Web: www.zyxel.es Regular Mail: ZyXEL Communications, Arte, 21 5 planta, 28033 Madrid, Spain Sweden Support E-mail: support@zyxel.se Sales E-mail: sales@zyxel.se Telephone: +46-31-744-7700 Fax: +46-31-744-7701 Web: www.zyxel.se Regular Mail: ZyXEL Communications A/S, Sjporten 4, 41764 Gteborg, Sweden Taiwan Support E-mail: support@zyxel.com.tw Sales E-mail: sales@zyxel.com.tw Telephone: +886-2-27399889 Fax: +886-2-27353220 Web: http://www.zyxel.com.tw Address: Room B, 21F., No.333, Sec. 2, Dunhua S. Rd., Da-an District, Taipei Thailand Support E-mail: support@zyxel.co.th Sales E-mail: sales@zyxel.co.th Telephone: +662-831-5315 Fax: +662-831-5395 Web: http://www.zyxel.co.th Regular Mail: ZyXEL Thailand Co., Ltd., 1/1 Moo 2, Ratchaphruk Road, Bangrak-Noi, Muang, Nonthaburi 11000, Thailand. ZyXEL NWA-1100 Users Guide 199 Appendix K Customer Support Turkey Support E-mail: cso@zyxel.com.tr Telephone: +90 212 222 55 22 Fax: +90-212-220-2526 Web: http:www.zyxel.com.tr Address: Kaptanpasa Mahallesi Piyalepasa Bulvari Ortadogu Plaza N:14/13 K:6 Okmeydani/Sisli Istanbul/Turkey Ukraine Support E-mail: support@ua.zyxel.com Sales E-mail: sales@ua.zyxel.com Telephone: +380-44-247-69-78 Fax: +380-44-494-49-32 Web: www.ua.zyxel.com Regular Mail: ZyXEL Ukraine, 13, Pimonenko Str., Kiev 04050, Ukraine United Kingdom Support E-mail: support@zyxel.co.uk Sales E-mail: sales@zyxel.co.uk Telephone: +44-1344-303044, 0845 122 0301 (UK only) Fax: +44-1344-303034 Web: www.zyxel.co.uk Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road, Bracknell, Berkshire RG12 2XB, United Kingdom (UK) 200 ZyXEL NWA-1100 Users Guide Index Index Numbers 802.1x-Only 76 802.1x-Static128 76 802.1x-Static64 76 A Access Point 25, 45 Accounting Server 91 Ad-hoc 153 Advanced Encryption Standard See AES. AES 162 Alerts 116 Alternative subnet mask notation 175 Antenna 73, 135 directional 166 gain 166 omni-directional 166 positioning 165 AP (Access Point) 155 AP + Bridge 29 Applications Access Point 25 AP + Bridge 29 Bridge 27 Wireless Client 26 Auto Configuration 181 Auto Configuration Status 183 B Basic Service Set 62 see BSS beacon 62 Beacon Interval 64 BPDU 72 Bridge 27 Bridge loops 28 bridged APs, security 27 BSS 62, 153 C CA 160 Certificate authentication 111 file format 111 Certificate Authority See CA. Certificate Screen 111 certificate-based authentications 161 Certificates Fingerprint 113 MD5 113 public key 111 SHA1 113 Certification Authority 113 Certifications 191 notices 192 viewing 192 Channel 62, 69, 155 interference 155 CLI 30 accessing the CLI 187 Client authentication 160 Command Line Interface 30 Configuration File examples 184 format 183 Configuration File Rules 183 Contact information 195 Controlling network access, Ways of 25 Copyright 191 CTS (Clear to Send) 156 Customer support 195 D Date and time start 58 DHCP 55 digital certificate 160 Dimensions 135 Disclaimer 191 Distribution System 62 DNS 53 ZyXEL NWA-1100 Users Guide 201 Index Domain Name Server (DNS) 53 DS 62 DTIM Interval 64 Dynamic WEP key exchange 161 E EAP 77 EAP authentication 159 Enable Antenna Diversity 67, 70 Enable Spanning Tree Control (STP) 67 Enable Spanning Tree Protocol(STP) 70 Encryption 77, 79, 81, 84, 161, 162 ESS 62, 154 Ethernet device 93 Ethernet Port 135 Extended Service Set 62 see ESS Extensible Authentication Protocol 77 F Factory Defaults 126 restoring 36 FCC interference statement 191 File Version 182 Firmware 121 Firmware, uploading via web configurator 123 Fragmentation 65, 67, 69 Fragmentation threshold 73, 157 FTP 103 restrictions 103 G Generic Token Card 77 GTC 77 H handshake 156 Hardware Connections 32 help (in the CLI) 189 Hidden node 155 Hide SSID 64 Humidity 135 I IANA 99, 180 IBSS 153 IEEE 802.11g 157 IEEE 802.1x 63 Import Certificate 112 Independent Basic Service Set see IBSS Infrastructure WLAN 154 Initialization vector (IV) 162 interference due to overlap 155 Internet Assigned Numbers Authority 99 See IANA Intra-BSS Traffic 64 IP Address 54, 97, 135 Arbitrary IP address 54 Gateway IP address 97 IANA 54 ISP 54 Private IP Address Ranges 54 Subnet Mask 54 IP Screen 97 DHCP 98 IPSec VPN capability 135 ISP 99 J jitter 71 K key 77, 79 L latency 71 LEAP 77 LEDs 32, 129 202 ZyXEL NWA-1100 Users Guide Blinking 33 ETHERNET 33 Flashing 32 Off 32 On 32 SYS 32 WLAN 32 legacy authentication methods 160 Lightweight Extensible Authentication Protocol 77 Log Commands 119 Log Messages 119 Log Screens 115 Login 187 Logs accessing logs 115 Command List 120 displaying logs 120 receiving logs via e-mail 116 Logs Screen Mail Server 117 Mail Subject 117 Send Log to 117 Syslog 118 Logs, Uses of 115 loss of messages 156 M MAC Address Clone 67 MAC Filter Allow Association 93 Deny Association 93 MAC Filter Screen 93 MAC filtering 136 Maintenance 121 Association List 121 Backup 125 Channel Usage 122 Configuration 124 F/W Upload 123 Restart 127 Restore 125 Management Information Base (MIB) 108 Media Access Control 93 Message Integrity Check (MIC) 162 message relay 90 Microsoft Challenge Handshake Authentication Protocol Version 2 77 MSCHAPv2 77 MSDU 65 Index N NAT 180 Network Time Protocol (NTP) 53 NTP 53 O Operating Mode 62 Output Power Management 65, 67, 69 P Pairwise Master Key (PMK) 162, 164 Passphrase 77 Password 130, 135 PEAP 77 Personal Information Exchange Syntax Standard 111 PFX PKCS#12 111 PoE 137 Power specifications 135, 137 Preamble 73 Preamble mode 157 Preamble Type 65, 67, 69 Pre-Shared Key 77 Private-Public Certificates 113 Product registration 193 Protected Extensible Authentication Protocol 77 PSK 77, 162 Q QoS 71 Quality of Service 71 R Radio Enable 65, 67, 69 Radio Frequency 73 RADIUS 89, 159 Accounting 90 ZyXEL NWA-1100 Users Guide 203 Index Authentication 89 Authorization 89 message types 159 messages 159 shared secret key 159 RADIUS Screen 89 Accounting Server 91 Accounting Server IP Address 91 Accounting Server Port 91 Backup 90 Primary 90 Server IP Address 90 Server Port 91 Share Secret 91 RADIUS server 76 Rates Configuration 65, 67, 69 registration product 193 Related documentation 3 Remote Authentication Dial In User Service 89 remote management 31 remote management limitations 102 Reset button 135 Rijndael 162 RJ-45 Port Pin Assignments 137 Roaming 73 root path cost 72 RTS (Request To Send) 156 threshold 155, 156 RTS/CTS Threshold 65, 67, 69, 73 S Safety warnings 6 Saving configuration 190 Security Mode, Choosing the 87 Security Modes 802.1x-Static64 76 IEEE 802.1x-Only 76 IEEE 802.1x-Static128 76 IEEE 802.1x-Static64 76 None 76 WEP 76 WPA 76 WPA2 76 WPA2-MIX 76 WPA2-PSK 76 Service Set IDentifier 62 Share Secret 91 Shortcuts 189 Simple Mail Transfer Protocol 116 Single user account 54 SMTP 116, 117 SNMP 136 MIBs 108 traps 108 Spanning Tree Protocol 71 Bridge Protocol Data Units 72 How STP Works 72 Port States 72 Rapid STP 71 Terminology 71 topology 71 Specifications 137 SSID 62 SSL Passthrough 136 Status screen 35 Status Screens 39 802.11 Mode 41 Channel ID 41 Ethernet 39 FCS Error Count 41 Firmware Version 40 Interface Status 40 Poll Interval 41 Refresh Interval 39 Retry Count 41 Statistics 41 System Resources 40 system statistics 39 WLAN 39 STP 71 STP (Spanning Tree Protocol) 135 STP-only aware bridges 71 Subnet 173 Subnet Mask 55, 97, 135, 174 subnetting 176 synchronization field 157 Syntax conventions 4 Syslog Logging 116 System Screens 53 General 55 Inactivity Timer 55 System DNS Servers 55 Password 56 Time 56 Daylight Savings 57 NTP client 57 Time and Date Setup 57 Time Server, user-defined 57 Time Zone 57 system timeout 103 204 ZyXEL NWA-1100 Users Guide T telnet 104 Telnet (accessing the CLI) 187 Temperature 135 Temporal Key Integrity Protocol 77 Temporal Key Integrity Protocol (TKIP) 162 Text file based auto configuration 136, 181 TFTP restrictions 103 Thumbprint Algorithm 114 Time Servers List 58 timeout 31 TKIP 77 TLS 77 Tracing 136 Trademarks 191 Transport Layer Security 77 Troubleshooting 129 connection is slow or intermittent 132 DHCP 130 factory defaults 131 firmware 131 Internet 131 LAN/ETHERNET port 130 QoS 132 WAN port 130 Web Configurator 130 TTLS 77 Tunneled Transport Layer Security 77 Tutorial 43 U User Authentication 76 W WAN IP 99 Warranty 193 note 193 WCFG command 184 WDS Settings 69 Web Configurator 35 Logout 37 password 35 WEP 76 WEP key encrypting 87 Index Wi-Fi MultiMedia 71 Wi-Fi Protected Access 76, 161 Wired Equivalent Privacy 76 Wireless Association List 136 Wireless Client 26, 46 Wireless client WPA supplicants 163 Wireless LAN, Configuration Overview 43 Wireless Mode 63 Wireless Mode, Choosing the Access Point 43 AP + Bridge 43 Bridge 43 Wireless Client 43 Wireless Security 31, 158 how to improve 31 Levels 76 Wireless Security Screen 75 802.1x Only 79 Access Point 79 Wireless Client 80 802.1x Static 64-bit, 802.1x Static 128-bit 81 WEP 78 WPA 83 WPA-PSK, WPA2-PSK, WPA2-PSK-MIX 87 Access Point 83 Wireless Client 84 WPA2 or WPA2-MIX 85 Access Point 85 Wireless Client 86 Wireless Settings Screen 61 Access Point Mode 63 Antenna 73 AP + Bridge Mode 70 Bridge Mode 68 BSS 62 Channel 62 ESS 62 Fragmentation Threshold 73 Intra-BSS Traffic 73 Operating Mode 62 Preamble 73 Quality of Service 71 Roaming 73 RTS/CTS Threshold 73 SSID 62 Wi-Fi MultiMedia 71 Wireless Client Mode 65 Wireless Mode 63 WMM QoS 71 WLAN interference 155 security parameters 165 WMM 64 WMM QoS 64, 71 WPA 76, 161 key caching 163 ZyXEL NWA-1100 Users Guide 205 Index pre-authentication 163 user authentication 163 vs WPA-PSK 162 wireless client supplicant 163 with RADIUS application example 163 WPA capability to Windows XP 163 WPA2 76, 161 user authentication 163 vs WPA2-PSK 162 wireless client supplicant 163 with RADIUS application example 163 WPA2-MIX 76 WPA2-Pre-Shared Key 162 WPA2-PSK 162 application example 164 WPA2-PSK-MIX 77 WPA-PSK 162 application example 164 Z ZyXEL Device Ethernet parameters 97 good habits 31 Introduction 25 managing 30 resetting 36, 126 Security Features 30 What to Log 119 206 ZyXEL NWA-1100 Users Guide
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2008-08-21 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2008-08-21
|
||||
1 | Applicant's complete, legal business name |
ZyXEL Communications Corporation
|
||||
1 | FCC Registration Number (FRN) |
0021059092
|
||||
1 | Physical Address |
No.2, Industry East Road IX, Science Park
|
||||
1 |
Hsinchu, N/A
|
|||||
1 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
h******@atcb.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
I88
|
||||
1 | Equipment Product Code |
NWA1100
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
E**** B******
|
||||
1 | Title |
Section Manager
|
||||
1 | Telephone Number |
886 3******** Extension:
|
||||
1 | Fax Number |
886 3********
|
||||
1 |
E******@zyxel.com.tw
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Intertek Testing Services Taiwan Ltd.
|
||||
1 | Name |
K****** C******
|
||||
1 | Physical Address |
No.11, Ko-Tze-Nan Chia-Tung Li, Shiang-Shan
|
||||
1 |
Hsinchu, 300
|
|||||
1 |
Taiwan
|
|||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
K******@intertek.com
|
|||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Access Point | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power Output listed is Conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Intertek Testing Services Taiwan Ltd.
|
||||
1 | Name |
A****** L******
|
||||
1 | Telephone Number |
886-3******** Extension:
|
||||
1 | Fax Number |
886-3********
|
||||
1 |
a******@intertek.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 20 | 2412.00000000 | 2462.00000000 | 0.7660000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC