ZyXEL NWA-3166 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL NWA-3166, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL NWA-3166 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of ZyXEL NWA-3166. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of ZyXEL NWA-3166 should contain:
- informations concerning technical data of ZyXEL NWA-3166
- name of the manufacturer and a year of construction of the ZyXEL NWA-3166 item
- rules of operation, control and maintenance of the ZyXEL NWA-3166 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL NWA-3166 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL NWA-3166, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL NWA-3166.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL NWA-3166 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    www .zyxel.com www .zyxel.com NW A-3160 Series Models: NW A-3160, NW A-3163 & NW A-3166 Copyright © 2010 ZyXEL Communications Corporation Firmware V ersion 3.70 Edition 3, 01/2010 Default Login Details IP Address http://192.168.1.2 Pa ss wo rd 1234[...]

  • Page 2

    [...]

  • Page 3

    About This User's Guide NWA-3160 Series User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NW A using the web configur ator . Tip s for Reading User ’ s Guides On-Screen When reading a Zy XEL User’s Guide On -Screen, k eep the following in mind: • If you don’ t a[...]

  • Page 4

    About This User's Guide NWA-3160 Series User’s Guide 4 • Support Disc Re fer to the included CD for support d ocuments. Documentation Feedback Send your comments, questions or su ggestions to: techwriters@zyxel.com.tw Thank you! The T echnical W riting T eam, ZyXEL Communications Corp. , 6 Innovat ion Road II, Science-Based Industrial P ar[...]

  • Page 5

    About This User's Guide NWA-3160 Series User’s Guide 5 Customer Support Should problems arise that cannot be solved by the methods listed above, you shou ld con tact yo ur ven dor . I f you ca nnot cont act you r vend or , th en co ntac t a Z yXEL office fo r the region in wh ich you bought the de vice. See http://www .zyxel.com/web/contact_[...]

  • Page 6

    Document Conventions NWA-3160 Series User’s Guide 6 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User’ s Guide. W arnings tell you about things th at could harm you or your NW A. Note: Notes tell you other import ant informat ion (for e xample, other things you may need to configure or help ful tip[...]

  • Page 7

    Document Conventions NWA-3160 Series User’s Guide 7 Icons Used in Figures Figures in this User’s Guide use the following generic icons. The NW A icon is not an exact representation of your NWA. Graphics in this book may differ slight ly from the product due to differences in operating systems, operati ng system versions , or if you installed up[...]

  • Page 8

    Safety Warnings NWA-3160 Series User’s Guide 8 Safety Warnings • Do NO T use this product near water , for exam ple, in a wet basement or near a swimming pool. • Do NO T expose your device to dampness, dust or corrosive liquids. • Do NO T store things on the device. • Do NOT install, use, or service this device during a thunderstorm. Ther[...]

  • Page 9

    Contents Overview New Template User’s Guide 9 Contents Overview Introduction .......................................... ..................................................... ................... .......... 21 Introduction ............ ............. ................ ............. ................ ............. ................ ............. .. ....[...]

  • Page 10

    Contents Overview New Template User’s Guide 10[...]

  • Page 11

    Table of Contents NWA-3160 Series User’s Guide 11 Table of Contents About This User's Guide . ............................................................... ........................................ .. 3 Document Conventions.................................................................. ......................................... .6 Safety [...]

  • Page 12

    Table of Contents NWA-3160 Series User’s Guide 12 3.1 Overview ... ................ ............. ................ ............. ................. ............ ................. ....... ............ 39 3.2 How to Configure the Wirele ss LAN ... ............. ............. ................ ............. ................ .......... 39 3.2.1 Choosin[...]

  • Page 13

    Table of Contents NWA-3160 Series User’s Guide 13 Part II: The Web Configurato r ................................... ............................ 79 Chapter 4 St atus Screen .................................................................................. ................................ ........ 81 4.1 Overview ... ................ ............[...]

  • Page 14

    Table of Contents NWA-3160 Series User’s Guide 14 7.5.1 Administrator Authentic ation on RADIUS ............ ................ ................ ................ ......1 17 7.5.2 Pre-defined NTP Time Servers List ........... ................. ................ ................ ............... 1 17 Chapter 8 Wireless Screen ..........................[...]

  • Page 15

    Table of Contents NWA-3160 Series User’s Guide 15 10.1 Overview ........... ................ ............. ................ ................ ............. ................ ............ ......... 159 10.1.1 What Y ou Can Do in th e Wireless Security Screen .. ......... ............. ................ ........ 159 10.1.2 What Y ou Need T o Know Abou[...]

  • Page 16

    Table of Contents NWA-3160 Series User’s Guide 16 14.3.1 W AN IP Address Assignment ............... ............. ............. ................ ............. ........... 189 Chapter 15 Rogue AP Detection ............................................................................. ........................... 191 15.1 Overview ........... .......[...]

  • Page 17

    Table of Contents NWA-3160 Series User’s Guide 17 18.2.2 My Certificates Create Screen ....... ................ ............. ................ ................ ........... 226 18.2.3 My Certificates Details Screen ............. ................ ................ ............. ................ ..... 229 18.3 T rusted CAs Screen ....................[...]

  • Page 18

    Table of Contents NWA-3160 Series User’s Guide 18 21.1.1 What Y ou Need to Know About Load Balancing ............... ................ ............. ........ 269 21.2 The Load Bala nc ing Screen .... ............ ................. ................ ............. ................ ............. . 271 21.2.1 Disassociating and Delaying Connection s ..[...]

  • Page 19

    Table of Contents NWA-3160 Series User’s Guide 19 Appendix C IP Addresses and Subnetting .......................... ................................................. 327 Appendix D T ext File Based Auto Configuration ................. ................................................. 349 Appendix E How to Access and Use the CLI ..................[...]

  • Page 20

    Table of Contents NWA-3160 Series User’s Guide 20[...]

  • Page 21

    21 P ART I Introduction Introduction (23) The W eb Configur ator (35) Tu t o r i a l s ( 3 9 )[...]

  • Page 22

    22[...]

  • Page 23

    NWA-3160 Series User’s Guide 23 C HAPTER 1 Introduction Note: This User ’s Guide includes the NW A-3160, NWA-3163 an d the NW A-3166. Illustrations used throughout this book are based on the NW A-3160 (u nless otherwise stated). The W eb Config uration screens are based on the NW A-3166 (unless otherwise stated). 1.1 Overview Y our NWA extends [...]

  • Page 24

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 24 1.2 Applications for the NW A The NWA can be configured to use the following WLAN oper ating modes • Access P oint •B r i d g e / R e p e a t e r •A P + B r i d g e •M B S S I D Applications for each oper ating mode are shown below . 1.2.1 Access Point The NWA i s an ideal access sol[...]

  • Page 25

    Chapter 1 Introduction NWA-3160 Series User’s Guide 25 1.2.2 Bridge / Repeater The NWA can act as a wireless network bridge and establis h wireless links with other APs. In the figure below , the two NW As ( A and B ) are connected to independent wired net works and have a bridge connection ( A can communicate with B ) at the same time. A NW A in[...]

  • Page 26

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 26 Figure 3 Repeater Application 1.2.2.1 Bridge / Re peater Mode Example In the example below , when both NW As ar e in Bridge / R epeater mode, they form a WDS (Wireless Distri bution System) allowi ng the computers in LAN 1 to connect to the computers in LAN 2 . Figure 4 Bridging Example Be c[...]

  • Page 27

    Chapter 1 Introduction NWA-3160 Series User’s Guide 27 • If two or more NW As (in bridge mode) are connected to the same hub . Figure 5 Bridge Loo p: T wo Brid ges Connected to Hub • If your NW A (in bridge mode) is connec ted to a wired LAN while communicating with another wireless bridge that is also connected to the same wired LAN. Figure [...]

  • Page 28

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 28 1.2.3 AP + Bridge In AP + Bridge mode, the NW A supports bo th AP and bri dge connection at the same time. In the figure below , A and B use X as an AP to access the wired network, while X and Y communicate in bridge mode. When the NWA is in AP + Bridge mo de, securi ty between APs (WDS) is [...]

  • Page 29

    Chapter 1 Introduction NWA-3160 Series User’s Guide 29 provides multiple virt ual APs, each forming its own BSS and using its own individual S SID profile. Y ou can configure up to sixteen SSID profile s, and have up to ei ght active at any one time. Y ou can assign different wireless and securi ty settings to each SSID profile. This allows you t[...]

  • Page 30

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 30 1.2.5 Pre-Configured SSID Profiles The NWA has two pre-configured S SID profiles. • VoIP_SSID . This profile is intended for use b y wireless clients requiring t he highest QoS level for V oIP telephony and other appl ications requiring low latency . The QoS level of this profile is not us[...]

  • Page 31

    Chapter 1 Introduction NWA-3160 Series User’s Guide 31 The following figure ill ustrates a CA PWAP wireless network. The user ( U ) configures the controller AP ( C ), which then automatically updates the configurations of th e managed APs ( M1 ~ M4 ). Figure 9 CAPW A P Network Example 1.4 W ays to Manage the NW A Use any of the following methods[...]

  • Page 32

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 32 • Back up the configur ation (and make sure you know how to restore it). Restoring an e arlier wo rking conf iguratio n may be usef ul if the device becomes unstable or even cr ashes. If you f orget your password, you will have to reset the NWA to its factory default settings. If you backe[...]

  • Page 33

    Chapter 1 Introduction NWA-3160 Series User’s Guide 33 1.7 LEDs Note: The figures shown in this section are from the NW A-3160. Y our device may differ in minor ways. Figure 1 1 LEDs T able 1 LEDs LABEL COLOR STATUS DESCRIPTION WDS Off Either • The NWA is in Access Point or MBS SID mode and is functioning normally . or • The NWA is in AP + Br[...]

  • Page 34

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 34 WLAN Green On The wireless LAN is active. Blinking The wireless LAN is active, and tr ansmitting or receiving data. Off The wireless LAN is not active. ETHERNET Green On The NWA has a 10 Mbps Ethernet connection. Blinking The NW A has a 10 Mbps Ethernet connection and is sending or receiving[...]

  • Page 35

    NWA-3160 Series User’s Guide 35 C HAPTER 2 The Web Configurator 2.1 Overview This chapter describes how to access the NWA’ s web configurator and provides an overview of its screens. 2.2 Accessing the W eb Configurator 1 Make sur e yo ur ha rdwa re i s pr ope rly connected and prepare your computer or computer network to connect to the NW A ( r[...]

  • Page 36

    Chapter 2 The Web Configurator NWA-3160 Series User’s Guide 36 6 Click Apply in the Replace Certificate screen to create a certificate using y our NWA’ s MAC address that will be specific to this device. Y ou should now see the Status screen. See Chapter 2 on page 35 for details about the Status screen. Note: The management session automaticall[...]

  • Page 37

    Chapter 2 The Web Configurator NWA-3160 Series User’s Guide 37 Click LOGOU T at any time to exit the web configurator . Check the status bar at the bottom of the screen when you click Apply or OK to verify that the c onfiguration has been updated. Figure 12 The S tatus Screen • Click the links on the left of the screen to configure advanced fea[...]

  • Page 38

    Chapter 2 The Web Configurator NWA-3160 Series User’s Guide 38[...]

  • Page 39

    NWA-3160 Series User’s Guide 39 C HAPTER 3 Tutorials 3.1 Overview This chapter first pro vides a basic ov erview of how to configure the wireless LAN on your NW A, and then giv es step-by -st ep guidelines showing how to configure your NW A for some example scenarios. 3.2 How to Configure the Wireless LAN This section shows how to choose which wi[...]

  • Page 40

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 40 3.2.2 Wireless LAN Configuration Overview The following figure shows the steps you should tak e to configure the wireless settings according to the operating mode you select. Use the W eb Configur ator to set up your NW A’s wireless network (see your Quick Start Guide for information on settin[...]

  • Page 41

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 41 3.2.3 Further Reading Use these links to find more information on the steps: • Choosing 802.11 Mode : see Section 8.2.1 on page 123 . • Choosing a wireless Channel ID : see Section 8.2.1 on page 123 . • Selecting and configuring SSID profile (s): see Secti on 8.2.1 on page 123 and Section [...]

  • Page 42

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 42 The following figure shows the multiple ne tworks you want to set up. Y our NWA is marked Z , the main network router is marked A , and your network printer is marked B . Figure 14 T utorial: Example MBSSID Setup The standard network ( SSID04 ) has access to all resources. The V oIP network ( Vo[...]

  • Page 43

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 43 3.3.1 Change the Operating Mode Log in to the NWA (see Section 2.2 on page 35 ). Click Wireless > Wireless . The Wireless screen appears. 3.3.1.1 Access Point Set the NWA is in Access Point operating mode, and is currently set to use the SSID03 profile. Figure 15 T utorial: Wireless LAN: Befo[...]

  • Page 44

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 44 3.3.1.2 MBSSID Select MBSSID from the Operat ing Mode dr op-down list box. The screen displays as foll ows. Figure 16 T utorial: Wireless LAN: Change Mode This Select SSID Profile table allows you to activate or deactivate SSID profiles. Y our wireless network was previously using the SSID0 3 pr[...]

  • Page 45

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 45 3.3.2 Configure the V oIP Network Next, click Wireless > SSID . The following screen displa ys. Note that the SSID03 SSID profile (t he standard network) is using t he security01 security profile. Y ou cannot change this security profile without changing the standard network’ s par ameters,[...]

  • Page 46

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 46 1 Choose a new SSID for the V oIP network. In this example, enter VOIP_SSID_Example . Note that although the SSID changes, the SSID profi le name ( VoIP_SSID ) remains the same as before. 2 Select Enable from the Hide Name (SSID) list box. Y ou want only authorized company employ ees to use this[...]

  • Page 47

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 47 Y ou already chose to use the security02 profile for this netw ork, so select the radio button for security02 and click Edit . The following screen appears. Figure 20 T utorial: V oIP Security Profile Edit 1 Change the Name field to “V oIP_Security” to make it easier to remember and identify[...]

  • Page 48

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 48 3.3.2.2 Activate the V oIP Profile Y ou need to activate the VoIP_SSID profil e before it can be used. Click the Wireless tab. In the Select SSID Profile table, select the VoIP_SSID profile and click Apply . Figure 22 T utorial: Activate V oIP Profile Y our V oIP wireless network is now ready to[...]

  • Page 49

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 49 Click Wirel ess > SSID . Select Guest_SSID ’ s entry in the list and click Edit . The following screen appears. Figure 23 T utorial: Guest Edit 1 Choose a new SSID for the guest ne twork. In this example, enter Guest_SSID_Example . Note that although the SSID changes, the S SID profile name[...]

  • Page 50

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 50 3.3.3.1 Set Up Security for the Guest Profile Now you need to configure the se curity settings to use on the guest wireless network. Click the Security tab. Y ou already chose to use the security03 profile for this ne twork, so select security03 ’ s entry in the list and click Edit . The follo[...]

  • Page 51

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 51 3.3.3.2 Set up Layer 2 Isolation Configure layer 2 isolation to control the speci fic devices you w ant the users on your guest network to access. Click Wireless > Layer-2 Isol ation . The following screen appears. Figure 26 T utorial: Layer 2 Isolation The Guest_SSID network uses the l2isola[...]

  • Page 52

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 52 3.3.3.3 Activate the Guest Profile Y ou need to activate the Guest_SSID prof ile before it can be us ed. Click the Wireless tab. In the Select SSID Profile table, select the check box for the Guest_SSID profile and click Apply . Figure 28 T utorial: Activate Guest Profile Y our Guest wireless ne[...]

  • Page 53

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 53 3.4 How to Set Up and Use Rogue AP Detection This example shows you how to configur e the rogue AP detection feature on the NWA. A rogue AP is a wireless access point oper ating in a network’ s coverage area that is not a sanctioned part of that networ k. The example also shows how to set the [...]

  • Page 54

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 54 E , and a computer , marked F , connected to the wi red network. The coffee shop ’ s access point is marked 1 . Figure 29 T utorial: Wireless Network Example In the figure, the solid ci rcle represents the r ange of y our wireless network, and the dashed circle represents the extent of the cof[...]

  • Page 55

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 55 Note: The NW A can detect the MAC addre sses of APs automatically . However , it is more secure to obt ain the correct MAC addresses from an other source and add them to the friendly AP list manually . For example, an attacker’s AP mimicking the correct SSID could be placed on the friendly AP [...]

  • Page 56

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 56 Note: Y ou can add APs that are not p art of your network to the friendly AP list, as long as you know that they do not pose a threat to your network’s security . The Friendly AP screen now appears as follows. Figure 31 T utorial: Friendly AP (After Dat a Entry) 3 Next, you will sav e the list[...]

  • Page 57

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 57 4 Click Export . If a window similar to the following appears, click Save . Figure 33 T u torial: W arning 5 Save the friendly AP list somewhere it can be accessed by all t he other access points on the network. In this example, save it on the net work file server ( E in Figure 29 on page 54 ). [...]

  • Page 58

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 58 3.4.2 Activate Periodic Rogue AP Detection T ake the following steps to activ ate rogue AP det ection on the first of your NW As. 1 In the ROGUE AP > Configuration screen, se lect Enable from the Rogue AP Period Detection field. Figure 35 T utorial: Periodic Rogue AP Detection 2 In the Period[...]

  • Page 59

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 59 3.4.3 Set Up E-mail Logs In this section, you will configure the firs t of y our four APs to send a log message to your e-mail inbox whenever a rogue AP is disco vered in your wireless network’ s cover age area. 1 Click LOGS > Log Settings . The following screen appears. Figure 36 T utorial[...]

  • Page 60

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 60 5 In the Send Immediate Alert section, sele ct the events you w ant to trigger immediate e-mails. Ensure that Rogue AP is selected. 6 Click Apply . 3.4.4 Configure Y our Other Access Point s Access point A is now configured to do the foll owing. • Scan for access points in its co ver age area [...]

  • Page 61

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 61 • If y ou have an other access point that i s not used in y our network, mak e a note of its MAC address and set i t up next to each of your NWAs in turn while the network is runn ing. Either wait for at least ten minutes (to ensure the NWA performs a scan in that time) or login to the NWA’ [...]

  • Page 62

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 62 NWA i s marked Z . C is a workstation on your wired ne twork, D is your main network switch, and E is the security gateway you use to connect to the Internet. Figure 37 T utorial: Example Network 3.5.2 Y our Requirement s 1 Y ou want to set up a wireless network to allow only Alice to access Ser[...]

  • Page 63

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 63 Each SSID profile already uses a different pre-shared key . In this example, you will configure access limitations for each SSID profile. T o do this, you will ta ke the follo wing step s. 1 Configure the SERVER_1 network’ s SSID profile to use specific MAC filter and layer -2 isolation profil[...]

  • Page 64

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 64 T ake the following steps to configure the SERVER_1 network. 1 Log into the NWA’ s W eb Configurator and cl ick Wireless > SSID . The following screen displays, showing the SS ID profiles you already configured. Figure 38 T utorial: SSID Profile[...]

  • Page 65

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 65 2 Select SERVER_1 ’ s entry and click Edit . The following screen displa ys. Figure 39 T utorial: SSID Edit Select l2Isolation03 in the L2 Isolation field, and select macfilter03 in the MAC Filtering field. Click Apply . 3 Click the Layer-2 Isol ation tab. When the Layer-2 Isolation screen app[...]

  • Page 66

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 66 8 Enter the MAC address of the device Alice uses to connect to the network in Index 1 ’s MA C Address field and enter her name in the Description field , as shown in the following figure. Change the Profile Name to “MacFilter_SERVER_1” . Select Allow Association fro m the Filter Action fie[...]

  • Page 67

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 67 3.5.6 Checking your Settings and T esting the Configuration Use the following sections to ensure th at your wireless networks are set up correctly . 3.5.6.1 Checking Settings T ake the following steps to chec k that the NWA is using the correct SSI Ds, MAC filters and laye r-2 isolation profiles[...]

  • Page 68

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 68 If the settings are not as s hown, follow the steps in t he relevant section of this tutorial again. 3.5.6.2 T esting the Con figuration Before you allow employ ees to use the ne twork, y ou need to thoroughly test whether the setup behaves as it should. T ake the following steps to do this. 1 T[...]

  • Page 69

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 69 3.6 How to Configure Management Modes This example shows you how to configure the NWA’ s controller AP and managed AP modes. Note: If you are using several NW A models in your network including an NW A-3166, you should use the NW A-3166 as the Controller AP . 3.6.1 Scenario In this example, yo[...]

  • Page 70

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 70 3.6.2 Y our Requirement s 1 Y ou want to manage the APs in your company using one controller AP’ s W eb Configurator . That is, you only need to know one IP address to ed it the settings of the NWAs i n your wireless network. 2 Y ou want to have a backup of the NWA controller AP configur ation[...]

  • Page 71

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 71 4 Check your settings and test the configur ation. This example uses screens from G- 302 v3, a wireless client that will try to access one of the mananged APs, for this section. 3.6.4 Configure Y our NW A in Controller AP Mode The NWA i s set to Standalone AP mode by default. After y ou have mad[...]

  • Page 72

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 72 This happens when the primary contr oller AP is disconnected from the network, rebooting or turned off . Note: While the primary controller AP is online, the seco ndary controller AP cannot configure any of the managed APs. However , it still has to be turned on to synchronize with the primary c[...]

  • Page 73

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 73 2 Enable Redundancy . Then select Primary AP Controller and enter the IP address of the secondary controller AP (required). Click Apply . Note: Only NW As in managed AP mode are visible to the controller AP . 3.6.5 Setting Y our NW A in Managed AP Mode After setting the NW As ( A and E ) to cont[...]

  • Page 74

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 74 Y ou must now add the NW A managed APs to the controller’ s managed AP list. 3.6.6 Configuring the Managed Access Point s List At this point, you have 3 NWA managed APs ( B , C and D ) that can now be managed b y the prima ry controlle r AP . First in the W eb Config urator of your primary con[...]

  • Page 75

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 75 1 T o add a managed AP to the controller AP’ s cover age, go to Controller > AP Lists . Figure 50 T utorial: AP List (Un-Managed) 2 Select the NW A managed APs from the Un-Managed Access Points List as shown in the screen above. Y ou can also id entify these managed APs by filling in the De[...]

  • Page 76

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 76 T urn on a WLAN Radio Profile by sele cting the managed AP from the list and clicking Edit . Figure 51 T utorial:AP List (Managed) 4 In the screen that opens, choose the radi o profile for each WLAN radio and click Apply . Figure 52 T utorial: Managed AP WLAN Radio Profile In this example, the 1[...]

  • Page 77

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 77 3.6.7 Checking your Settings and T esting the Configuration The NWAs s hould be working at this point. Y ou can configure the setti ngs of each NWA uni t by just opening the W eb Configurator of the primary controller AP . One way t o test if the setup is working is to use a wireless client to c[...]

  • Page 78

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 78[...]

  • Page 79

    79 P ART II The W eb Configurator Status Screen (81) Management Mode (87) System Screens (109) Wireless Screen (119) SSID Screen (149) Wireless Security Screen (159) RADIUS Screen (173) Layer -2 Isolation Screen (177) MAC Filter Screen (183) IP Screen (187) Rog ue AP Detection (191) Re mote Management Screens (199) Internal RADIUS Server (213) Cert[...]

  • Page 80

    80[...]

  • Page 81

    NWA-3160 Series User’s Guide 81 C HAPTER 4 Status Screen 4.1 Overview The Status screen displays when you log int o the NWA or click Status in the navigation menu. Use this screen to look at the current status of the device, system resources, and interfaces . The Status screen also pro vides detailed information about sys tem statistics, associat[...]

  • Page 82

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 82 The following table describes t he labels in this screen. T able 8 The Status Screen LABEL DESCRIPTION Automatic R efresh Interval Enter how often you w ant the NWA to update this screen. R efresh Click this to update this screen immediately . System Information System Name This field displa[...]

  • Page 83

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 83 Status This field indicates whether or not the NWA is using the interface. For each interface, this field displays Up when the NW A is using the interface and Down when the NW A is not using the interface. Channel This field displays the wireless channel the AP is currently using. Rate For t[...]

  • Page 84

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 84 4.2.1 System S t atistics Screen Use this screen to view di agnostic information about the NWA. Clic k Show Statistics in the Status screen. The following screen pops up. Note: The Poll Interval field is configurable. The fields in this screen va ry according to the current wireless mode of [...]

  • Page 85

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 85 Re mote Bridge MAC This is the MAC address of the peer device in bridge mode. Status This shows the current status of the bridge connection, which can be Up or Down . TxPkts This is the number of transmitted pack ets on the wireless bridge. RxPkts This is the number of received packets on th[...]

  • Page 86

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 86[...]

  • Page 87

    NWA-3160 Series User’s Guide 87 C HAPTER 5 Management Mode 5.1 Overview This chapter discusses using the NWA in management mode. This screen determines whether the NWA is used in its default standalone mode, or as part of a Control And Provisioning of Wireless Access P oints ( CAPWAP) network. 5.2 About CAPW AP The NWA s upports CAPWAP . This is [...]

  • Page 88

    Chapter 5 Manage ment Mode NWA-3160 Series User’s Guide 88 Note: The NW A can be a controller AP , standalone AP (default) or a CAPW AP managed AP . Note: If you are using several NW A models in your network including an NW A-3166, you should use the NW A-3166 as the Controller AP . 5.2.1 CAPW AP Discovery and Management The link between CAPWAP-e[...]

  • Page 89

    Chapter 5 Manag ement Mode NWA-3160 Series User’s Guide 89 DHCP Option 43 allows the CAPWAP management request (from the AP in managed AP mode) to reach th e AP control ler in a diff erent subnet, as shown in the following figure . Figure 57 CAPW AP and DHCP Option 43 5.2.4 Notes on CAPW AP This section lists some additional features of Z yXEL ?[...]

  • Page 90

    Chapter 5 Manage ment Mode NWA-3160 Series User’s Guide 90 Click MGNT MODE in the NW A’ s navigation menu . The following screen displa ys. Figure 58 Managemen t Mode The following table describes t he labels in this screen. T able 10 Management Mode LABEL DESCRIPTION AP Controller Select this option to have th e NWA act as a managin g device f[...]

  • Page 91

    Chapter 5 Manag ement Mode NWA-3160 Series User’s Guide 91 Apply Click this to save your changes. If you change the mode in this screen , the NWA restarts. W ait a short while before you attem pt to log in again. If you changed the mode to Managed AP , you cannot log in as the web configur ator is disabled; you must manage the NWA through the man[...]

  • Page 92

    Chapter 5 Manage ment Mode NWA-3160 Series User’s Guide 92[...]

  • Page 93

    NWA-3160 Series User’s Guide 93 C HAPTER 6 AP Controller Mode 6.1 Overview This chapter discusses the Controller AP management mode. When the NW A is used as a CAPW AP (Control And Pro visioning of Wireless Access P oints) controll er AP , the W eb Configurator changes to reflect this by including the Controller and Profile Edit screens. Ref e r [...]

  • Page 94

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 94 In the figure below , an administr ator is ab le to manage t he security settings of 5 APs (1 controller AP and 4 managed APs ). He changes the s ecurity mode to WP A- PSK just by accessing the W eb Configurator of the controller AP ( C ). Figure 59 CAPW AP Controller Note: Be careful w[...]

  • Page 95

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 95 Note: The NW A reboot s every time you change mode in the MGMT MODE screen. Y ou can switch from St a ndalone AP to Controller AP (and vice versa) using the Web Configurator . After logging in again, the na vigation menu changes to include links f or the Controller and Profile Edit scre[...]

  • Page 96

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 96 Click Status . The fo llowing screen displays. Figure 62 S tatus Screen The following table describes t he new labels in this screen. T able 1 1 Status Screen LABEL DESCRIPTION System Information Re gistration T ype This field displays how the managed APs are registered with the NW A. M[...]

  • Page 97

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 97 6.4 AP List s Screen Use this screen to view and add managed APs. By default, the controller NW A is always included in this table. Although y ou cannot remove it, y ou can edit its settings. 2.4GHz This field displays the number of wireless clients associated with APs managed by the NW[...]

  • Page 98

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 98 Click Controller > AP Lists . The following screen displa ys. Figure 63 AP List s Screen The following table describes t he labels in this screen. T able 12 AP Lists Screen LABEL DESCRIPTION Managed Access Po i n t s L i s t This section lists the access point s currently controlled [...]

  • Page 99

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 99 Status This displays whether the managed AP is activ e, not active or upgrading its firmware. • Red : the AP is not active. • Green : the AP is active. • Yellow : the AP is upgrading its firmw are. Note: Y ou can still edit a managed AP’ s settings even if it is offline. However[...]

  • Page 100

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 100 6.4.1 The AP List s Edit Screen Use this screen to change th e description or radio profile of an AP managed by the NWA. Click Edit in the CONTROLL ER > AP Lists screen. The following screen displays. Figure 64 AP Configuration Screen The following table describes t he labels in thi[...]

  • Page 101

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 101 6.5 Configuration Screen Use this screen to control the way in which the NWA acc epts new APs to manage. Y ou can also configure the pre-shared key (PSK) that is used to secure the d ata transmit ted between the NWA and the APs it manages. When the NWA is in AP controller mode, click C[...]

  • Page 102

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 102 6.6 Redundancy Screen Use this screen to set t he controller AP as a primary or secondary controller . If you set your NW A as a primary controller AP , you can have a secondary controller AP to serve as a backup. All configurations are synchronized between the NWA and t he secondary c[...]

  • Page 103

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 103 6.7 The Profile Edit Screens This section describes the Profile Edit screens, which are available on ly in A P controller mode. The following Profile Edit screens are ide ntical to those in standalone mode: •T h e Profile Edit > SSID screen (see Section 9.2 on page 151 ). •T h e[...]

  • Page 104

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 104 The following table describes t he labels in this screen. 6.7.2 The Radio Profile Edit Screen Use this screen to conf igure a specific r adio profile. In the Profile Edit > Radio screen, select a profile and click Edit . The following screen displays. Figure 68 Radio Edit Screen T a[...]

  • Page 105

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 105 The following table describes t he labels in this screen. T able 17 Radio Edit Screen LABEL DESCRIPTION Profile Name Enter a name identifying this profile. Radio Mode This makes sure that only compliant WLAN devices can associate with the NW A. Select 802.11 b Only to allow only IEEE 8[...]

  • Page 106

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 106 Disable channel switching for DFS This field displays only when you select 802.11a or 802.11n/a in the 802.11 Radio Mode field. Select this if you do n ot want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same c[...]

  • Page 107

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 107 RT S / C T S T h r e s h o l d Use RT S/CTS to reduce data collisions on the wireless network if you have wireless clients that are associated with the same AP but out of ran ge of one another . When enabled, a wireless client sends an R TS (R equest T o Send) and then waits for a CTS [...]

  • Page 108

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 108 MCS T able The MCS Rate table is av ailable only when 802.11n/g or 802.11n/a is selected as the 802.11 Radio Mode . IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands for Modulation and Coding Scheme. This is an 802.11n feature that increases the wir[...]

  • Page 109

    NWA-3160 Series User’s Guide 109 C HAPTER 7 System Screens 7.1 Overview This chapter provides information and i nstructions on how to identify and manage your NW A ov er the network. Figure 69 NW A Setup In the figure abov e, the NWA ( ZyXEL Device ) connects to a Domain Name Serv er (DNS) server to av ail of a domain name. It also connects to an[...]

  • Page 110

    Chapter 7 System Screens NWA-3160 Series User’s Guide 11 0 7.1.2 What Y ou Need T o Know About the System Screens The following terms and conc epts may he lp as you read through the chapter . IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Intern et, for instance, only bet[...]

  • Page 111

    Chapter 7 S ystem Scre ens NWA-3160 Series User’s Guide 111 Onc e you have d eci de d on the net wor k nu mbe r , p ick an I P ad dre ss t hat is e asy to remember , for instance, 192.168.1.2, for your devic e, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an I[...]

  • Page 112

    Chapter 7 System Screens NWA-3160 Series User’s Guide 11 2 Administrator Inactivity Timer T ype how many minut es a manage ment ses sion can be left idle before the session times out. The default is 5 minutes. After it times out you hav e to log in with your password again. V ery long id le timeouts may have security risks. A value of "0&quo[...]

  • Page 113

    Chapter 7 S ystem Scre ens NWA-3160 Series User’s Guide 11 3 7.3 Password Screen Use this screen to control access to your NW A by assigning a password to it. Click System > Password . The following screen displays. Figure 71 System > Password. Note: Even if you uncheck Enable Admin at L ocal, you still use the password set here to log in v[...]

  • Page 114

    Chapter 7 System Screens NWA-3160 Series User’s Guide 11 4 Use new setting Select this if you w ant to change the RADIUS username and password the NW A uses to authenticate management logon. User Name Enter the username for this user accoun t. This name can be up to 31 ASCII characters long, including spaces. P assword T ype a password (up to 31 [...]

  • Page 115

    Chapter 7 S ystem Scre ens NWA-3160 Series User’s Guide 11 5 7.4 T ime Setting Screen Use this screen to change your NW A’ s time and date, click System > Time Setting . The following screen displays. Figure 72 System > T ime Setting The following table describes t he labels in this screen. T able 21 System > Time Setting LABEL DESCRIP[...]

  • Page 116

    Chapter 7 System Screens NWA-3160 Series User’s Guide 11 6 New Date (yyyy:mm:dd) This field displays the last updated date from the time server or the last date configured manually . When you set Time and Date Setup to Manual , enter the new date in this field and then click Apply . Get from Time Server Select this radio button to ha ve the NW A [...]

  • Page 117

    Chapter 7 S ystem Scre ens NWA-3160 Series User’s Guide 11 7 7.5 T echnical Reference This section provi des some technical information about the topics cov ered in this chapter . 7.5.1 Administrator Authentication on RADIUS The administr ator authentication on RADIUS feature lets a (external or internal) RADIUS server authenticate management log[...]

  • Page 118

    Chapter 7 System Screens NWA-3160 Series User’s Guide 11 8 When the NWA uses the pre-defi ned list of NTP time serv ers, it r andomly selects one server and tries t o synchronize with it . If the synchronization fails, then the NWA goes through the rest of the list in order from the first one tried until either it is successful or all t he pre-de[...]

  • Page 119

    NWA-3160 Series User’s Guide 11 9 C HAPTER 8 Wireless Screen 8.1 Overview This chapter discusses the steps to confi g ure the Wireless Settings screen on the NWA. It also introduces the wireless LAN (WLAN) and some basic scenarios. Figure 73 Wirele ss Mode In the figure above, the NWA ( ZyXEL D evice ) allows access to another bridge device ( A )[...]

  • Page 120

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 120 8.1.2 What Y ou Need T o Know About the Wireless Screen The following terms and conc epts may he lp as you read through this chapter . BSS A Basic Service Set (BS S) exists when all communicat ions between wireless stations or between a wireless station an d a wired network client go thr[...]

  • Page 121

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 121 An ESSID (ES S IDentification) uniquely id entifies each ESS . All access points and their associated wireless stations within the same ESS must hav e the same ESSID in order to comm unicate. Figure 75 Extended Service Set Operating Mode The NWA can run in four operating modes as fol low[...]

  • Page 122

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 122 SSID The SSID (Service Set IDenti fier) identifies the Service Set wi th which a wireless station is associated. Wireless stations a ssociating to the access point (AP) must have the same SSID . Normally , the NWA acts lik e a beacon and regularly broadcasts the SSID in t he area. Y ou c[...]

  • Page 123

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 123 • Y ou must use different WEP k eys for different BS Ss. If two stations ha ve different BSSIDs (they are in different BSSs) , but have the same WEP keys, they may hear each other’ s communicati ons (b ut not communicate with each other). • MBSSID shoul d not replace but r ather be[...]

  • Page 124

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 124 The following table describes t he genera l wireless L AN labels in this screen. T able 23 Wireless: Access Point LABEL DESCRIPTION Operating Mode Select Access Point from the drop-down list. 802.11 Mode This makes sure that only compliant WLAN devices can associate with the NW A. Select[...]

  • Page 125

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 125 Disable channel switching for DFS This field displays only when you select 802.11a or 802. 11n/a in the 802.11 Radio Mode field. Select this if you do no t want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same ch[...]

  • Page 126

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 126 Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interv al. This specifies the time period before the device sends the beacon again. The interval tells receiving devices on the network how long they can wait in low-power mode before wak ing [...]

  • Page 127

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 127 8.2.2 Bridge / Repeater Mode Use this screen to ha ve the NW A act as a wireless network bridge / repeat er and establish wireless links with ot her APs. Y ou need to know the MAC addr ess of the peer device, which also must be in bridge / repeater mode. MCS T able The MCS Rate table is [...]

  • Page 128

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 128 Note: Y ou can view an example of this setu p in Section 8.3.3 on p age 146 . Figure 77 Wireless: Bridge / Repeater[...]

  • Page 129

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 129 The following table describes t he bridge labels in this screen. T able 24 Wireless: Bridge / Repeater LABEL DESCRIPTIONS Operating Mode Select Bridge / Repeater in this field. 802.11 mode This makes sure that only compliant WLAN devices can associate with the NW A. Select 802.11b Only t[...]

  • Page 130

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 130 Disable channel switching for DFS This field displays only when you select 802.11a or 802.11n/a in the 802.11 Radi o Mode field. Select this if you do not want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same cha[...]

  • Page 131

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 131 Output Power Set the output power of the NW A in this field. If there is a high density of APs in an area, decrease the outpu t power of the NWA to reduce interference with other APs. Select from 100% (Full Power) , 50% , 25% , 12 .5% and Minimum . See the product specifications for more[...]

  • Page 132

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 132 TKIP Select this to enable T emporal K ey Integrity Protocol (TKIP) security on your WDS. This option is compatible with other ZyXEL access points that support WDS security . Use this if the other access points on your network support WDS securit y but do not have an AES option. Note: Ch[...]

  • Page 133

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 133 8.2.3 AP + Bridge Mode Use this screen to ha ve the NW A function as a bridge and acces s point simultaneously . Select AP + Bridge as the Operating Mode . The following screen diplays. Figure 78 AP + Bridge[...]

  • Page 134

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 134 The following table describes t he bridge labels in this screen. T able 25 Wireless: AP + Bridge LABEL DESCRIPTIONS Operating Mode Select AP + Repeater in this field. 802.11 mode This makes sure that only compliant WLAN devices can associate with the NW A. Select 802.11b Only to allow on[...]

  • Page 135

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 135 Disable channel switching for DFS This field displays only when you select 802.11a or 802.11n/a in the 802.11 Radi o Mode field. Select this if you do not want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same cha[...]

  • Page 136

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 136 Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interv al. This specifies the time period before the device sends the beacon again. The interv al tells receiving devices on the network how long they can w ait in low -power mode before wakin[...]

  • Page 137

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 137 MCS T able The MCS Rate table is available only when 802.11n/g or 802.11n/a is selected as the 802.11 Radio Mode . IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands for Modulation and Coding Scheme. This is an 802.11n feature that increases the wirele[...]

  • Page 138

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 138 Enable Antenna Diversity (For NW A -3160 and NWA -3163 only) Select this to use antenna diversity . Antenna diversity uses multiple antennas to reduce signal interference. Enable Spanning Tr e e C o n t r o l ( S T P ) (R)STP ( Section 8.3.1 on page 144 ) detects and breaks network loops[...]

  • Page 139

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 139 8.2.4 MBSSID Mode Use this screen to have the NW A function in MBSSID mode. Select MBSSID as the Operating Mode . The following screen diplays. Figure 79 Wireless: MBSSID[...]

  • Page 140

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 140 The following table describes t he labels in this screen. T able 26 Wireless: MBSSID LABEL DESCRIPTION Operating Mo de Select MBSSID in this field to display the screen as shown 802.11 Mode This makes sure that only compliant WLAN devices can associate with the NWA. Select 802.11b Only t[...]

  • Page 141

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 141 Disable channel switching for DFS This field displays only when you select 802.11a or 802.11n/a in the 802.11 Radio Mode field. Select this if y ou do not want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same cha[...]

  • Page 142

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 142 Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interval. This sp ecifies the time period before the device sends the beacon again. Th e interval tells receiving devices on the network how long they can wait in low-power mode before waking [...]

  • Page 143

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 143 8.3 T echnical Reference This section provides technical background information about the topics cov ered in this chapter . Select SSID Profile An SSID profile is the set of parameters relating to one of the NW A’ s BSSs. The SSID (Service Set IDentifier) identifies the Service Set wit[...]

  • Page 144

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 144 8.3.1 S p anning T ree Protocol (STP) Spanning T ree Protocol (STP) detects and breaks network loops and pro vides backup links between switches, bridg es or ro uters. It allows a bridge to inter act with other STP-compliant bridg es in your network to ensure that only one route exists b[...]

  • Page 145

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 145 8.3.1.3 How STP Works After a bridge determines the lowest cost -spanning tree with STP , it enables the root port and the ports that are the designated ports for connected LANs, and disables all other ports that participate in STP . Network packets are therefore only forwarded between e[...]

  • Page 146

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 146 activity on t he channel you select, it automat ically instructs the wireless clients t o move to another channel , then resu mes communications on the new channel. 8.3.3 Roaming A wireless station is a device with an IEEE 802.11a/b/g compliant wireless interface. An access point (AP) ac[...]

  • Page 147

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 147 with other APs (Non- Z yXEL APs may no t be able t o perform this). 802.1x authentication information is not ex changed (at the time of writing). Figure 80 Roaming Example The steps below des cribe the roaming process. 1 Wireless station Y mo ves from the cov erage area of access point A[...]

  • Page 148

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 148 • The adjacent access points should us e differ ent radio ch annels when their cover age areas overlap. • All access points must use the same port number to relay roaming i nformation. • The access points mus t be connected to the Ethernet and be able to get IP addresses from a DHC[...]

  • Page 149

    NWA-3160 Series User’s Guide 149 C HAPTER 9 SSID Screen 9.1 Overview This chapter describes how y ou can configure Service Set Identifier (SSID) profiles in your NWA. Figure 82 Sample SSID Profiles In the figure above, the NWA has thre e SSID profiles configured: a standard profile ( SSID04 ), a p rofile with high QoS settings for V oice ov er IP[...]

  • Page 150

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 150 9.1.2 What Y ou Need T o Know About SSID The following terms and conc epts may he lp as you read through this chapter . When the NWA is set to Access P oint, AP + Bridge or MBSSID mode, you need to choose the SSID profile( s) you want to use in your wireless n etwork (see Section on page 119 [...]

  • Page 151

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 151 9.2 The SSID Screen Use this screen to select the SSID pr ofile you want to configure. Click Wireless > SSID to display the screen as shown. Figure 83 SSID The following table describes t he labels in this screen. T able 29 SSID LABEL DESCRIPTION Index This field displays the index number [...]

  • Page 152

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 152 9.2.1 Configuring SSID Use this screen to configure an SSID profile. Select a n SSID profile in Wireless > SSID and click Edit to display the following screen. Figure 84 Configuring SSID The following table describes t he labels in this screen. Layer-2 Isolation This field displays which l[...]

  • Page 153

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 153 9.3 T echnical Reference This section provides technical background information about the topics cov ered in this chapter . 9.3.1 WMM QoS WMM (Wi-Fi MultiMedia) QoS (Quality of Service) ensures qual ity of service i n wireless networks. It controls WLAN transmissi on priority on packets to be[...]

  • Page 154

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 154 On APs without WMM QoS, all tr affic stream s are given the same access priority to the wireless network. If the introduction of another tr affic stream creates a data transmission demand that exceeds the current network capacity , then the ne w traffic stream reduces the throughput of the ot[...]

  • Page 155

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 155 typical data pack et sizes. Note that the figures given are merely examples - sizes may differ acco rding to applic ation and circ umstance s. When A TC is activ ated, the device sends tr affic with smaller packets before tr affic with larger packets if the network is congested. A TC assigns [...]

  • Page 156

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 156 9.3.3.1 A TC+WMM from LAN to WLAN A TC+WMM from L AN (the wired L ocal Area Net work) to WLAN ( the Wireless Lo cal Area Network) allows WMM prioriti zation of packets that do not already have WMM QoS priorities assi gned. The NW A automatically classifies data pack ets using A TC and then as[...]

  • Page 157

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 157 based on the application types and tr affic fl ow . Pa ckets are mar ked with Dif fServ Code P oints (DSCPs) indicating the lev e l of service desired. This allows the intermediary DiffServ-compliant network de vices to handle the packets differently depending on the code points without th e [...]

  • Page 158

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 158 The foll owing tabl e lists which W MM QoS priority le vel the N WA uses for spe cific DSCP values. T able 36 ToS and IEEE 802.1d to WMM Qo S Priority Level Mapping DSCP V ALUE WMM QOS PRIORITY LEVEL 224, 192 v oice 160, 128 video 96, 0 A A. The NW A also uses best effort for any DSCP value f[...]

  • Page 159

    NWA-3160 Series User’s Guide 159 C HAPTER 10 Wireless Security Screen 10.1 Overview This chapter describes how to use t he Wireless Secu rity screen. This screen allows y ou to configure the security mode for your N WA. Wireless security is vital to your net w ork. It protects communications between wireless stations, access poi nts and the wired[...]

  • Page 160

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 160 10.1.2 What Y ou Need T o Know About Wireless Security The following terms and conc epts may he lp as you read through this chapter . User Authentication Authentication is the process of v erifying whether a wireless device is allowed to use the wireless network. Y ou can make [...]

  • Page 161

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 161 • 802.1x-Static64. This provides 802.1x -Only authentication with a static 64bit WEP key and an au then tication s erver . • 802.1x-Static128 . This provides 802.1x-Only aut hentication with a static 128bit WEP key and an authentication server . • WPA. Wi-Fi Protected Ac[...]

  • Page 162

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 162 Use this screen to choose and ed it a security profile. Click Wireless > Security . The following screen displays. Figure 87 Wirele ss Security The following table describes t he labels in this screen. T able 38 Wireless Security LABEL DESCRIPTION Index This is the index num[...]

  • Page 163

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 163 After selecting the securit y profile y ou want to edit, the following screen appears. Enter the na me you want to call th is security pr ofile in the Profile Name field. Figure 88 Security Profile The next screen varies according to the Se curity Mode you select. 10.2.1 Secur[...]

  • Page 164

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 164 Authentication Method There are two types of WEP authenti cation namely , Open System and Shared K ey . Open system is implemented for ease-of-use and when security is not an issue. The wireless station and the AP or peer computer do not share a secret key . Thus the wireless s[...]

  • Page 165

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 165 10.2.2 Security: 802.1x Only Use this screen to set t he selected profile to 802.1x Only securit y mode. Select 802.1x-Only in the Security Mode field to dis play the following screen. Figure 90 Security: 802.1x Only The following table describes t he labels in this screen. T [...]

  • Page 166

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 166 10.2.3 Security: 802.1x S t atic 64-bit, 802.1x S t atic 128-bit Use this screen to set the selected prof ile to 802.1x Static 64 or 802.1x Stati c 128 security mode. Select 802.1x Static 64 or 802.1x Static 128 in the Security Mode field to display the following screen. Figure[...]

  • Page 167

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 167 10.2.4 Security: WP A Use this screen to set the select ed profil e to Wi -Fi Protected Access (WP A) security mode. Select WPA in the Security Mode field to display the following screen. Figure 92 Security: WP A The following table describes t he labels in this screen. R eAut[...]

  • Page 168

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 168 10.2.5 Security: WP A2 or WP A2-MIX Use this screen to set the selected prof ile to WP A2 or WP A2-MIX security mode. Select WPA2 or WPA2-MIX in the Security Mode field to displa y the following screen. Figure 93 Security:WP A2 or WP A2-MIX R eAuthentication Timer Specify how o[...]

  • Page 169

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 169 The following table descri bes the labels not previously discus sed T able 43 Security: WPA2 or WPA2-MIX LABEL DESCRIPTIONS Profile Name T ype a name to identify this security profile. Security Mode Choose WPA2 or WPA2-MIX in this field. R eAuthentication Timer Specify how oft[...]

  • Page 170

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 170 10.2.6 Security: WP A-PSK , WP A2-PSK, WP A2-PSK-MIX Use this screen to set the selected prof ile to WP A -PSK, WP A2-PSK or WP A2-PSK - MIX security mode. Select WPA-PSK , WPA2-PSK or WPA2-PSK-MIX in the Security Mode field to display the following screen. Figure 94 Security: [...]

  • Page 171

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 171 10.3 T echnical Reference This section provi des technical background information on the topics discussed in this chapter . The following is a gener al guideline in ch oosing the securit y mode for your NW A. • Use WP A or WP A2 security if you have WP A/WP A2-a ware wirel e[...]

  • Page 172

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 172[...]

  • Page 173

    NWA-3160 Series User’s Guide 173 C HAPTER 11 RADIUS Screen 1 1.1 Overview This chapter describes how y ou can use the Wireless > RADIUS screen. Remote A uthentication Dial In User Serv ice (RADIUS) is a protocol that can be used to manage user access to large networks. It is based on a client -server model that supports authentica tion, auth o[...]

  • Page 174

    Chapter 11 RADIUS Screen NWA-3160 Series User’s Guide 174 1 1.1.1 What Y ou Can Do in the RADIUS Screen Use the Security > RADIUS screen (see Section 11.2 on page 175 ) if you w ant to authen ticate w ireless users using a RADIUS Server and/or Accounting Server . 1 1.1.2 What Y ou Need T o Know About RADIUS The RADIUS server handles the follow[...]

  • Page 175

    Chapter 11 RADIUS Screen NWA-3160 Series User’s Guide 175 1 1.2 The RADIUS Screen Use this screen to set up y our NW A’ s RADIUS server settings. Cl ick Wireless > RADIUS . The screen appears as shown. Figure 96 RADIUS The following table describes t he labels in this screen. T able 45 RADIUS LABEL DESCRIPTION Index S elect the RADIUS profil[...]

  • Page 176

    Chapter 11 RADIUS Screen NWA-3160 Series User’s Guide 176 Internal Select this check box to use the NWA’ s internal authen tication server . The Active , RA DIUS Server IP Addre ss , RADIUS Server Port and Share Secret fields are not available when you use the internal authentication server . External Select this check box to use an external au[...]

  • Page 177

    NWA-3160 Series User’s Guide 177 C HAPTER 12 Layer-2 Isolation Screen 12.1 Overview Layer -2 isolation is used to prevent wireless clients associated with your NW A from communicating with other wireless c lients, APs, computers or rout ers in a network. In the following figure, la yer-2 i s olation is enabled on the NW A ( Z ) to allow a guest w[...]

  • Page 178

    Chapter 12 Layer-2 Iso lation Screen NWA-3160 Series User’s Guide 178 communicating with the NW A’ s wireless c lients except for broadcast packets. Layer -2 isolation does not check the tr aff ic between wireless clients that are associated with the same AP . Intra-BSS T r affic allows wi reless clients associated with the same AP to communica[...]

  • Page 179

    Chapter 12 Layer-2 Isolation Screen NWA-3160 Series User’s Guide 179 12.2 The Layer-2 Isolation Screen Use this screen to select and configure a layer-2 is olation profile. Click Wireless > Layer-2 Isolation . The screen appears as shown next. Figure 98 Layer 2 Isolati on The following table describes t he labels in this screen. T able 46 Laye[...]

  • Page 180

    Chapter 12 Layer-2 Iso lation Screen NWA-3160 Series User’s Guide 180 12.2.1 Configuring Layer-2 Isolation Use this screen to specify the configur at ion for y our laye r-2 isolation pr ofile. Select a lay er-2 isolation profile in Wireless > Layer-2 Isolation and cli ck Edit to display the following screen. Note: When configuring this screen,[...]

  • Page 181

    Chapter 12 Layer-2 Isolation Screen NWA-3160 Series User’s Guide 181 12.3 T echnical Reference This section provi des technical background information on the topics discussed in this chapter . The figure that follows i llustrates two ex ample layer -2 isolation configurations on your NWA ( A ). Figure 100 Layer-2 Isolation Exa mple Configuration [...]

  • Page 182

    Chapter 12 Layer-2 Iso lation Screen NWA-3160 Series User’s Guide 182 Example 1: Restricti ng Access to Server In the following example wireless clients 1 and 2 can communicate with file server C , but not access point B or wireless client 3 . •E n t e r C ’ s MAC address in the MAC Address field, and enter “File Server C” in the Descript[...]

  • Page 183

    NWA-3160 Series User’s Guide 183 C HAPTER 13 MAC Filter Screen 13.1 Overview This chapter discusses how you can use the Wireless > MAC Filter screen. The MAC filter function allows you to configure the NW A to grant access to devices (Allow Association) or ex clude devices from accessing the NW A (Den y Association). Figure 103 MAC Filtering I[...]

  • Page 184

    Chapter 13 MAC Filt er Screen NWA-3160 Series User’s Guide 184 characters, for example, 00:A0:C5:00:00:02. Y ou need to know the MAC address of each device to configure MAC fi ltering on the NWA. 13.2 The MAC Filter Screen The MAC filter profile is a user-confi gured list of MAC addresses. Each S SID profile can reference one MAC filter profile. [...]

  • Page 185

    Chapter 13 MAC Filter Scr een NWA-3160 Series User’s Guide 185 13.2.1 Configuring the MAC Filter T o change your NWA’ s MAC filter s ettings, c lick WIRELESS > MAC Filter > Edit . The screen appears as shown. Note: T o activate MAC filtering on an SSID profile, select the correct filter from the Enable MAC Filtering drop-down list box in [...]

  • Page 186

    Chapter 13 MAC Filt er Screen NWA-3160 Series User’s Guide 186 Note: If you configure both the MAC Address Filter table and Group Settings table and a client matches a MAC address specified in both tables, the set tings in the Group Settings is applied by the NW A first. Filter Action Define the filter action for the list of MAC addresses in the [...]

  • Page 187

    NWA-3160 Series User’s Guide 187 C HAPTER 14 IP Screen 14.1 Overview The Internet Protocol (IP) address iden tifies a devi ce on a network. Every networking device (inclu ding computers, se rvers, routers, printers, etc.) needs an IP address to communicate across the netw ork. These netwo rking devices are al so known as hosts. Figure 106 IP Setu[...]

  • Page 188

    Chapter 14 IP Screen NWA-3160 Series User’s Guide 188 These parameters should work fo r the majority of installations. 14.2 The IP Screen Use this screen to configure the IP address for your NW A. Click IP to display the following screen. Figure 107 IP Setup The following table describes t he labels in this screen. T able 50 IP Setup LABEL DESCRI[...]

  • Page 189

    Chapter 14 IP Scree n NWA-3160 Series User’s Guide 189 14.3 T echnical Reference This section provides technical background information about the topics cov ered in this chapter . 14.3.1 W AN IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet (only betwee n your two [...]

  • Page 190

    Chapter 14 IP Screen NWA-3160 Series User’s Guide 190[...]

  • Page 191

    NWA-3160 Series User’s Guide 191 C HAPTER 15 Rogue AP Detection 15.1 Overview Rogue APs are wireless access points oper at ing in a network’ s cover age area that are not under the control of the network’ s administr ators, and can open up holes in a network’ s securit y . Attackers can take ad vantage of a rogue AP’ s weaker (or non-exis[...]

  • Page 192

    Chapter 15 Rogue AP Detection NWA-3160 Series User’s Guide 192 In the example above, a corpor ate networ k’ s security is comp romised by a r ogue AP ( R ) set up by an employ ee at his workst at ion in order to allow him to connect his notebook computer wirel essly ( A ). The company’ s legitimate wireless network (the dashed ellipse B ) is [...]

  • Page 193

    Chapter 15 Rogue AP Detectio n NWA-3160 Series User’s Guide 193 The friend ly AP list d isplays detai ls of all the acc ess poin ts in your area tha t you know are not a threat. If you have more th an one AP in your network, you need to configure this list to include your other AP s. If y our wireless network overlaps with that of a neighbor (for[...]

  • Page 194

    Chapter 15 Rogue AP Detection NWA-3160 Series User’s Guide 194 This scenario can also be part of a wirele ss denial of s ervice (DoS) attack, in which associated wireless clients are deprived of network access. Other opportunities for the attacker include th e introduction of malware (malici ous software) into th e network. 15.2 Configuration Scr[...]

  • Page 195

    Chapter 15 Rogue AP Detectio n NWA-3160 Series User’s Guide 195 15.2.1 Friendly AP Screen Use this screen to specif y APs as trusted. Click Rogue AP > Friendly AP . The following screen appears: Figure 1 1 1 Rogue AP Friendly AP The following table describes t he labels in this screen. Import Click this button to upload the previously-saved li[...]

  • Page 196

    Chapter 15 Rogue AP Detection NWA-3160 Series User’s Guide 196 15.2.2 Rogue AP Screen Use this scren to dis play details of al l wireless access points within the NW A’ s cover age area. Click Rogue AP > Rogue AP . The following screen displa ys. Figure 1 12 Rogue AP The following table describes t he labels in this screen. Radio Mode The fi[...]

  • Page 197

    Chapter 15 Rogue AP Detectio n NWA-3160 Series User’s Guide 197 MAC Address This field displays the Medi a Access Control (MAC) address of the AP . All wireless devices have a MAC address that uniquely identifies them. SSID This field displays the Service Set IDentifier (also known as the networ k name) of the AP . Channel This field displays the[...]

  • Page 198

    Chapter 15 Rogue AP Detection NWA-3160 Series User’s Guide 198[...]

  • Page 199

    NWA-3160 Series User’s Guide 199 C HAPTER 16 Remote Management Screens 16.1 Overview This chapter shows you how t o enable remote management of your NW A. It provides information on determining whic h services or protocols can access whic h of the NWA’ s interfaces. Re mote Management allows a user to admi nistr ate the device over the network.[...]

  • Page 200

    Chapter 16 Remo te Management Scree ns NWA-3160 Series User’s Guide 200 16.1.1 What Y ou Can Do in the Remote Management Screens •U s e t h e Telnet screen (see Section 16.2 on page 202 ) to con figure through which interface(s) and from which IP address(es) y ou can use T elnet to manage the NWA. A T elnet connection is prio ritized by the NWA[...]

  • Page 201

    Chapter 16 Remot e Management Screens NWA-3160 Series User’s Guide 201 Note: SNMP is only available if TCP/IP is con figured. Figure 1 14 SNMP Management Mode An SNMP managed network consists of two main types of component: agents and a manager . An agent is a management software module that resides in a ma naged de vice (the NWA). An agent tr an[...]

  • Page 202

    Chapter 16 Remo te Management Scree ns NWA-3160 Series User’s Guide 202 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The NWA automatically logs you out if the management session remains idle for longer t han this timeout period. The ma nagement session does not time out when a statistic[...]

  • Page 203

    Chapter 16 Remot e Management Screens NWA-3160 Series User’s Guide 203 16.3 The FTP Screen Y ou can upload and download the NWA’ s firmware and configuration files using FTP . T o use this feature, your computer must have an FTP client. Secured Client IP Address A secured client is a “trusted” computer that is allowed to communicate with th[...]

  • Page 204

    Chapter 16 Remo te Management Scree ns NWA-3160 Series User’s Guide 204 T o change your NW A’ s FTP settings, click REMOTE MGMT > FTP . The following screen displays. Figure 1 16 Remote Manageme nt: FTP The following table describes t he labels in this screen. 16.4 The WWW Screen Y ou can choose to conf igure your NWA via the W orld Wide W e[...]

  • Page 205

    Chapter 16 Remot e Management Screens NWA-3160 Series User’s Guide 205 T o change your NW A’ s WWW settings, click REMOTE MGNT > WWW . The following screen shows. Figure 1 17 Remote Manageme nt: WWW The following table describes t he labels in this screen. T able 57 Remote Management: WWW LABEL DESCRIPTION WWW Server P ort This i s set to po[...]

  • Page 206

    Chapter 16 Remo te Management Scree ns NWA-3160 Series User’s Guide 206 Server P ort The HTTPS proxy server listens on port 443 by default. If you ch ange the HT TPS pro xy server port to a different numb er on the NW A, for example 8443, then you must notify people who need to access the NW A web configurator to use "https://NW A IP Address[...]

  • Page 207

    Chapter 16 Remot e Management Screens NWA-3160 Series User’s Guide 207 16.5 The SNMP Screen Use this screen to ha ve a manager stat ion administrate y our NW A over the network. T o change your NW A’ s SNMP settings, click REMOTE MGMT > SNMP . The following screen displays. Figure 1 18 Remote Manageme nt: SNMP The following table describes t[...]

  • Page 208

    Chapter 16 Remo te Management Scree ns NWA-3160 Series User’s Guide 208 SNMP V ersion Select the SNMP version for the NWA. The SNMP version on the NWA must match the version on the SNMP manager . Choose SNMP version 1 ( SNMPv1 ), SNMP version 2 ( SNMPv2 ) or SNMP ve rsion 3 ( SNMPv3 ). T rap Community T ype the trap community , which is the passw[...]

  • Page 209

    Chapter 16 Remot e Management Screens NWA-3160 Series User’s Guide 209 16.5.1 SNMPv3 User Profile Use this screen to configure the SNMPv3 profile. Click Conf igure SNMPv3 User Profile in the REMOTE MGMT > SNMP screen, the following screen displays. Figure 1 19 Remote Manageme nt: SNMPv3 User Profile The following table describes t he labels in[...]

  • Page 210

    Chapter 16 Remo te Management Scree ns NWA-3160 Series User’s Guide 210 16.6 T echnical Reference This section provi des some technical background informatio n about the topics covered in th is chapte r . 16.6.1 MIB Managed devices in an SMNP managed network contain ob ject variables or managed objects that define each piece of information to be [...]

  • Page 211

    Chapter 16 Remot e Management Screens NWA-3160 Series User’s Guide 21 1 device. Examples of v ariables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects. SNMP itself is a si mple reques t/response protocol based on the manager/ agent model. The manager issues a[...]

  • Page 212

    Chapter 16 Remo te Management Scree ns NWA-3160 Series User’s Guide 212 Some traps include an SNMP interface i n dex. The following table maps the SNMP interface indexes to the NW A’ s physical and virtual ports. authenticationF ailure (defined in RFC-1215 ) 1.3.6.1.6.3 .1.1.5.5 The device sends this trap when it receives any SNMP get or set re[...]

  • Page 213

    NWA-3160 Series User’s Guide 213 C HAPTER 17 Internal RADIUS Server 17.1 Overview This chapter describes how the NWA can use its internal RADIUS server to authenticate wireless clients. Remote A uthentication Dial In User Serv ice (RADIUS) is a protocol that enables you to control access to a network by aut henticating user credentials. The follo[...]

  • Page 214

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 214 17.1.1 What Y ou Can Do in this Chapter •U s e t h e Setting screen (see Section 17.2 on page 214 ) to turn the NWA’ s internal RADIUS server off or on an d to view information about the NWA’ s certificates. •U s e t h e Trusted AP screen (see Section 17.3 on page 216 ) to[...]

  • Page 215

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 215 The following table describes t he labels in this screen. T able 62 Internal RADIUS Serve r Setting LABEL DESCRIPTION Active Select this to hav e the NWA use its internal RADIUS server to authenticate wireless clients or other APs. Index This field displays the certificate index n[...]

  • Page 216

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 216 17.3 The T rusted AP Screen Use this screen to specif y APs as trusted. Click AUTH. SERVER > Trusted AP. The following screen displays. Figure 122 T rusted AP Scree n The following table describes t he labels in this screen. T able 63 Trusted AP Screen LABEL DESCRIPTION Index T[...]

  • Page 217

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 217 17.4 The T rusted Users Screen Use this screen to conf igure trusted user entries. Click AUTH. SERVER > Trusted Users . The following screen displays. Figure 123 T rusted Use rs The following table describes t he labels in this screen. T able 64 Trusted Users LABEL DESCRIPTION [...]

  • Page 218

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 218 17.5 T echnical Reference This section provi des some technical background informatio n about the topics covered in th is chapte r . A trusted AP is an AP that uses the NW A’ s internal RADI US server to a uthentica te its wireless client s. Each wireless client must hav e a use[...]

  • Page 219

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 219 PEAP (Protected EAP) and MD5 authentica tion is implemented on the internal RADIUS server using simple username an d password methods o ver a secure TLS connection. See Append ix A on page 303 for more information on the types of EAP authentication and the intern al R A DI U S a u[...]

  • Page 220

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 220[...]

  • Page 221

    NWA-3160 Series User’s Guide 221 C HAPTER 18 Certificates 18.1 Overview This chapter describes how your NWA can use certificates as a means of authenticating wireless cl ients. It giv e s background information about public -key certificates and explains how to use them. A certificate contains the certificate owner’ s identit y and public key .[...]

  • Page 222

    Chapter 18 Certificates NWA-3160 Series User’s Guide 222 18.1.2 What Y ou Need T o Know About Certificates The following terms and conc epts may he lp as you read through this chapter . The NWA also trusts an y valid certif icate signed by any of the imported trusted CA certificates. The certification authority certif i c a t e t h a t y o u w a [...]

  • Page 223

    Chapter 18 Certificates NWA-3160 Series User’s Guide 223 The following table describes t he labels in this screen. T able 65 Certificates > My Certificates LABEL DESCRIPTION PKI Storage Space in Use This bar displays the percentage of the NWA’ s PKI storage space that is currently in use. When you are using 80% or less of the storage space, [...]

  • Page 224

    Chapter 18 Certificates NWA-3160 Series User’s Guide 224 18.2.1 My Certificates Import Screen Use this screen to import a certificate from your local computer to the NWA. Note: Y ou can import only a certificate that ma tches a corresponding certification request that was generated by the NW A. Click Certificates > My Certificates and then Imp[...]

  • Page 225

    Chapter 18 Certificates NWA-3160 Series User’s Guide 225 Note: Y ou must remove any space s from th e certificate’s filena me before you can import it. Figure 127 Certificates > My Certif icates Import The following table describes t he labels in this screen. T able 66 Certificates > My Certificate Import LABEL DE SCRIPTION File Path T yp[...]

  • Page 226

    Chapter 18 Certificates NWA-3160 Series User’s Guide 226 18.2.2 My Certificates Create Screen Use this screen to have the NW A create a se lf -signed certificate, enroll a certi ficate with a certification authority or generate a certification request. Click Certificates > My Certificates and then Create to open the My Certificate Create scree[...]

  • Page 227

    Chapter 18 Certificates NWA-3160 Series User’s Guide 227 Common Name Select a radio button to id entify the certificate’ s owner by IP address, domain name or e-mail address. T ype the IP address (in dotted decimal notation), domain name or e-mail address in the field provided. The domain name or e-mail address can be up to 31 ASCII characters.[...]

  • Page 228

    Chapter 18 Certificates NWA-3160 Series User’s Guide 228 After you cl ick Apply in the My Certificate Create screen, you see a screen that tells you the NWA is generating the s elf-signed certifica te or certific ation request . After the NW A successfully enrolls a certif icate or generates a certification request or a self -signed certificate, [...]

  • Page 229

    Chapter 18 Certificates NWA-3160 Series User’s Guide 229 18.2.3 My Certificates Det ails Screen Use this screen to view in-depth ce rtificate information and change the certificate’ s name. In the case of a self-signed c ertificate, you can set it to be the one that the NW A uses to sign the trusted remote host certificates that y ou import to [...]

  • Page 230

    Chapter 18 Certificates NWA-3160 Series User’s Guide 230 The following table describes t he labels in this screen. T able 68 Certificates > My Certificate Details LABEL DESCRIPTION Name This field displa ys the identifying na me of this certificate. If you want to change the name, type up to 31 char acters to identify this certificate. Y ou ma[...]

  • Page 231

    Chapter 18 Certificates NWA-3160 Series User’s Guide 231 V alid From This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Y e t V alid! message if the certificate has not yet become applicable. V alid T o This field displays the date th at the certificate expire s. The text displays in [...]

  • Page 232

    Chapter 18 Certificates NWA-3160 Series User’s Guide 232 18.3 T rusted CAs Screen Use this screen to view the list of trus t ed certificates. The NW A accepts an y val id certificate signed by a certi fication authorit y on this list as being trustworthy . Y ou do not need to import any certificate that is signed. Click Certificates > Trusted [...]

  • Page 233

    Chapter 18 Certificates NWA-3160 Series User’s Guide 233 18.3.1 T rusted CAs Import Screen Use this screen to sa ve a trusted certif ication authority’ s certifi cate to the NW A. Click Certificates > Trusted CAs to op en the Trusted CAs screen and then click Import to open the Trusted CAs Import screen. The following figure displa ys. Note:[...]

  • Page 234

    Chapter 18 Certificates NWA-3160 Series User’s Guide 234 The following table describes t he labels in this screen. 18.3.2 T rusted CAs Deta ils Screen Use this screen to view in-depth inform ation about the certification authority’ s certificate, change the certificate’ s na me and set whether or not you want the NWA to check a certification [...]

  • Page 235

    Chapter 18 Certificates NWA-3160 Series User’s Guide 235 The following table describes t he labels in this screen. T able 71 Certificates > T rusted CAs Details LABEL DESCRIPTION Name This field displays the identifying na me of this certificate. If you want to change the name, type up to 31 characters to identify this key certificate. Y ou ma[...]

  • Page 236

    Chapter 18 Certificates NWA-3160 Series User’s Guide 236 V alid T o This fie ld displays the date that the certificate expires. The text displays in red and includes an Ex piring! or Expired! message if the certificate is about to expire or has already expired. K ey Algorithm This field displays the type of algorithm that was u sed to generate th[...]

  • Page 237

    Chapter 18 Certificates NWA-3160 Series User’s Guide 237 18.4 T echnical Reference This section provides technical background information about the topics cov ered in this chapter . 18.4.1 Private-Public Certificates When using public-k ey cryptology for auth entic ation, each host has two keys. One key is public and can be made openl y available[...]

  • Page 238

    Chapter 18 Certificates NWA-3160 Series User’s Guide 238 18.4.3 Checking the Finger print of a Certificate A certificate’ s fingerprints are message di gests calcul ated using the MD5 or SHA1 algorithms. The following procedure describes how to check a certific ate’ s fingerpr int to verify that you h ave the actual certi ficate. 1 Bro wse t [...]

  • Page 239

    NWA-3160 Series User’s Guide 239 C HAPTER 19 Log Screens 19.1 Overview This chapter provides information on vi ewing and generating logs on y our NW A. Logs are files that contain recorded netw ork activity ov er a set period. They are used by administr ators to monitor the he alth of the computer system(s) they are managing. Logs enable administ[...]

  • Page 240

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 240 •U s e t h e Log Settings screen ( Section 19.3 on page 242 ) to configure where and when the NWA wi ll send the logs, and which logs and/or immed iate alerts it will send. 19.1.2 What Y ou Need T o Know About Logs The following terms and conc epts may he lp as you read through this chapt[...]

  • Page 241

    Chapter 19 Log Screens NWA-3160 Series User’s Guide 241 Click Logs > V iew Log . The followi ng screen displays. Figure 136 Logs > V iew Log The following table describes t he labels in this screen. T able 72 Logs > View Log LABEL DESCRIPTION Display Select a log category from the drop down list box to display logs within the selected ca[...]

  • Page 242

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 242 19.3 The Log Settings Screen Use this screen to configure w here an d when the NWA wi ll send the logs, and which logs and/or immediat e alerts to send. Click Logs > Log Settings . The following screen displa ys. Figure 137 Logs > Log Settings[...]

  • Page 243

    Chapter 19 Log Screens NWA-3160 Series User’s Guide 243 The following table describes t he labels in this screen. T able 73 Logs > Log Settings LABEL DESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e- mail addresses specified below. If this field is left blank, logs and alert messages wil[...]

  • Page 244

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 244 19.4 T echnical Reference This section provi des some technical background informatio n about the topics covered in th is chapte r . 19.4.1 Example Log Messages This section provi des descriptions of some example log mes sages. Clear log after sending mail Select the check box to clear all [...]

  • Page 245

    Chapter 19 Log Screens NWA-3160 Series User’s Guide 245 T able 75 ICMP Notes TYPE CODE DESCRIPTION 0 Echo Reply 0 Echo reply message 3 Destination Unreachable 0 Net unreachable 1 Hos t unrea chabl e 2 Protocol unreachable 3 Port unreachable 4 A packet that needed fragmentation w as dropped because it was set to Don't Fragment (DF) 5 Source r[...]

  • Page 246

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 246 19.4.2 Log Commands Go to the command interpre ter interface (ref er to Appendix E on page 357 for a discussion on how to access and use the command s). 19.4.3 Configuring What Y ou W ant the NW A to Log Use the sys logs load command to load the log settin g buffer that all ows you to confi[...]

  • Page 247

    Chapter 19 Log Screens NWA-3160 Series User’s Guide 247[...]

  • Page 248

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 248[...]

  • Page 249

    NWA-3160 Series User’s Guide 249 C HAPTER 20 VLAN 20.1 Overview This chapter discusses how to conf igure VLAN on the NWA. A VLAN (Virtual Local Area Network) allo ws a ph ysical network to be partitioned into multiple logi cal networks. Stations on a logical network can belong to one or more groups. Only stations within th e same group can talk t[...]

  • Page 250

    Chapter 20 VLAN NWA-3160 Series User’s Guide 250 20.1.2 What Y ou Need T o Know About VLAN The following terms and conc epts may he lp as you read through this chapter . When you use wireless VLAN an d RADIUS VLAN together , the NWA f irst tries to assign VLAN IDs based on RADIUS VLAN co nfigur ation. If a client’s user name does not match an e[...]

  • Page 251

    Chapter 20 VLAN NWA-3160 Series User’s Guide 251 20.2 Wireless VLAN Screen Use this scre en to enable and configur e your Wireless V irtual LAN s etup. Click VLAN > Wireless VLAN . The following screen appears. Figure 139 VLAN > W ireless VLAN The following table describes t he labels in this screen T able 78 VLAN > Wireless VLAN FIELD D[...]

  • Page 252

    Chapter 20 VLAN NWA-3160 Series User’s Guide 252 20.2.1 RADIUS VLAN Screen Use this screen to configure your RADIUS Virtual LAN setup. Y o ur RADIU S server assigns VLAN IDs to a user or user group’ s tr affic based on what y ou set in this screen. Native VLAN Check this to assign the Management VLAN ID as a Native VLAN. Leave this blank if you[...]

  • Page 253

    Chapter 20 VLAN NWA-3160 Series User’s Guide 253 Click VLAN > RADIUS V LAN . The following screen appears. Figure 140 VLAN > RADIUS VLAN The following table describes t he labels in this screen. T able 79 VLAN > RADIUS VLAN LABEL DESCRIPTION Block station if RADIUS server assign VLAN name error Select this to have the NW A forbid access [...]

  • Page 254

    Chapter 20 VLAN NWA-3160 Series User’s Guide 254 20.3 T echnical Reference This section provi des some technical background information and configur ation examples about the t opics covered in this chapter . 20.3.1 VLAN T agging The NWA support s IEEE 802.1q VLAN tagging. T agged VLAN uses an explicit tag (VLAN ID) in the MAC header of a frame to[...]

  • Page 255

    Chapter 20 VLAN NWA-3160 Series User’s Guide 255 On an Ethernet switch, create a VLAN th at has the same management VLAN ID as the NWA. The following figure has the NW A connected to port 2 and your computer connected to port 1. The management VLAN ID i s 10. Figure 141 Manageme nt VLAN Configuration Example P erform the following steps in the sw[...]

  • Page 256

    Chapter 20 VLAN NWA-3160 Series User’s Guide 256 8 Click Apply . The following screen displays. Figure 143 VLAN-A ware Switch 9 Click VLAN St atus to displa y the following screen. Figure 144 VLAN-A ware Switch - VLAN S tatus Fol low the instructions in the Quick Start Gui de to set up your NW A for configuration. The N WA should be connec ted to[...]

  • Page 257

    Chapter 20 VLAN NWA-3160 Series User’s Guide 257 3 Click Apply . Figure 145 VLAN Setup 4 The NWA attempts to connect with a VLAN-aware device. Y ou can now access and mange the NW A though the Ethernet switch. Note: If you do not connect the NW A to a correctly configured VLAN-aware device, you will lock yourself out of the NW A. If this happens,[...]

  • Page 258

    Chapter 20 VLAN NWA-3160 Series User’s Guide 258 Z yXEL uses the following standard RADIUS attributes returned from Microsoft’ s IAS RADIUS service to place the wirele ss station into the correct VLAN: The following occurs under Dynamic VLAN Assignment: 1 When you configure your wireless credenti als, the NWA sends the information to the IAS se[...]

  • Page 259

    Chapter 20 VLAN NWA-3160 Series User’s Guide 259 1c Select the Security Group type par ameter check box. 1d Click OK . Figure 146 New Global Security Group 2 In VLAN Group ID Properties , click the Members tab. Note: The IAS uses group membership s to determine which user accounts belong to which VLAN groups. Click the Add button and configure th[...]

  • Page 260

    Chapter 20 VLAN NWA-3160 Series User’s Guide 260 1 Using the Remote Access Policy option on the Internet Authentication Service management interface, create a new VLAN P olicy for each VLAN Group defi ned in the previous section. The or der of the remote access policies is important. The most specific policies should be placed at the top of the p[...]

  • Page 261

    Chapter 20 VLAN NWA-3160 Series User’s Guide 261 3 In the Select Attribute screen, cli ck Windows-Groups and the Add button. Figure 149 S pecifying Windows-Group Condition 4 The Select Groups window displays. Select a remote access policy and click the Add button. The policy is added to the fi eld below. Only one VLAN Group should be associated w[...]

  • Page 262

    Chapter 20 VLAN NWA-3160 Series User’s Guide 262 6b Click the Edit Profile button. Figure 151 Granting Permissions a nd User Profile Screens 7 The Edit Dial-in Profile screen displays. Click the Authentication tab and select the Extensible Authentication Protocol check box. 7a Select an EAP t ype depending on your authentication n eeds from the d[...]

  • Page 263

    Chapter 20 VLAN NWA-3160 Series User’s Guide 263 8 Click the Encryption tab. Select the Strongest encryption option. This step is not required for EAP-MD5, but is performed as a safeguard. Figure 153 Encryp tion T ab Settings 9 Click the IP tab and select the Client may request an IP address check box for DHCP support. 10 Click the Advanced tab. [...]

  • Page 264

    Chapter 20 VLAN NWA-3160 Series User’s Guide 264 11 The RADIUS Attribute screen displa ys. From the list, three RADIUS att ributes will be added: • T unnel-Mediu m- T ype • T unnel-Pvt-Group-ID • T unnel- T ype 11 a Click the Add button 11 b Select Tunnel-Medium-Type 11 c Click the Add button. Figure 155 RADIUS Attribute Screen 12 The Enume[...]

  • Page 265

    Chapter 20 VLAN NWA-3160 Series User’s Guide 265 13 Return to the RADIUS Attribute Screen shown as Figure 155 on page 264 . 13a Select Tunnel-Pvt-Group-ID. 13b Click Add . 14 The Attribute Information scre en displays. 14a In the Enter the attribute value in: field select String and type a number in the range 1 t o 4094 or a Name for this polic y[...]

  • Page 266

    Chapter 20 VLAN NWA-3160 Series User’s Guide 266 16b Click OK . Figure 158 VLAN Attribute Setting for T unnel-T ype 17 Return to the RADIUS Attribute Screen shown as Figure 155 on page 264 . 17a Click the Close button. 17b The completed Advanced tab configu ration should re semble the fol lowing screen. Figure 159 Completed Advanced T ab Note: Re[...]

  • Page 267

    Chapter 20 VLAN NWA-3160 Series User’s Guide 267 20.3.4 Second Rx VLAN ID Example In this example, the NWA is configured to tag packets from SSID01 with VLAN ID 1 and tag packets from SSID02 with VLAN ID 2. VLAN 1 and VLAN 2 ha ve access to a server , S , and the Internet, as shown in the following figure. Figure 160 Second Rx VLAN ID Example P a[...]

  • Page 268

    Chapter 20 VLAN NWA-3160 Series User’s Guide 268 2 Click VLAN > Wireless VLAN . 3 If VLAN is not already enabled, click Enable Virtual LAN and se t up the Management VLAN ID (see Section 20.3.2 on page 2 54 ). Note: If no devices are in the management VLAN, then no one will be able to access the NW A and you will have to restor e the default c[...]

  • Page 269

    NWA-3160 Series User’s Guide 269 C HAPTER 21 Load Balancing 21.1 Overview Wireless load balancing is the process whereby you limit the number of connections allowed on an wireless access point (AP) or you limit the amount of wireless tr affic transmi tted and received on it. Because there is a hard upper limit on the AP’ s wireless bandwidth, t[...]

  • Page 270

    Chapter 21 Load Balancing NWA-3160 Series User’s Guide 270 Imagine a coffee shop in a crowded business distri ct that offers free wireless connectivity to i ts customers. The coffee shop owner can’t possibly know how many connections his NWA will hav e at an y given moment. As such, he decides to put a limit on the ba ndwidth that is av ailable[...]

  • Page 271

    Chapter 21 L oad Balancing NWA-3160 Series User’s Guide 271 The requirements for load balancing are fairly straight forw ard and should be met in order for a group of similar NWAs to tak e advantage of the feature: • They should all be within the same subnet. • They should all hav e the same SSID, r adio mode, and security mode. • There sho[...]

  • Page 272

    Chapter 21 Load Balancing NWA-3160 Series User’s Guide 272 21.2.1 Disassociating and Delaying Connections When your AP becomes ov erloaded, th ere are two basic responses it can take. The first one is to “de lay” a client conn ection. This m eans that the A P withholds the connection until the data tr ansfer throughput is lowered or the clien[...]

  • Page 273

    Chapter 21 L oad Balancing NWA-3160 Series User’s Guide 273 can afford the bandwidth for it or the red la pt op is picked up by a different AP that has bandwidth to spare. Figure 164 Delaying a Co nnection The second response your AP can take is to kick the con nections tha t are pushing it ov er its balanced bandwi dth allotment. Figure 165 Kick[...]

  • Page 274

    Chapter 21 Load Balancing NWA-3160 Series User’s Guide 274[...]

  • Page 275

    NWA-3160 Series User’s Guide 275 C HAPTER 22 Dynamic Channel Selection 22.1 Overview This chapter discusses how to configure dynamic channel selection on the NWA. Dynamic channel selection is a feature that allows y our NWA to automatically select the r adio channel upon which it broa dcasts by scanning the area around and determining what channe[...]

  • Page 276

    Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 276 In this example, if the NW A attempts t o broadcast on channels 1, 6, or 11 it is met with cross-channel interf erence from the othe r AP that shares the channel. This can result in noticeably sl ower data tr ansfer rates, the droppi ng of the connection al together , or even l[...]

  • Page 277

    Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 277 DCS Sensitivity Level Select the NWA’ s sensitivity level toward other channels. Options are High , Medium , and Low . Generally , as long as the area in which your NWA is located has minimal interference from other devices you can set the DCS Sensitivity Level to Low . This [...]

  • Page 278

    Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 278[...]

  • Page 279

    NWA-3160 Series User’s Guide 279 C HAPTER 23 Maintenance 23.1 Overview This chapter describes the maintenance screens. It discusses how y ou can view the association list and channel us age, upload new firmware, manage configur ation and restart y our NW A without turning it off and on. 23.1.1 What Y ou Can Do in the Maintenance Screens The follo[...]

  • Page 280

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 280 23.2 Association List Screen Use this screen to know which wireless cl ients are associated with the NW A. Click Maintenance > Association List . The following screen displays. Figure 168 Association L ist The following table describes t he labels in this screen. T able 83 Association Lis[...]

  • Page 281

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 281 23.3 Channel Usage Screen Use this screen to see what channel the wireless clients are using to associate with the NWA, as well as the signal strength and network mode. Click Maintenance > Channel Usage . The following figure displays . W ait a moment whil e the NW A compiles the informat[...]

  • Page 282

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 282 23.4 F/W Upload Screen Use this screen to upload firmware to y our NWA. Click MAINTENANCE > F/W Up load . The following screen displays. Figure 170 F/W Upload The following table describes t he labels in this screen. Do not turn off the NW A while firmware upload is in progress! After you[...]

  • Page 283

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 283 The NWA automatic ally restarts in th is time causing a tempor ary network disconnect. In some oper ating systems, y ou may see the following icon on your desktop. Figure 172 Network T emporarily Disconnected After two minutes, log in again and ch eck your new firmware version in the System [...]

  • Page 284

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 284 23.5 Configuration Screen Use this screen backup or upload your NW A’ s configur ation file. Y ou can also reset the configuratio n of your device in this screen. Click Maintenance > Configuration . The following figure d isplays. Figure 174 Configurati on 23.5.1 Backup Configuration Ba[...]

  • Page 285

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 285 23.5.2 Restore Configuration Restore configur ation allows you to upload a new or previously saved configur ation file from your computer to y our NW A. Do not turn off the NW A while co nfiguration file upload is in progress. After you see a “restore configuration successf ul” screen, y[...]

  • Page 286

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 286 If the upload was not successful, the following screen will appear . Click Return to go back to the Configuration screen. Figure 177 Configuratio n Upload E rror 23.5.3 Back to Factory Default s Pressing the Reset button in this section c lears all user-entered configur ation information and[...]

  • Page 287

    287 P ART III Appendices and Index T roubleshooting (289) Product Specifications (297) P ower Adaptor Specifications (247) Setting up Y our Computer’s IP Add ress (249) Wireless LANs (303) P op-up Windows, Jav aScripts and Java P ermissions (319) IP Addresses and Subnetting (327) T ext File Based Auto Configur ation (349) Legal Information (363) [...]

  • Page 288

    288[...]

  • Page 289

    NWA-3160 Series User’s Guide 289 C HAPTER 24 Troubleshooting 24.1 Overview This chapter offers some suggesti ons to solve problems you mi ght encounter . The potential problems are divided into the following categories. • P ower , Hardware Connections, and LEDs • NW A Access and Login • AP Management Modes • Internet Access • Wireless R[...]

  • Page 290

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 290 • Inspect your cables f or damage. Contact the vendor to replace an y damaged cables. • Disconnect and re-connect the power adaptor to the NW A. • If the problem co ntinue s, contact th e vendor . 24.3 NW A Access and Login I forgot the IP address for the NW A. • The default IP [...]

  • Page 291

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 291 • The default password is 1234 . • If this does not work, you ha ve to rese t the device to its factory def aults. See Section 2.3 on page 36 . I cannot see or access the Login screen in the web configurator . • Make sure you are using the correct IP addres s. • The default IP a[...]

  • Page 292

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 292 • Disconnect and re-connect the po wer adaptor or cord to the NWA. • If this does not work, you ha ve to rese t the device to its factory def aults. See Section 2.3.1 on page 36 . I cannot access the NW A via the console port. • Check to see if the NW A is connected to y our compu[...]

  • Page 293

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 293 The secondary controller AP’s wireless profiles do not appear in my wireless network. In case you have both primary and secondary controller APs in the netwo rk, the secondary controller AP’ s WLAN r adio is turned off as long as the primary controller AP is turned on. Thus, you wi [...]

  • Page 294

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 294 24.5 Internet Access I cannot access the Internet. • Check the hardware connecti ons, and mak e sure the LEDs are behavi ng as expected. See the Quick Start Guide and Section 24.2 on page 289 . • Make sure you entered your ISP account information correctly . These fields are case-se[...]

  • Page 295

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 295 Check the settings for QoS . If it is disabl ed, you might co nsider activ ating it. If it is enabled , you might consid er raising or lowering the pr iority for som e applications. 24.6 Wireless Router/AP T roubleshooting I cannot access the NW A or ping any computer from the WLAN. •[...]

  • Page 296

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 296[...]

  • Page 297

    NWA-3160 Series User’s Guide 297 C HAPTER 25 Product S pecifications The following tables summarize the NW A’ s hardware and firmwa re features. T able 87 Hardware Specifications P ower Specification 12 V DC , 1.5 A R eset button Returns all settings to their factory defaults. Ethernet Port • Auto-negotiating: 10 Mbps or 10 0 Mbps in either h[...]

  • Page 298

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 298 Output Power IEEE 802.11a: 5150-5250 Using single antenna: 12dBm IEEE 802.11a: 5250 - 5850 Using single antenna:18dbm IEEE 802.11b Using single antenna: 17dBm IEEE 802.11g Using single antenna: 14dBm IEEE 802. 11gn: HT20 Using single antenna: 12.5dBm Using three antennas: 17dBm IE[...]

  • Page 299

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 299 T able 88 Firmware Specif ications Default IP Address 192.168.1.2 Default Subnet Mask 255.255.255.0 (2 4 bits) Default P assword 1 234 Wireless LAN Standards (NWA -3160, NWA -3163) IEEE 802.11a, IEEE 802.11b, IEEE 802.11g (NWA -3166) IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE [...]

  • Page 300

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 300 25.1 W all-Mounting Instructions Complete the following steps to hang y our NWA on a w all. Note: See T able 25 on page 297 for the size of screws to use and how far a part to place them. 1 Select a position free of ob structions on a sturdy wall. 2 Drill two holes for the screws.[...]

  • Page 301

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 301 5 Align the holes on the back of the NWA with the screws on the wall. Hang the NWA on the screws. Figure 180 W all-mounting Example The following are dimensions of an M4 tap screw and masonry plug used for wall mounting. All measurements are in millimeters (mm). Figure 181 Masonry[...]

  • Page 302

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 302[...]

  • Page 303

    NWA-3160 Series User’s Guide 303 A PPENDIX A W ireless LANs Wireless LAN T opologies This section discuss es ad-hoc and infr astructure wi reless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configur ation is an in dependent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B , C). Any time t wo or m[...]

  • Page 304

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 304 with each other . When Intra-BS S is disabled, wireless cli ent A and B can still access the wired network but cannot communicate with eac h other . Figure 183 Basic Service Set ESS An Extended Service Set (ESS) c onsists of a series of overlapping BS Ss, each containing an access point, w[...]

  • Page 305

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 305 An ESSID (ES S IDentification) uniquely id entifies each ESS . All access points and their associated wirel ess clients within the same ESS must have the same ESSID in order to comm unicate. Figure 184 Infrastructure WLAN Channel A channel is the radio frequency(ies) us ed by IEEE 802.11a[...]

  • Page 306

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 306 RTS/CTS A hidden node occurs when two stations are within r ange of the same access point, but are not within ra nge of each other . The following figure illust rates a hidden node. Both stations (ST A) are with in range of the access point (AP) or wireless gatewa y , but out -of- range of[...]

  • Page 307

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 307 network overhead involv ed in the R TS (R equest T o Send)/CTS (Clear to Send) handshake. If the RTS/CTS v alue is greater than the Fragmentation Threshold v alue (see next), then the RTS (R equest T o Send)/ CTS (Clear to Send) h andshake wi ll never occur as data frames will be fragment[...]

  • Page 308

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 308 Note: The AP and the wireless adapters MUST use the same preamble mode in order to communicate. IEEE 802.1 1g Wireless LAN IEEE 802.11g is fully compatible with th e IEEE 802.11b standard. This means an IEEE 802.11b adapter can interface directly with an IEEE 802.11g acc ess point (and vic[...]

  • Page 309

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 309 The following figure shows the relative ef fectiveness of these wireless security methods av ailable on your NW A. Note: Y ou must enable the same wireless security settings on the NW A and on all wireless clients that you want t o associate with it. IEEE 802.1x In June 2001, the IEEE 802[...]

  • Page 310

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 310 • Authorization Determin es the network services availabl e to authenticated users once they are connected to the network. •A c c o u n t i n g K eeps track of the client’ s network activity . RADIUS is a simple package exchange in which your AP acts as a message rela y between the w[...]

  • Page 311

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 31 1 EAP (Extensible Authenticati on Protocol) is an authentication prot ocol that runs on top of the IEEE 802.1x transport mechanism in order to support multiple types of user authentic ation. By usin g EAP to inte ract with an EAP-compat ible RADIU S server , an access point helps a wireles[...]

  • Page 312

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 312 T TLS supports EAP methods and legacy au thentication methods such as P AP , CHAP , MS-CHAP and MS-CHAP v2. PEAP (Protected EAP) Like EAP- TTLS , server-si de certificate authentication is used to establish a secure connection , then u se si mple username and password methods through the s[...]

  • Page 313

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 313 WP A and WP A2 Wi-Fi Protected Ac cess (WPA ) is a subset of the IEEE 802.11i standard. WP A2 (IEEE 802.11i) is a wireless se curity standard that defi nes stronger encryption, authentication and key management than WPA. K ey differences between WP A or WP A2 and WEP are improved data enc[...]

  • Page 314

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 314 The Message Integrity Check (MIC) is de signed to prevent an attacker from capturing data pack ets, altering them and resending them. The MIC pro vides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, i t [...]

  • Page 315

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 315 The Windows XP patch is a free download that adds WP A capabili ty to Windows XP's built-in "Z ero Configur ation" wirele ss client. Howev er , you must run Windows XP to use it. WP A(2) with RADIUS Application Example Y ou need the IP address of the RADIUS se rver , its po[...]

  • Page 316

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 316 1 First enter identical passwords into the AP and all wireless client s. The Pre-Shared K ey (PSK) must consist of between 8 an d 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each wireless client's pa sswor d and (only) allows it to [...]

  • Page 317

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 317 Antenna Overview An antenna couples RF signals onto air . A tr ansmitter within a wireless device sends an RF signal to the antenna, whic h propagates the signal through the air . The antenna also operates in reverse by capturing RF signals from the air . P ositioning the antennas properl[...]

  • Page 318

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 318 antenna is a theoretical perfect antenna that sends out rad io signals equally well in all directions. dBi represents the t r ue gain that the antenna provides. T ypes of Antennas for WLAN There are two types of antennas used for wireless LAN applications. • Omni-directional ante nnas se[...]

  • Page 319

    NWA-3160 Series User’s Guide 319 A PPENDIX B Pop-up Windows, JavaScript s and Java Permissions In order to use the web configurator you need to allow: • W eb browser pop-up wind ows from your device. • Jav aScripts (enabled by defa ult). • Jav a permissions (enabled by default). Note: Internet Explorer 6 screens are used here . Screens for [...]

  • Page 320

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NWA-3160 Series User’s Guide 320 1 In Internet Explorer , select Tools , Internet Options , Privacy . 2 Clear the Block pop-ups check box in the Pop-up Bloc ker section of the screen. This disables an y web pop-up block ers you may have enabled. Figure 189 Internet Options: Privacy 3 [...]

  • Page 321

    Appendix B Pop-u p Windows, JavaScripts and Java Permissions NWA-3160 Series User’s Guide 321 2 Select Settings… to open the Pop-up Blocker Settings screen. Figure 190 Internet Options: Privacy 3 T ype the IP address of your device (the web page that you do not want to have blocked) wi th the prefix “http://” . For example, http:// 192.168.[...]

  • Page 322

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NWA-3160 Series User’s Guide 322 4 Click Add to mov e the IP address to the list of Allowed sites . Figure 191 Pop-up Blo cker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting . JavaScript s If pages of the web configur ator do not display pro[...]

  • Page 323

    Appendix B Pop-u p Windows, JavaScripts and Java Permissions NWA-3160 Series User’s Guide 323 1 In Internet Explorer , click Tools , Internet Options and then the Security tab. Figure 192 Internet Options: Secu rity 2 Click the Custom Level... bu tton. 3 Scroll down to Scripting . 4 Under Active scripting make sure that Enable is selected (the de[...]

  • Page 324

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NWA-3160 Series User’s Guide 324 6 Click OK to close the window . Figure 193 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer , click Tools , Internet Options and then the Se curity tab. 2 Click the Custom Level... bu tton. 3 Scroll down to Microsoft VM . 4[...]

  • Page 325

    Appendix B Pop-u p Windows, JavaScripts and Java Permissions NWA-3160 Series User’s Guide 325 5 Click OK to close the window . Figure 194 Security Settings - Java JA V A (Sun) 1 From Internet Explorer , click Tools , Internet Options and then the Ad vanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected.[...]

  • Page 326

    Appendix B Po p-up Window s, JavaScrip ts and Java Permissions NWA-3160 Series User’s Guide 326 3 Click OK to close the window . Figure 195 Java (Sun)[...]

  • Page 327

    NWA-3160 Series User’s Guide 327 A PPENDIX C IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify indi vidual devices on a network. Every networking device (including computers, serv ers, routers, printers, etc.) needs an IP address to communicate across the netw ork. These networking devices a[...]

  • Page 328

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 328 The following figure shows an example IP address in which the first three octets (192.168.1) are the network number , and the fourth octet (16) is the host ID . Figure 196 Network Number and Host ID How much of the IP address is the networ k number and how much is the host I[...]

  • Page 329

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 329 By conv ention, subnet masks alw ays cons ist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the b[...]

  • Page 330

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 330 As these two IP addresses cannot be us ed for individual hosts, calculat e the maximum number of possible host s in a network as follows: Not ation Since the mask is alw ays a continuo us number of ones beginning f rom the left, followed by a continuous number of zeros for t[...]

  • Page 331

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 331 Subnetting Y ou can use subnetting to divide one netw ork into multiple sub-networks. In the following example a network administrator creates t wo sub-networks to isolate a group of servers from the rest of th e compan y network for security reasons. In this example, the com[...]

  • Page 332

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 332 The following figure shows the company network after subnet ting. There are now two sub-n etworks, A and B . Figure 198 Subnetting Example: Af ter Subnetting In a 25-bit subnet the host ID has 7 bits , so each sub-network has a maximum of 2 7 – 2 or 126 possibl e hosts (a [...]

  • Page 333

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 333 Each subnet contains 6 host ID bit s, giving 2 6 - 2 or 62 hosts f or each subnet (a host ID of all zeroes i s the subnet it self , all ones is the subnet’ s broadcast address). T able 97 Subnet 1 IP/SUBNET MASK NETWORK N UMBER LAST OCTET BIT VA L U E IP Address (Decimal) 1[...]

  • Page 334

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 334 Example: Eight Subnet s Similarly , use a 27-bit mask to create eig ht subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each sub net. Subnet Planning The following table is a summary for subnet planning on a netw[...]

  • Page 335

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 335 The following table is a summary for subnet planning on a network with a 16-bit network number . Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrat or assigns you a block of registered IP [...]

  • Page 336

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 336 you entered. Y ou don't need to change the subnet mask computed by the NW A unless you are instructed to do otherwise. Private IP Addresses Every machine on the In ternet must ha ve a uni que address. If your ne tworks are isolated from the Internet (running only betwee[...]

  • Page 337

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 337 Windows 95/98/Me Click Start , Settings , Control Panel and double-click the Network icon to open the Network window Figure 199 WIndows 95/98/Me: Netwo rk: Configuration Inst alling Component s The Network window Configuration tab displays a list of installed components. Y ou[...]

  • Page 338

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 338 3 Select Microsoft from the list of manufacturers . 4 Select TCP/IP from the list of network protocols and then click OK . If you need Client for Microsoft Networks: 1 Click Add . 2 Select Client and then click Add . 3 Select Microsoft from the list of manufacturers. 4 Selec[...]

  • Page 339

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 339 3 Click the DNS Configuration tab. • If you d o not know your DN S information, select Disable DN S . • If you know y our DNS information, select Enable DNS and type the information in the fields below (y ou may not need to fill them all in). Figure 201 Windows 95/9 8/Me:[...]

  • Page 340

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 340 3 Select your network adapter . Y ou should see your computer's IP address, subnet mask and default gatewa y . Windows 2000/NT/XP 1 For Windows XP , click start , Control Panel . In Windows 2000/NT , click Start , Settings , Control Panel . Figure 202 Windows XP: S tart[...]

  • Page 341

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 341 3 Right-cli ck Local Area Connection and then click Properties . Figure 204 Windows XP: Control Panel: Ne twork Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the Ge neral tab in Win XP) and click Properties . Figure 205 Windows XP: Local Area Connection P[...]

  • Page 342

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 342 • If you hav e a static IP address click Use the following IP Address and fill in the IP address , Subnet mask , and Default gateway fields. Click Advanced . Figure 206 Windows XP: Adva nced TCP/IP Settings 6 If you do not know your gatewa y's IP ad dress, remove any [...]

  • Page 343

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 343 •C l i c k Obtain DNS server address automatically if you do not know your DNS server IP address(es ). • If you know y our DNS server IP address(es), clic k Use the following DNS server addresses , and type them in the Preferred DNS server and Alternate DNS server fiel ds[...]

  • Page 344

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 344 Macintosh OS 8/9 1 Click the Apple menu, Control Panel and double -click TCP/IP to open the TCP/ IP Control Panel . Figure 208 Macintosh OS 8/9: Apple Menu[...]

  • Page 345

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 345 2 Select Ethernet built-in from the Connect via list. Figure 209 Macintosh OS 8/9: TCP/IP 3 For dynamically ass igned settings, select Using DHCP Server from the Configure: list. 4 For stati cally assigned settings, do the following: •F r o m t h e Configure box, select Man[...]

  • Page 346

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 346 Macintosh OS X 1 Click the Apple menu, and click System Preferences to open the System Preferences window . Figure 210 Macintosh OS X: Apple Menu 2 Click Networ k in the icon ba r . • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list.[...]

  • Page 347

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 347 •F r o m t h e Configure box, select Manually . • T ype your IP address in the IP Address box. • T ype your subnet mask in the Subnet mask bo x. • T ype the IP address of your NWA in the Ro uter address box. 5 Click Apply Now and close the window . 6 T urn on your NWA[...]

  • Page 348

    Appendix C IP Addresses a nd Subnetting NWA-3160 Series User’s Guide 348[...]

  • Page 349

    NWA-3160 Series User’s Guide 349 A PPENDIX D T ext File Based Auto Configuration This chapter describes how administ rators can use text confi guration files to configure the wireless LAN setti ngs for multiple APs. T ext File Based Auto Configuration Overview Y ou can use plain text con figuration files to configure the wirele ss LAN sett ings o[...]

  • Page 350

    Appendix D Text File Ba sed Auto Configuration NWA-3160 Series User’s Guide 350 Y ou can have a different configuration file for each AP . Y ou can also hav e multiple APs use the same configur ation file. Note: If adjacent APs use the same configu ration file, you should leave out the channel setting since they could interf er e with each other [...]

  • Page 351

    Appendix D Text File Based Auto Configuration NWA-3160 Series User’s Guide 351 V erifying Y our Configuration File Upload V ia SNMP Y ou can use SNMP management software to display the configuration file v ersion currently on the device by using the foll owing MIB. T roubleshooting Via SNMP If you have an y difficulties with the config uration fi[...]

  • Page 352

    Appendix D Text File Ba sed Auto Configuration NWA-3160 Series User’s Guide 352 The AP igno res any imprope rly forma tte d commands and continues to check the next line. If there are any errors while processing the configur ation file , the AP genera tes a message with the line number and reason for the first error (subsequent errors during the [...]

  • Page 353

    Appendix D Text File Based Auto Configuration NWA-3160 Series User’s Guide 353 Figure 215 802.1X Configura tion File Example Figure 216 WP A-PSK Configuration File Example !#ZYXEL PROWLAN !#VERSION 12 wcfg security 2 name Test-8021x wcfg security 2 mode 8021x-static12 8 wcfg security 2 wep key1 abcdefghijk lm wcfg security 2 wep key2 bcdefghijkl [...]

  • Page 354

    Appendix D Text File Ba sed Auto Configuration NWA-3160 Series User’s Guide 354 Figure 217 WP A Configuration File Example Wlan Command Configuration File Example This example configur ation file uses the wlan command to configure the AP to use the security and SSID profiles from the wcfg command configuration file examples and gener al wirel ess[...]

  • Page 355

    Appendix D Text File Based Auto Configuration NWA-3160 Series User’s Guide 355 commands that create security and S SID pr ofiles before the commands that tell the AP to use thos e profiles. Figure 218 Wlan Configura tion File Example !#ZYXEL PROWLAN !#VERSION 15 wcfg ssid 1 name ssid-wep wcfg ssid 1 security Test-wep wcfg ssid 2 name ssid-8021x w[...]

  • Page 356

    Appendix D Text File Ba sed Auto Configuration NWA-3160 Series User’s Guide 356[...]

  • Page 357

    NWA-3160 Series User’s Guide 357 A PPENDIX E How to Access and Use the CLI This chapter introduces the command line interface ( CLI). Accessing the CLI Use any of the following methods t o access the CLI. Console Port Y ou can use this method if your NWA has a console port. 1 Connect your computer to the console port on the NWA usi ng the appropr[...]

  • Page 358

    Appendix E Ho w to Access a nd Use the C LI NWA-3160 Series User’s Guide 358 2 Open a T elnet session to the NWA’ s IP addres s. If this is your first logi n, use the default v alues. Make sure your computer IP address is in the same subnet, unless you are accessing the NW A through one or more ro uters. In the latter case, mak e sure remote ma[...]

  • Page 359

    Appendix E How to Access and Use the CLI NWA-3160 Series User’s Guide 359 • Commands are in courier new font . • R equired input v alues are in angle brackets <>; for example, ping < ip- address > means that y ou must specify an IP address for this c ommand. • Optional fi elds are in square br ackets [ ]; for instance in the sho[...]

  • Page 360

    Appendix E Ho w to Access a nd Use the C LI NWA-3160 Series User’s Guide 360 Copy and Paste Commands Y ou can copy and paste commands directly fr om this document into y our terminal emulation console window (such as HyperT erminal). Use right- click (not [CTRL]- [V]) to paste your command into the console window as shown next. Using Shortcut s a[...]

  • Page 361

    Appendix E How to Access and Use the CLI NWA-3160 Series User’s Guide 361 Saving Y our Configuration In the NWA some commands are saved as you run them and others require y ou to run a sav e command. See the related section of this guide to see if a sav e command is required. Note: Unsaved configurat ion changes are lost onc e you restart the NW [...]

  • Page 362

    Appendix E Ho w to Access a nd Use the C LI NWA-3160 Series User’s Guide 362[...]

  • Page 363

    NWA-3160 Series User’s Guide 363 A PPENDIX F Legal Information Copyright Copyright © 2010 by Z yXEL Communications Corpor ation. The contents of this publication ma y not be reproduced in any p art or as a whole, transcrib ed, stored in a retriev al syst em, tr anslated into an y language , or transmitted in an y form or by any me ans, electroni[...]

  • Page 364

    Appendix F L egal Informati on NWA-3160 Series User’s Guide 364 • This device must acce pt any interf erence received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Clas s B digital device pursuant to P art 15 of th e FCC Rules. These limi ts are designed to pro[...]

  • Page 365

    Appendix F Legal Information NWA-3160 Series User’s Guide 365 前項合法通信,指依電信規定作 業之無線電信。低功率射頻電機須 忍 受合法通信或工業、科學及醫療 用電波輻射性電機設備之干擾。 在 5250MHz~5350M Hz 頻帶內操作之無 線資訊傳輸設 備,限於室內使用 。 本機限在不?[...]

  • Page 366

    Appendix F L egal Informati on NWA-3160 Series User’s Guide 366 Note Re pair or replacement, as provided under this wa rranty , is the excl usive remedy of the purchaser . This warranty is in lieu of all other warr anties, express or implied, including any implied w arranty of merchantabilit y or fitness for a particular use or purpose. Z yXEL sh[...]

  • Page 367

    Index NWA-3160 Series User’s Guide 367 Index A access 24 access point 24 access privileges 29 accessing the CLI 357 address 11 0 address assignment 11 0 , 189 address filtering 23 administrator authentication on RADIUS 11 7 Advanced Encryption Standard See AES. AES 313 alternative subnet mask notation 330 antenna 297 directional 318 gain 317 omni[...]

  • Page 368

    Index NWA-3160 Series User’s Guide 368 D default 286 DFS 145 Differentiated Services 157 DiffServ 156 DiffServ Code P oint (DSCP) 157 DiffServ Code P oints 157 DiffServ marking rule 157 dimensions 298 disclaimer 363 Distribution System 120 DS fiel d 157 DSCPs 157 DTL S 30 , 87 Dynamic Frequency Selection 145 dynamic WEP key exchange 312 E EAP aut[...]

  • Page 369

    Index NWA-3160 Series User’s Guide 369 log descriptions 244 login 358 logs 239 M MAC address 23 , 178 , 183 MAC address filter action 186 MAC filter 30 MAC filtering 299 maintenance 23 management 23 Management Information Base (MIB) 21 1 Management Mode 87 CAPWAP and DHCP 88 CAPWAP and IP Subnets 88 managed AP 88 standalone mode 87 management VLA[...]

  • Page 370

    Index NWA-3160 Series User’s Guide 370 reset button 297 restore 285 roaming 146 requirements 147 rogue AP 23 , 193 , 194 , 195 root bridge 144 RT S (Request T o Send) 306 threshold 306 , 307 S safety warnings 8 saving configur ation 361 screws 300 security 25 security profiles 23 server 23 Service Set 122 , 126 , 136 , 143 Service Set Identifier [...]

  • Page 371

    Index NWA-3160 Series User’s Guide 371 wireless client WPA supplicants 314 Wireless Distribution System (WDS) 28 wireless Internet connection 24 wireless LAN 295 wireless security 29 , 159 , 295 , 308 WLAN interference 305 security parameters 316 WMM 153 WPA 23 , 313 key caching 31 4 pre-authentication 314 user authentication 314 vs WPA -PSK 314 [...]

  • Page 372

    Index NWA-3160 Series User’s Guide 372[...]