Home
ZyXEL NWA1120 User's Manual
Contents
1. 88 DIM e M C RP ERUNT 92 cur WURDE QS 94 Ea apar ipae TT 107 BD ADS oou d e d pb da ai o ede OR poc Fo uc S p d Masuda CRI Rat 111 Elec ecl MEER I I I T E E E T ENIM 118 NWA1120 Series User s Guide 3 Table of Contents Table of Contents oll i l 0 ole H 3 iri f Reo lg e re 4 a Bd a4 ici n 8 Chapter 1 iussit O A nKCO 10 1 1 Introducing e M 10 SOMIT DEI EE T D RN eon mee rN oer tere 10 Tee E E E E E A E dI E ERN E d nonae pa dI DN Eri um REM E 11 J M LII e T 11 Tasa eS S OIGA siae es bI ERE EA AQAEREPE bb EFE A PR EV EdU eU UE RIS ERE OM OL EU ERA RA AH ORELL a EEEE 12 taa RODE LM E 14 Ta occ ae p 14 gx cose cnr su jibi m ct E E E E gest ieladaams E E O E 15 1 4 Configuring Your NWAS Security Features 15 ierit senseuestnkasawuvsenssiaaecnes deriteni denariis 16 141 Control Aogess TO Your DOUDE Loses n x eULEE aana eseina e Ea an aka EILEEN RAS D EE ai 16 Ua o E E E ETT 16 1 5 Good Habits for Managing the NWA sii ec n Ha os UAR tn Haa D RR a GR RR o toes 16 Te Hardware Pia i ORT TI T 17 DP LED e 1r Chapter
2. 1 id Click the lock to prevent further changes Assist me Apply Now NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 4 For dynamically assigned settings select Using DHCP from the Configure I Pv4 list in the TCP IP tab ean Network 4 Show All Q Location Automatic Hj Show Built in Ethernet m PPPoE AppleTalk Proxies Ethernet Configure IPv4 Using DHCP HJ IP Address 0 0 0 0 Renew DHCP Lease Subnet Mask DHCP Client ID If required Router DNS Servers Search Domains Optional IPv6 Address Configure IPv6 Qo 1 Click the lock to prevent further changes Assist me 3 Apply Now 5 For statically assigned settings do the following e From the Configure I Pv4 list select Manually e In the IP Address field type your IP address e In the Subnet Mask field type your subnet mask e In the Router field type the IP address of your device ean Network 4 Show All Q Location Automatic i Show Built in Ethernet m PPPoE AppleTalk Proxies Ethernet Configure IPv4 Manually is IP Address 0 0 0 0 Subnet Mask 0 0 0 0 Router 0 0 0 0 DNS Servers Search Domains Optional IPv6 Address Configure IPv6 id Click the lock to prevent further changes Assist me Apply Now 6 Click Apply Now and close the wind
3. MULTICAST ADDRESS DESCRIPTION FF01 0 0 0 0 0 0 1 All hosts on a local node FF01 0 0 0 0 0 0 2 All routers on a local node FF02 0 0 0 0 0 0 1 All hosts on a local connected link FF02 0 0 0 0 0 0 2 All routers on a local connected link FF05 0 0 0 0 0 0 2 All routers on a local site FF05 0 0 0 0 0 1 3 All DHCP severs on a local site The following table describes the multicast addresses which are reserved and can not be assigned to a multicast group Table 52 Reserved Multicast Address MULTICAST ADDRESS FF00 0 0 0 0 0 0 0 FF01 0 0 0 0 0 0 0 FF02 0 0 0 0 0 0 0 FF03 0 0 0 0 0 0 0 FF04 0 0 0 0 0 0 0 FF05 0 0 0 0 0 0 0 FF06 0 0 0 0 0 0 0 FF07 0 0 0 0 0 0 0 FF08 0 0 0 0 0 0 0 FF09 0 0 0 0 0 0 0 NWA1120 Series Users Guide 171 Appendix D IPv6 Table 52 Reserved Multicast Address continued MULTICAST ADDRESS FF0A 0 0 0 0 0 0 0 FF0B 0 0 0 0 0 0 0 FF0C 0 0 0 0 0 0 0 FF0D 0 0 0 0 0 0 0 FF0E 0 0 0 0 0 0 0 FFOF 0 0 0 0 0 0 0 Subnet Masking Interface EUI 64 Both an IPv6 address and IPv6 subnet mask compose of 128 bit binary digits which are divided into eight 16 bit blocks and written in hexadecimal notation Hexadecimal uses four bits for each character 1 10 A F Each block s 16 bits are then represented by four hexadecimal characters For example FFFF FFFF FFFF FFFF FC00 0000 0000 0000 ID In IPv6 an interface ID is
4. LABEL DESCRIPTION Basic Settings Wireless LAN Select the check box to turn on the wireless LAN on the NWA Interface Operation Mode Select Repeater from the drop down list NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 12 Wireless LAN gt Wireless Settings Repeater continued LABEL DESCRIPTION Wireless Mode If you are in the Wireless LAN gt Wireless Settings or Wireless LAN gt Wireless Settings 2 4G screen you can select from the following e 802 11b g to allow both IEEE802 11b and IEEE802 11g compliant WLAN devices to associate with the NWA The transmission rate of your NWA might be reduced e 802 11b g n to allow IEEE802 11b IEEE802 11g and IEEE802 11n compliant WLAN devices to associate with the NWA The transmission rate of the NWA might be reduced e 802 11n to allow only IEEE802 11n compliant WLAN devices to associate with the NWA If you are in the Wireless LAN gt Wireless Settings 5G screen you can select from the following e 802 11a n to allow IEEE802 11a and IEEE802 11n compliant WLAN devices to associate with the NWA e 802 11a to allow only IEEE802 11a compliant WLAN devices to associate with the NWA e 802 11n to allow only IEEE802 11n compliant WLAN devices to associate with the NWA e 802 11a n ac to allow IEEE802 11a IEEE802 11n and IEEE802 11ac compliant WLAN devices to associate with the NWA The transmission rate of the NWA might be red
5. 802 1Q VLAN Select this to enable VLAN tagging on the NWA Management VLAN Select this to enable VLAN management Only traffic tagged with the management VLAN ID can access the NWA At least one device in your network must belong to the VLAN specified below in order to manage the NWA Management VLAN ID Enter a number from 1 to 4094 to define the NWA s management VLAN group Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh NWA1120 Series User s Guide System 9 1 Overview This chapter shows you how to enable remote management of your NWA It provides information on determining which services or protocols can access which of the NWA s interfaces Remote Management allows a user to administrate the device over the network You can manage your NWA from a remote location via the following interfaces e WLAN e LAN e Both WLAN and LAN e Neither Disable Figure 46 Remote Management Example LAN WLAN In the figure above the NWA A is being managed by a desktop computer B connected via LAN Land Area Network It is also being accessed by a notebook C connected via WLAN Wireless LAN 9 2 What You Can Do in this Chapter Use the WWW screen to configure through which interface s and from which IP address es you can use the Web Browser to manage the NWA see Section 9 4 on page 97 e Use the Certificates screen to d
6. Ethernet adapter Local Area Connection Connection specific DNS Suffix EP AddEessc 4 ded oes PLN ge oe EOS DG Subnet Mask a hm var SG ee ale ae wu ee 2295425540 IP Address sos wo c9 so e ow fe80 2d0 59fftifeb8 103c 4 Default Gateway 10 1 1 254 IPv6 is installed and enabled by default in Windows Vista Use the ipconfig command to check your automatic configured IPv6 address as well You should see at least one IPv6 address available for the interface on your computer Example Enabling DHCPv6 on Windows XP Windows XP does not support DHCPv6 If your network uses DHCPv6 for IP address assignment you have to additionally install a DHCPv6 client software on your Windows XP Note If you use static IP addresses or Router Advertisement for IPv6 address assignment in your network ignore this section This example uses Dibbler as the DHCPv6 client To enable DHCPv6 client on your computer 1 Install Dibbler and select the DHCPv6 client option on your computer 2 After the installation is complete select Start gt All Programs gt Dibbler DHCPv6 gt Client Install as service 3 Select Start Control Panel Administrative Tools Services 4 Double click Dibbler a DHCPv6 client 176 NWA1120 Series User s Guide Appendix D IPv6 i Services File Action View Help meeneem Sy Services Local een oe Local Dibbler a DHCPv6 client Name Description Status
7. NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 11 Wireless LAN gt Wireless Settings Root AP continued LABEL DESCRIPTION Repeater Settings The repeater function allows the NWA in root AP or repeater mode to set up a wireless connection between it and another NWA in root AP or repeater mode Note Repeater security is independent of the security settings between the NWA and any wireless clients Local MAC Address Local MAC Address is the MAC address of your NWA Repeater SSID Profile Select the SSID profile you want to use for repeater connections Note You can only configure None WPA PSK or WPA2 PSK security mode for the SSID used by a repeater connection Advanced Settings Beacon Interval When a wirelessly network device sends a beacon it includes with it a beacon interval This specifies the time period before the device sends the beacon again The interval tells receiving devices on the network how long they can wait in lowpower mode before waking up to handle the beacon A high value helps save current consumption of the access point DTIM Interval Delivery Traffic Indication Message DTIM is the time period after which broadcast and multicast packets are transmitted to mobile clients in the Active Power Management mode A high DTIM value can cause clients to lose connectivity with the network Output Power Set the output power of the NWA in this f
8. NWA1120 Series User s Guide Chapter 11 Maintenance 11 7 Firmware Upgrade Screen Use this screen to upload a firmware to your NWA Click Maintenance Firmware Upgrade Follow the instructions in this section to upload firmware to your NWA Figure 62 Maintenance Firmware Upgrade Firmware Upgrade Firmware Upgrade To uparade the internal device firmware browse to the location of the binary BIN upgrade file and click Upload Upgrade files can be downloaded from website If the upgrade file is compressed ZIP file you must first extract the binary BIN file In some cases you may need to reconfigure File Path The following table describes the labels in this screen Table 37 Maintenance Firmware Upgrade LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it Browse Click Browse to find the bin file you want to upload Remember that you must decompress compressed zip files before you can upload them Upload Click Upload to begin the upload process This process may take up to two minutes Do not turn off the NWA while firmware upload is in progress Figure 63 Firmware Upload In Process Firmware Upgrade Rebooting AP is rebooting now system will upgrade firmware As there will be no indication of when the process is complete please waitfor 141 seconds before attempt
9. Z ZyXEL Device Ethernet parameters 88 good habits 16 Introduction 10 managing 15 resetting 20 117 Security Features 16 NWA1120 Series User s Guide
10. Install Software System Information 1 f System Folders Home Folder 2 My Documents Ev Network Folders A Media 2 46 Media 2 0 GB available xw wO Favorites Applications Computer History Leave User zyxel on linux h20z openSUSE 2 When the Run as Root KDE su dialog opens enter the admin password and click OK Run as root KDE su A C Please enter the Administrator root Ta password to continue Command sbin yast2 Password Ignore X Cancel LE NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 3 When the YaST Control Center window opens select Network Devices and then click the Network Card icon YaST Control Center linux h20z File Edit Help D Software e Network Card Network Devices C fad Network Services 49 Novell AppArmor Security and Users Miscellaneous 4 When the Network Settings window opens click the Overview tab select the appropriate connection Name from the list and then click the Configure button vasr2Glinux h2oz Network Card 9 Network Settings Overview Obtain an overview of installed network cards Global Options Overview Hostname DNS Routing Additionally edit their configuration Name IP Address AMD PCnet Fast 79C971 DHCP Adding a Network Card Press Add to configure a new network card ma
11. SecProfile2 WPA2 PSK iisisVolIPPreSharedKey 8 63 ASCII Characters Back Cancel 6 Your VoIP wireless network is now ready to use Any traffic using the Vol P_ SSID profile will be given the highest priority across the wireless network 4 2 4 Configure the Guest Network When you are setting up the wireless network for guests to your office your primary concern is to keep your network secure while allowing access to certain resources such as a network printer or the Internet For this reason the pre configured Guest_ SSID profile has intra BSS traffic blocking enabled by default Intra BSS traffic blocking means that the client cannot access other clients on the same wireless network 1 Click Wireless LAN gt SSID Click the Edit icon next to Guest SSID Profile Settings Profile Name SSID01 VoIP SSID Guest SSID Profile4 Profile5 Profile Profile7 Profile8 on c c fF WHY SSID SsiIDO1 VoIP_SSID Guest SSID ZyXEL ZyXEL ZyXEL ZyXEL ZyXEL Security Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled RADIUS RadProfi RadProfi RadProfi RadProfi RadProfi RadProfi RadProfi RadProfi e1 e1 e1 e1 e1 e1 e1 e1 QoS WMM WMM WMM WMM WMM WMM WMM WMM MAC Filter Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Modify w amp amp S S 2 Select SecProfile3 in the Security field Do
12. Choose Selected to just allow the computer with the IP address that you specify to access the NWA using this service Select All to allow any computer to access the NWA using this service Choose Selected to just allow the computer with the MAC address that you specify to access the NWA using this service Protocol Version Select the SNMP version for the NWA which you allow the SNMP manager to use to access the NWA The SNMP version on the NWA must match the version on the SNMP manager Get Community Enter the Get Community which is the password for the incoming Get and GetNext requests from the management station Set Community Enter the Set community which is the password for incoming Set requests from the management station Trap Community Type the trap community which is the password sent with each trap to the SNMP manager Trap Destination Type the IP address of the station to send your SNMP traps to SNMPv3 Admin Settings SNMPv3 Admin Select the check box to enable the SNMP administrator account for authentication with SNMP managers using SNMP v3 User Name Specify the user name of the SNMP administrator account Password Enter the password for SNMP administrator authentication Confirm Password Retype the password for confirmation Access Type Specify the SNMP administrator s access rights to MIBs Read Write The SNMP administrator has read an
13. The SNMP user has read rights only meaning the user can collect information from the NWA Read Write The SNMP user has read and write rights meaning that the user can create and edit the MIBs on the NWA Authentication Protocol Select an authentication algorithm used for SNMP communication with the SNMP user MD5 Message Digest 5 and SHA Secure Hash Algorithm are hash algorithms used to authenticate SNMP data SHA authentication is generally considered stronger than MD5 but is slower Privacy Protocol Specify the encryption method used for SNMP communication with the SNMP user DES Data Encryption Standard is a widely used but breakable method of data encryption It applies a 56 bit key to each 64 bit block of data AES Advanced Encryption Standard is another method for data encryption that also uses a secret key AES applies a 128 bit key to 128 bit blocks of data Apply Click Apply to save your customized settings Cancel Click Cancel to begin configuring this screen afresh 9 8 FTP Screen Use this screen to upload and download the NWA s firmware using FTP To use this feature your computer must have an FTP client NWA1120 Series User s Guide Chapter 9 System To change your NWA s FTP settings click System gt FTP The following screen displays Figure 53 System FTP WWW Certificates Telnet FTP Port 21 Server Access Disable iv Secured
14. background WMM BACKGROUND This is typically used for non critical traffic such as bulk transfers and print jobs that are allowed but that should not affect other applications and users Use background priority for applications that do not have strict latency and throughput requirements 6 10 3 Security Mode Guideline The following is a general guideline in choosing the security mode for your NWA e Use WPA 2 PSK if you have WPA 2 aware wireless clients but no RADIUS server e Use WPA 2 security if you have WPA 2 aware wireless clients and a RADIUS server WPA has user authentication and improved data encryption over WEP e Use WPA 2 PSK if you have WPA 2 aware wireless clients but no RADIUS server e If you don t have WPA 2 aware wireless clients then use WEP key encrypting A higher bit key offers better security You can manually enter 64 bit or 128 bit WEP keys More information on Wireless Security can be found in Appendix E on page 179 NWA1120 Series User s Guide LAN 7 1 Overview This chapter describes how you can configure the IP address of your NWA The Internet Protocol IP address identifies a device on a network Every networking device including computers servers routers printers etc needs an IP address to communicate across the network These networking devices are also known as hosts Figure 41 IPv4 Setup e Subnet Mask 255 255 255 0 E o mmm mm The fig
15. downloading while using the 5 GHz band for time sensitive traffic like high definition video music and gaming Figure 1 Dual Band Application treme m eanane a a a 1 2 Wireless Modes The NWA can be configured to use the following WLAN operating modes OPERATING MODE NUMBER OF ssip REPEATER FUNCTION AP FUNCTION MBSSID 8 No Yes Client 1 No No Root AP 5 Yes Yes Repeater 1 Yes Yes Applications for each operating mode are shown below 1 2 1 MBSSID A Basic Service Set BSS is the set of devices forming a single wireless network usually an access point and one or more wireless clients The Service Set IDentifier SSID is the name of a BSS In Multiple BSS MBSSID mode the NWA provides multiple virtual APs each forming its own BSS and using its own individual SSID profile You can configure multiple SSID profiles and have all of them active at any one time You can assign different wireless and security settings to each SSID profile This allows you to compartmentalize groups of users set varying access privileges and prioritize network traffic to and from certain BSSs NWA1120 Series User s Guide EN Chapter 1 Introducing the NWA To the wireless clients in the network each SSID appears to be a different access point As in any wireless network clients can associate only with the SSIDs for which they have the correct security settings
16. Connect using E Accton EN1207D TX PCI Fast Ethernet Adapter This connection uses the following items Ej Client for Microsoft Networks amp File and Printer Sharing for Microsoft Networks lt Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 5 7 8 The Internet Protocol TCP IP Properties window opens Internet Protocol TCP IP Properties General Alternate Configuration fou can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address Obtain DNS server address automatically C Use the following DNS server addresses Advanced Select Obtain an I P address automatically if your network administrator or ISP assigns your IP address dynamically Select Use the following I P Address and fill in the IP address Subnet mask and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternat
17. Eight Subnets Similarly use a 27 bit mask to create eight subnets 000 001 010 011 100 101 110 and 111 NWA1120 Series User s Guide 167 Appendix C IP Addresses and Subnetting The following table shows IP address last octet values for each subnet Table 47 Eight Subnets SUBNET ADDRESS FIRST ADDRESS ADDRESS ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24 bit network number Table 48 24 bit Network Number Subnet Planning NO BORROWED SUBNET MASK NO SUBNETS NO NOSTS PER 1 255 255 255 128 25 2 126 2 255 255 255 192 26 4 62 3 255 255 255 224 27 8 30 4 255 255 255 240 28 16 14 5 255 255 255 248 29 32 6 6 255 255 255 252 30 64 7 255 255 255 254 31 128 1 The following table is a summary for subnet planning on a network with a 16 bit network number Table 49 16 bit Network Number Subnet Planning NO BORROWED SUBNET MASK NO SUBNETS NO HOSTS PER HOST BITS SUBNET 1 255 255 128 0 17 32766 2 255 255 192 0 18 16382 3 255 255 224 0 19 8190 4 255 255 240 0 20 16 4094 5 255 255 248 0 21 32 2046 6 255 255 252 0 22 64 1022 7
18. Extension Channel Protection Mode Noe W A MPDU Aggregation iv Enabled Short GI v Enabled MCS Rate Auto 0 1 2 3 4 5 6 ie 8 9 10 11 32 p0743717 tases Enabled Gani 1 Set the Operation Mode to Root AP 2 Select the Wireless Mode In this example select 802 11b g n 3 Select Profilel as the SSID Profile 4 Choose the Channel you want NWA A to use 5 Click Apply NWA1120 Series User s Guide Chapter 4 Tutorial 6 Goto Wireless LAN SSID Click the Edit icon next to Profile1 10 Profile Settings bad Profi Profi Profi Profi Profi Profi Profi Profi c e WwW Nw on o Profile Name e1 e2 e3 e4 e5 e6 e7 e8 SSID ZyXEL ZyXEL ZyXEL ZyXEL ZyXEL ZyXEL ZyXEL ZyXEL Security RADIUS Disabled RadProfile1 Disabled RadProfile1 Disabled RadProfile1 Disabled RadProfile1 Disabled RadProfile1 Disabled RadProfile 1 Disabled RadProfile1 Disabled RadProfile1 QoS WMM WMM WMM WMM WMM WMM WMM WMM MAC Filter Modify Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Sy Uy Uy Uy Lay Lay Ly Change the SSI D to AP A Select SecProfile1 in the Security field Select the check box for Intra BSS Traffic blocking Enabled so the client cannot access other clients on the same wireless network Click Apply Profile Settings Profile Name Profile1 AP A SecProfile1 RADIUS RadProfilet v MAC Filtering Di
19. Nr 1907 2006 Richtinie 2009 125 EG Raymond Huang Quality amp Customer Service Division Assistant VP Nederlands Dutch Milieuproductverklaring RoHS Richtlin 201 1 65 EU WEEE Richtijn 2012 19 PPW Rihtljn94 52 EG REACH Verordening EG nr 1907 2006 ErP Richtln 2009 125 EG Naarm titel Raymond Huang Quality amp Customer Service Division Assistant VP Datum dd mm aar 01 10 2013 Handtekening Q2 Huon Declaraciones Ambientales de Producto Directiva 2011 65 UE Directiva 2012 19 UE Directiva 94 62 CE REGLAMENTO CE n 1907 2006 Directiva 2009 125 CE Nombre titulo Firma StH Raymond Huang Quality amp Customer Service Division Assistant VP Fecha aaaatmm dd 2013 10 01 Svenska Swedish Milj produktdeklaration RoHS Dwektiv2011 65 EU WEEE Direktiv 2012 19 EU PPW Direktiv 94 62 EG REACH F rordning EG ne 1907 2006 ErP Direktiv 2009 125 EG Namn etel Raymond Huang Quality amp Customer Servico Division Assistant VP Datum dd mm Namnteckning A 01 10 2013 Profil environnemental de produit RoHS WEEE PPW REACH ErP Directive 2011 65 UE Directive 2012 19 UE Directive 94 62 CE R GLEMENT CE N 1907 2006 Directive 2009 125 CE Nom titre Raymond Huang Quality amp Customer Service Division Assistant VP Date aaaatnmj 2013 10 01 Signature Ql Hoan Standardiin perustuva ymp rist tuoteseloste Direkt 2011 65
20. O Manual IP Time Zone Setup Time Zone GMT Greenwich Mean Time Dublin Edinburgh Lisbon London aj isi The following table describes the labels in this screen Table 36 Maintenance Time LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your NWA Each time you reload this page the NWA synchronizes the time with the time server if configured When you disable NTP Client Update you can manually enter the new time in this field and then click Apply Current Date This field displays the last updated date from the time server When you disable NTP Client Update you can manually enter the new date in this field and then click Apply Time and Date Setup NTP Client Update Select this to have the NWA get the time and date from the time server you specified below NTP server Select this option to use the predefined list of Network Time Protocol NTP servers Select an NTP server from the drop list box Manual IP Select this option to enter the IP address or URL of your time server Check with your ISP network administrator if you are unsure of this information Time Zone Setup Time Zone Choose the time zone of your location This will set the time difference between your time zone and Greenwich Mean Time GMT Apply Click Apply to save your changes Cancel Click Cancel to reload the previous configuration for this screen
21. This prevent all wireless devices sharing the same encryption keys a weakness of WEP User Authentication 188 WPA and WPA2 apply IEEE 802 1x and Extensible Authentication Protocol EAP to authenticate wireless clients using an external RADIUS database WPA2 reduces the number of key exchange messages from six to four CCMP 4 way handshake and shortens the time required to connect to a network Other WPA2 authentication features that are different from WPA include key caching and pre authentication These two features are optional and may not be supported in all wireless devices Key caching allows a wireless client to store the PMK it derived through a successful authentication with an AP The wireless client uses the PMK when it tries to connect to the same AP and does not need to go with the authentication process again Pre authentication enables fast roaming by allowing the wireless client already connecting to an AP to perform IEEE 802 1x authentication with another AP before connecting to it NWA1120 Series User s Guide Appendix E Wireless LANs Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA At the time of writing the most widely available supplicant is the WPA patch for Windows XP Funk Software s Odyssey client The Windows XP patch is a free download that adds WPA capability to Windows XP s built in Ze
22. Unsigned ActiveX controls will not be downloaded Appropriate for most Internet sites C Custom Level Default Level OK Cancel Apply 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that Enable is selected the default 5 Under Scripting of Java applets make sure that Enable is selected the default NWA1120 Series User s Guide Appendix B Pop up Windows JavaScript and Java Permissions 6 Click OK to close the window Figure 80 Security Settings Java Scripting Security Settings Settings Scripting B Active scripting 9 Enable Q Promp 8 Allow paste operations via script Q Disable 9 Enable Q Prompt 8 Scripting of Java applets Q Disable Prompt bd Ilene im AM Fs Reset custom settings Reset to Medium Reset ced Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button 3 Scroll down to Microsoft VM 4 UnderJava permissions make sure that a safety level is selected NWA1120 Series User s Guide Appendix B Pop up Windows JavaScript and Java Permissions 5 Click OK to close the window Figure 81 Security Settings Java Security Settings Settings Q Disable 9 Enable ER Font download Q Disable 9 Enable y Q Prompt 5 Microsoft vM Er Java permissions custo
23. dashes are accepted Apply Click Apply to save your changes Cancel Click Cancel to reload the previous configuration for this screen NWA1120 Series User s Guide Chapter 11 Maintenance 11 5 Password Screen Use this screen to control access to your NWA by assigning a password to it Click Maintenance Password The following screen displays Figure 60 Maintenance gt Password Password Password Setup Current Password New Password 1 32 characters Retype to Confirm The following table describes the labels in this screen Table 35 Maintenance Password LABEL DESCRIPTIONS Current Password Type in your existing system password New Password Type your new system password Note that as you type a password the screen displays a dot for each character you type Retype to Confirm Retype your new system password for confirmation Apply Click Apply to save your changes Cancel Click Cancel to reload the previous configuration for this screen NWA1120 Series User s Guide Chapter 11 Maintenance 11 6 Time Screen Use this screen to change your NWA s time and date click Maintenance Time The following screen displays Figure 61 Maintenance Time Current Time and Date Current Time hh mm ss Current Date YY MM DD Time and Date Setup NTP Client Update v Enabled NTP Server ntpi cs wiscedu
24. n In the figure above the NWA checks the identity of devices before giving them access to the network In this scenario Computer A is denied access to the network while Computer B is granted connectivity NWA1120 Series User s Guide Chapter 6 Wireless LAN The NWA secure communications via data encryption wireless client authentication and MAC address filtering It can also hide its identity in the network User Authentication Authentication is the process of verifying whether a wireless device is allowed to use the wireless network You can make every user log in to the wireless network before they can use it However every device in the wireless network has to support IEEE 802 1x to do this For wireless networks you can store the user names and passwords for each user in a RADIUS server This is a server used in businesses more than in homes If you do not have a RADIUS server you cannot set up user names and passwords for your users Unauthorized wireless devices can still see the information that is sent in the wireless network even if they cannot use the wireless network Furthermore there are ways for unauthorized wireless users to get a valid user name and password Then they can use that user name and password to use the wireless network The following table shows the relative effectiveness of wireless security methods Table 10 Wireless Security Levels SECURITY LEVEL SECURITY TYPE Least Unique SSI
25. select Disable to allow any computer to access the NWA through any interface using WWW Secured Client IP Address A secured client is a trusted computer that is allowed to communicate with the NWA using this service Select All to allow any computer to access the NWA using this service Choose Selected to just allow the computer with the IP address that you specify to access the NWA using this service Secured Client MAC Address Select All to allow any computer to access the NWA using this service Choose Selected to just allow the computer with the MAC address that you specify to access the NWA using this service Apply Click Apply to save your customized settings Cancel Click Cancel to begin configuring this screen afresh 9 5 Certificates Screen Use this screen to delete or import certificates NWA1120 Series User s Guide Chapter 9 System Click System Certificates The following screen shows Figure 50 System gt Certificates www Certificates Telnet SNMP FTP Import Certificate Import Certificate Delete Certificates You can delete a certificate ZyXEL RootCA v The following table describes the labels in this screen Table 29 System gt Certificates LABEL DESCRIPTION Import Certificate Import Enter the location of a previously saved certificate to upload to the NWA Alternatively Certificate click the Browse button
26. that allows additional authentication methods to be deployed with no changes to the access point or the wireless clients NWA1120 Series User s Guide Appendix E Wireless LANs RADIUS RADIUS is based on a client server model that supports authentication authorization and accounting The access point is the client and the server is the RADIUS server The RADIUS server handles the following tasks e Authentication Determines the identity of the users e Authorization Determines the network services available to authenticated users once they are connected to the network e Accounting Keeps track of the client s network activity RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication e Access Request Sent by an access point requesting authentication e Access Reject Sent by a RADIUS server rejecting access Access Accept Sent by a RADIUS server allowing access e Access Challenge Sent by a RADIUS server requesting more information in order to allow access The access point sends a proper response from the user and then sends another Access Request message The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting e Accounting
27. 1999 5 EB Direktyvos nuostatas Dutch Hierbij verklaart ZyXEL dat het toestel uitrusting in overeenstemming is met de essenti le eisen en de andere relevante bepalingen van richtlijn 1999 5 EC Maltese Hawnhekk ZyXEL jiddikjara li dan tag mir jikkonforma mal ti ijiet essenzjali u ma provvedimenti o rajn relevanti li hemm fid Dirrettiva 1999 5 EC Hungarian Alul rott ZyXEL nyilatkozom hogy a berendez s megfelel a vonatkoz alapvet k vetelm nyeknek s az 1999 5 EK ir nyelv egy b el r sainak Polish Niniejszym ZyXEL o wiadcza e sprz t jest zgodny z zasadniczymi wymogami oraz pozosta ymi stosownymi postanowieniami Dyrektywy 1999 5 EC Portuguese ZyXEL declara que este equipamento est conforme com os requisitos essenciais e outras disposi es da Directiva 1999 5 EC Slovenian ZyXEL izjavlja da je ta oprema v skladu z bistvenimi zahtevami in ostalimi relevantnimi dolo ili direktive 1999 5 EC Slovak ZyXEL t mto vyhlasuje e zariadenia sp a z kladn po iadavky a v etky pr slu n ustanovenia Smernice 1999 5 EC Finnish ZyXEL vakuuttaa t ten ett laitteet tyyppinen laite on direktiivin 1999 5 EY oleellisten vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen Swedish H rmed intygar ZyXEL att denna utrustning st r I verensst mmelse med de v sentliga egenskapskrav och vriga relevanta best mmelser som framg r av direktiv 1999 5 EC Bulgarian C uacrosujoro ZyXEL Aekn
28. 255 255 254 0 23 128 510 8 255 255 255 0 24 256 254 9 255 255 255 128 25 512 126 10 255 255 255 192 26 1024 62 11 255 255 255 224 27 2048 30 12 255 255 255 240 28 4096 14 NWA1120 Series User s Guide Appendix C IP Addresses and Subnetting Table 49 16 bit Network Number Subnet Planning continued NO BORROWED SUBNET MASK NO SUBNETS NO HOSTS PER 13 255 255 255 248 29 8192 6 14 255 255 255 252 30 16384 2 15 255 255 255 254 31 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation If the ISP or your network administrator assigns you a block of registered IP addresses follow their instructions in selecting the IP addresses and the subnet mask If the ISP did not explicitly give you an IP network number then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established If this is the case it is recommended that you select a network number from 192 168 0 0 to 192 168 255 0 The Internet Assigned Number Authority IANA reserved this block of addresses specifically for private use please do not use any other number unless you are told otherwise You must also enable Network Address Translation NAT on the NWA Once you have decided on the network number pick an IP address for your NWA that is easy to remember for instance 192 168 1 1 bu
29. 5 EF German Hiermit erkl rt ZyXEL dass sich das Ger t Ausstattung in bereinstimmung mit den grundlegenden Anforderungen und den brigen einschl gigen Bestimmungen der Richtlinie 1999 5 EU befindet Estonian K esolevaga kinnitab ZyXEL seadme seadmed vastavust direktiivi 1999 5 EU p hin uetele ja nimetatud direktiivist tulenevatele teistele asjakohastele s tetele English Hereby ZyXEL declares that this equipment is in compliance with the essential requirements and other relevant provisions of Directive 1999 5 EC Spanish Por medio de la presente ZyXEL declara que el equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999 5 CE Greek ME THN lIAPOYZA ZyXEL AHAQNEI OTI e amp amp onAiou c ZYMMOPOONETAI lIPOZ TIZ OYZIOAEI2 ANAITHZEI KAI TIE AOINES ZXETIKEZ AIATA EIZ THE OAHIIAZ 1999 5 EC French Par la pr sente ZyXEL d clare que l appareil quipements est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999 5 EC Italian Con la presente ZyXEL dichiara che questo attrezzatura conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999 5 CE Latvian Ar o ZyXEL deklar ka iek rtas atbilst Direkt vas 1999 5 EK b tiskaj m pras b m un citiem ar to saist tajiem noteikumiem Lithuanian iuo ZyXEL deklaruoja kad is ranga atitinka esminius reikalavimus ir kitas
30. CPU Usage 10 Memory Usage jn 259 Serial Number Ethernet Information LAN MAC Address IPv4 Address Subnet Mask Gateway IP Address IPv6 Address Link Local Global WLAN Information Channel 00 03 7F 42 82 68 192 168 1 2 255 255 255 0 Interface Status Channel Rate LAN DOWN Auto WLAN UP 6 144 4Mbps fe80 203 7fff feff fff64 amp SSID Status Interface SSID BSSID Security VLAN atho ZyXEL 00 03 7F 42 82 68 Disabled Disabled ath1 ZyXEL 02 03 7F 42 82 68 Disabled Disabled ath2 ZyXEL NWA 12 03 7F 42 82 68 Disabled Disabled Summary Statistics Details Association List Details View Log Details Figure 12 The Dashboard Screen NWA1123 NI or NWA1123 AC DASHBOARD r Refresh Interval System Information System Name NWA1123 WLAN Operating Mode 24G 5G Firmware Version System Status System Up Time 00 02 38 Up 2 min Current Date Time 1970 01 01 00 02 38 System Resource CPU Usage E 996 Memory Usage k 26 MBSSID MBSSID VIDORAEQUED 110D9000001 Serial Number Ethernet Information LAN MAC Address IPv4 Address Subnet Mask Gateway IP Address IPv6 Address Link Local Global WLAN Information SSID Status 24G Interface SSID BSSID Security VLAN Channel WLAN 2 4G ZyXEL 2 4G 00 37 FF 00 00 02 Disabled Disabled 00 37 FF 0
31. EU Direktivi 2012 19 EU Direkt 94 62 EY ASETUS EY N o 1907 2006 ErP Direktevi 2009 125 EY Nimi otsikko Allekirjottus Raymond Huang Quality amp Customer Service Division Assistant VP Paivamaara ppikk vewy 01 10 2013 e Z NWA1120 Series User s Guide Index A access privileges 11 Accounting Server 81 Advanced Encryption Standard See AES AES 188 Alerts 108 Alternative subnet mask notation 165 Antenna 86 antenna directional 192 gain 191 omni directional 191 AP access point 181 Applications Access Point 14 AP Bridge 14 applications MBSSID 11 Repeater 14 ATC 73 ATC WMM 73 Basic Service Set 53 see BSS Basic Service Set See BSS 179 beacon 53 Beacon Interval 60 63 69 BSS 11 53 179 C CA 186 Certificate Index authentication 97 file format 97 Certificate Authority See CA Certificates Fingerprint 106 MD5 106 public key 97 SHA1 106 Certification Authority 105 certifications 199 notices 200 viewing 200 Channel 54 channel 181 interference 181 contact information 193 Controlling network access Ways of 10 cookies 18 copyright 199 CTS Clear to Send 182 customer support 193 D disclaimer 199 Distribution System 53 DNS 91 111 documentation related 2 Domain Name Server DNS 111 DS 53 DTIM Interval 60 64 69 dynamic WEP key exchange 187 EAP 56 NWA1120 Series User s Guide Index EAP Authenticatio
32. For example you might want to set up a wireless network in your office where Internet telephony VoIP users have priority You also want a regular wireless network for standard users as well as a guest wireless network for visitors In the following figure VoIP SSID users have QoS priority SSIDO1 is the wireless network for standard users and Guest SSID is the wireless network for guest users In this example the guest user is forbidden access to the wired Land Area Network LAN behind the AP and can access only the Internet Figure 2 Multiple BSSs SSIDO1 i Guest SSID 1 2 2 Wireless Client The NWA can be used as a wireless client to communicate with an existing network Note The NWA1123 NI or NWA1123 AC is a dual band AP which contains two different types of wireless radios to transmit at 2 4 GHz and 5 GHz bands separately and simultaneously If one of the NWA1123 NI wireless radio is set to work in client mode the other radio will be disabled automatically 12 NWA1120 Series User s Guide Chapter 1 Introducing the NWA In the figure below the printer can receive requests from the wired computer clients A and B via the NWA in Client mode Z using only the 2 4 GHz band Figure 3 Wireless Client Application NWA1120 Series User s Guide 13 Chapter 1 Introducing the NWA 1 2 3 Root AP In Root AP mode the NWA Z can act as the root AP in a wireless network and also allow repeaters X and Y
33. Guest MebatK 2 auae rb ec a CA ntt iS E ad Eas a tds spada 25 2 255 Toga he Wiroloss IODWOPRG uaucioxddni cien p texere h DIRA CH EON ri ORE br H I debi teda Ebr poda rais 37 4 5 NWA Setup in AP and Wireless Client Modes 25 etit ripper bI e hdi hU x Eh ba eU ko evvi koi 37 LONE MEIN eT Tc MD PUE af 4 3 2 Configuring the NWA in MBSSID or Root AP MOGQG L iieenrtereirntr kept innE Erb rd anke Era anne erra dank raa 38 4 3 3 Configuring the NWA in Wireless Client Mode 0 ccccseeecccccessecceeeesseacaceeseeeaaaeenenseaaeeenenees 41 JS S2 WS PUES anaiei vei REN bei EE s rU HACER AE ARR EE LEA EEM IK RR a UR Re OE ELP RATER ES pa db ri itE 43 4 3 5 Testing the Connection and Troubleshooting eceeeceeseeceee eene ettet ta annia 44 Part Il Technical BeperonidioendinidsHdaatdud isa icecream nanan 45 Chapter 5 n 47 ge 47 ce red OU ga qM UE 47 Did View Loge 47 Rel MP 48 Pol cc ecu QE er ET 49 SO Channel USAGE e 50 Chapter 6 Wireless UUO 52 CADET I M NER E E TE E TIT D TEES TN EST 52 6 2 What You Can Dor ihis COpEGE sasccecesescot etuusi elei tun pH 2o QUEE ER M2 RAE ER CHR e UMANE E tard HACER PA HAQUE SE EPI ALMU FPES PES ONU MEETS 52 5
34. IP address with host IDs of all zeros is the IP address of the network 192 168 1 0 with a 24 bit subnet mask for example An IP address with host IDs of all ones is the broadcast address for that network 192 168 1 255 with a 24 bit subnet mask for example As these two IP addresses cannot be used for individual hosts calculate the maximum number of possible hosts in a network as follows Table 41 Maximum Host Numbers SUBNET MASK HOST ID SIZE MAXIMUM NUMBER OF HOSTS 8 bits 255 0 0 0 24 bits 224 2 16777214 16 bits 255 255 0 0 16 bits 216 2 65534 24 bits 255 255 255 0 8 bits 28 2 254 29 bits 255 255 255 24 3 bits 23 2 6 8 Since the mask is always a continuous number of ones beginning from the left followed by a continuous number of zeros for the remainder of the 32 bit mask you can simply specify the number of ones instead of writing the value of each octet This is usually specified by writing a followed by the number of bits in the mask after the address For example 192 1 1 0 25 is equivalent to saying 192 1 1 0 with subnet mask 255 255 255 128 NWA1120 Series User s Guide Appendix C IP Addresses and Subnetting The following table shows some possible subnet masks using both notations Table 42 Alternative Subnet Mask Notation cuonermask AERE sae RESORT 255 255 255 0 24 0000 0000 0 255 255 255 128 25 1000 0000 128 255 255 255 192 26 1100 00
35. IPv6 address from a DHCPv6 server Example Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer To enable IPv6 in Windows 7 1 Select Control Panel gt Network and Sharing Center gt Local Area Connection 2 Select the I nternet Protocol Version 6 TCP IPv6 checkbox to enable it 3 Click OK to save the change NWA1120 Series Users Guide 177 Appendix D IPv6 Networking Connect using xr Broadcom NetXtreme Gigabit Ethemet This connection uses the following items iv 0 Client for Microsoft Networks aos Packet Scheduler itl File and Printer Sharing v vi for Microsoft Networks Install Uninstall Properties Description TCP IP version amp The latest version of the intemet protocol that provides communication across diverse interconnected networks Gran eae 4 Click Close to exit the Local Area Connection Status screen 5 Select Start All Programs Accessories Command Prompt 6 Use the ipconfig command to check your dynamic IPv6 address This example shows a global address 2001 b021 2d 1000 obtained from a DHCP server C gt ipconfig Windows IP Configuration Ethernet adapter Local Area Connection Connection specific DNS Suffix IPv6 Address 2001 5021 2d 1000 Link local IPv6 Addr
36. Jenny s public key to verify the message 9 9 4 Certification Authorities A Certification Authority CA issues certificates and guarantees the identity of each certificate owner There are commercial certification authorities like CyberTrust or VeriSign and government NWA1120 Series User s Guide Chapter 9 System certification authorities You can use the NWA to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority 9 9 5 Checking the Fingerprint of a Certificate on Your Computer A certificate s fingerprints are message digests calculated using the MD5 or SHA1 algorithms The following procedure describes how to check a certificate s fingerprint to verify that you have the actual certificate 1 Browse to where you have the certificate saved on your computer 2 Make sure that the certificate has a cer or crt file name extension Figure 54 Certificates on Your Computer a VeriSign cer CA Certificates 3 Double click the certificate s icon to open the Certificate window Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields Figure 55 Certificate Details Certificate 2 x General Details Certification Path Show lt All gt X T Value Secure Server Certification Au Wednesday November 09 19 Friday January 08 2010 7 59 Secure Serv
37. PSK WPA2 PSK MIX Use this screen to employ WPA PSK WPA2 PSK or WPA2 PSK MIX as the security mode of your NWA Select WPA PSK WPA2 PSK or WPA2 PSK MI X in the Security Mode field to display the following screen Figure 33 Security WPA PSK WPA2 PSK or WPA2 PSK MIX Security Security Settings Profile Name Security Mode Pre Shared Key SecProfile1 WPAZ PSK MIX v 8 63 ASCII Characters Back Apply Cancel NWA1120 Series User s Guide Chapter 6 Wireless LAN The following table describes the labels not previously discussed Table 20 Security WPA PSK WPA2 PSK or WPA2 PSK MIX LABEL DESCRIPTION Profile Name This is the name that identifying this profile Security Mode Choose WPA PSK WPA2 PSK or WPA2 PSK MI X in this field Pre Shared Key The encryption mechanisms used for WPA and WPA PSK are the same The only difference between the two is that WPA PSK uses a simple common password instead of user specific credentials Type a pre shared key from 8 to 63 case sensitive ASCII characters including spaces and symbols Back Click Back to return to the previous screen Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh 6 7 RADIUS Screen Use this screen to set up your NWA s RADIUS server settings Click Wireless LAN gt RADI US The screen appears as shown Figure 34 Wireless LAN
38. Power Management mode A high DTIM value can cause clients to lose connectivity with the network Output Power Set the output power of the NWA in this field If there is a high density of APs in an area decrease the output power of the NWA to reduce interference with other APs Select one of the following Full Full Power 50 25 or 12 5 See the product specifications for more information on your NWA s output power NWA1120 Series User s Guide Chapter 6 Wireless LAN 70 Table 14 Wireless LAN gt Wireless Settings MBSSID continued LABEL DESCRIPTION Preamble Type Select Dynamic to have the AP automatically use short preamble when wireless adapters support it otherwise the AP uses long preamble Select Long if you are unsure what preamble mode the wireless adapters support and to provide more reliable communications in busy wireless networks Aggregation RTS CTS Request To Send The threshold number of bytes for enabling RTS CTS handshake Threshold Data with its frame size larger than this value will perform the RTS CTS handshake Setting this attribute to be larger than the maximum MSDU MAC service data unit size turns off the RTS CTS handshake Setting this attribute to its smallest value 1 turns on the RTS CTS handshake Extension You can use CTS to self or RTS CTS protection mechanism to reduce conflicts with other Channel wireless networks or hidden wireless clients The
39. Request Sent by the access point requesting accounting e Accounting Response Sent by the RADIUS server to indicate that it has started or stopped accounting In order to ensure network security the access point and the RADIUS server use a shared secret key which is a password they both know The key is not sent over the network In addition to the shared key password information exchanged is also encrypted to protect the network from unauthorized access Types of EAP Authentication This section discusses some popular authentication types EAP MD5 EAP TLS EAP TTLS PEAP and LEAP Your wireless LAN device may not support all authentication types NWA1120 Series User s Guide Appendix E Wireless LANs EAP Extensible Authentication Protocol is an authentication protocol that runs on top of the IEEE 802 1x transport mechanism in order to support multiple types of user authentication By using EAP to interact with an EAP compatible RADIUS server an access point helps a wireless station and a RADIUS server perform authentication The type of authentication you use depends on the RADIUS server and an intermediary AP s that supports IEEE 802 1x For EAP TLS authentication type you must first have a wired connection to the network and obtain the certificate s from a certificate authority CA A certificate also called digital IDs can be used to authenticate users and a CA issues certificates and guarantees the identity of each c
40. Table FEATURES NWA1121 NI NWA1123 NI NWA1123 AC Supported Wireless Standards IEEE 802 11b IEEE 802 11g IEEE 802 11n IEEE 802 11a IEEE 802 11b IEEE 802 11g IEEE 802 11n IEEE 802 11a IEEE 802 11ac IEEE 802 11b IEEE 802 11g IEEE 802 11n Supported Frequency Bands 2 4 GHz 2 4 GHz MEE 5 GHz 5 GHz Available Security Modes None None None WEP WEP WEP WPA WPA WPA WPA2 WPA2 WPA2 WPA2 MIX WPA2 MIX WPA2 MIX WPA PSK WPA PSK WPA PSK WPA2 PSK WPA2 PSK WPA2 PSK WPA2 PSK MIX WPA2 PSK MIX WPA2 PSK MIX Number of SSID Profiles 8 32 32 Layer 2 Isolation Yes Yes Yes The NWA controls network access with MAC address filtering and RADIUS server authentication It also provides a high level of network traffic security supporting IEEE 802 1x Wi Fi Protected Access WPA WPA2 and WEP data encryption Its Quality of Service QoS features allow you to prioritize time sensitive or highly important applications such as VoIP Your NWA is easy to install configure and use The embedded Web based configurator enables simple straightforward management and maintenance See the Quick Start Guide for instructions on how to make hardware connections 1 1 1 Dual Band The NWA1123 NI or NWA1123 AC is a dual band AP and able to function both 2 4G and 5G networks at the same time You could use the 2 4 GHz band for regular Internet surfing and NWA1120 Series User s Guide Chapter 1 Introducing the NWA
41. Threshold 233485 1 234 Extension Channel Protection Mode None dw A MPDU Aggregation v Enabled Short GI v Enabled Geni Click on the Site Survey button A window should pop up which contains a list of all available wireless devices within your NWA s range Find and select NWA A s SSID AP A Site Survey Select SSID Channel MAC Address Wireless Mode o ZyXEL MIS WPA 1 50 67 F0 37 A0 85 802 11b gin ZT010534 1 00 13 49 00 00 06 802 11b g n 1 22 00 44 79 78 47 802 11b g n NWA1121 NI 85898 1 CC 5D 4E 66 3B 3D 802 11b gin Oo linux jc 1 C8 34 35 C0 00 F5 802 11b g ZT01053 5 40 44 03 49 6E 0C 802 11b g n Oo Home 3160 N 6 40 44 03 79 ED 4D 802 11b g n Oo w8021xwpa 6 50 67 F0 37 9F 72 802 11b g Signal Strength Security sills 7 6 WPA2 WPA2 PSK WPA PSK WPAZ PSK a 33 WPA PSK wl 50 WPA2 PSK alll s0 WPA2 PSK 0 16 WPA NWA1120 Series User s Guide Chapter 4 Tutorial 4 Goto Wireless LAN Security to configure the NWA to use the same security mode and Pre Shared Key as NWA A WPA PSK ThisisMyPreSharedKey Click Apply Figure 14 Security Settings Profile Name SecProfile1 Security Mode WPA PSK v Pre Shared Key ThisisMyPreSharedKey 8 63 ASCII Characters 4 3 4 MAC Filter Setup One way to ensure that only specified wireless clients can access the FTP server is by enabling MAC filtering on NWA B See Section
42. Use this screen to specify devices you want the users on your wireless networks to access Click Wireless LAN gt Layer 2 Isolation The screen displays as shown NWA1120 Series User s Guide Chapter 6 Wireless LAN Note You need to know the MAC address of each wireless client AP computer or router that you want to allow to communicate with the NWA s wireless clients Figure 37 Wireless LAN gt Layer 2 Isolation Index Layer 2 Isolation Configuration MAC Address 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Wireless Settings 2 4G Wireless Settings 5G SSID Security RADIUS Layer 2 Isolation MAC Filter Description Index MAC Address Description 17 00 00 00 00 00 00 18 00 00 00 00 00 00 19 00 00 00 00 00 00 20 00 00 00 00 00 00 21 00 00 00 00 00 00 22 00 00 00 00 00 00 23 00 00 00 00 00 00 24 00 00 00 00 00 00 25 00 00 00 00 00 00 26 00 00 00 00 00 00 27 00 00 00 00 00 00 28 00 00 00 00 00 00 29 00 00 00 00 00 00 30 00 00 00 00 00 00 31 00 00 00 00 00 00 32 00 00 00 00 00 00 The following table describes the labels in this screen Table 22 Wireless LAN gt Layer 2 Isolation LABEL DESCRIPTION Index This is
43. Wi Fi wireless networks On APs without WMM QoS all traffic streams are given the same access priority to the wireless network If the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity then the new traffic stream reduces the throughput of the other traffic streams The NWA uses WMM QoS to prioritize traffic streams according to the IEEE 802 1q or DSCP information in each packet s header The NWA automatically determines the priority to use for an individual traffic stream This prevents reductions in data transmission for applications that are sensitive to latency and jitter variations in delay NWA1120 Series User s Guide Chapter 6 Wireless LAN 6 10 2 1 WMM QoS Priorities The following table describes the WMM QoS priority levels that the NWA uses Table 25 WMM QoS Priorities Priority Level description voice WMM VOICE Typically used for traffic that is especially sensitive to jitter Use this priority to reduce latency for improved voice quality video WMM VIDEO Typically used for traffic which has some tolerance for jitter but needs to be prioritized over other data traffic best effort WMM BESTEFFORT Typically used for traffic from applications or devices that lack QoS capabilities Use best effort priority for traffic that is less sensitive to latency but is affected by long delays such as Internet surfing
44. Your Computers IP Address 3 The IP settings are displayed as follows Mac OS X 10 3 and 10 4 The screens in this section are from Mac OS X 10 4 but can also apply to 10 3 1 Click Apple System Preferences W Finder File Edit Vie About This Mac Software Update Mac OS X Software System Preferences Dock Location Recent Items Force Quit Sleep Restart Shut Down NWA1120 Series User s Guide 135 Appendix A Setting Up Your Computer s IP Address 2 Inthe System Preferences window click the Network icon ean System Preferences gt q Personal gH o E a oo Q Appearance Dashboard amp Desktop amp Dock International Security Spotlight Expos Screen Saver Hardware t i gt A 0 y p Bluetooth CDs amp DVDs Displays Energy Keyboard amp Print amp Fax Sound Saver Mouse e e a B QuickTime Sharing 8 B e Accounts Date amp Time Software Speech Startup Disk Universal Update Access 3 When the Network preferences pane opens select Built in Ethernet from the network connection type list and then click Configure eoo Network J a Show ail Q Location Automatic Show Network Status 3 Built in Ethernet is currently active and has the IP address Built in Ethernet 10 0 1 2 You are connected to the Internet via Built in Ethernet Internet Sharing is on and is using AirPort to share the 6 AirPort connection
45. ZyXEL Spain e http www zyxel es Sweden e ZyXEL Communications e http www zyxel se Switzerland e Studerus AG e http www zyxel ch NWA1120 Series User s Guide Appendix F Customer Support Turkey e ZyXEL Turkey A S e http www zyxel com tr UK e ZyXEL Communications UK Ltd e http www zyxel co uk Ukraine e ZyXEL Ukraine e http www ua zyxel com Latin America Argentina e ZyXEL Communication Corporation e http www zyxel com ec es Ecuador e ZyXEL Communication Corporation e http www zyxel com ec es Middle East Egypt e ZyXEL Communication Corporation e http www zyxel com homepage shtml Middle East e ZyXEL Communication Corporation e http www zyxel com homepage shtml North America USA e ZyXEL Communications Inc North America Headquarters e http www us zyxel com NWA1120 Series User s Guide 197 Appendix F Customer Support Oceania Australia e ZyXEL Communications Corporation e http www zyxel com au en Africa South Africa e Nology Pty Ltd e http www zyxel co za NWA1120 Series User s Guide Legal Information Copyright Copyright 2013 by ZyXEL Communications Corporation The contents of this publication may not be reproduced in any part or as a whole transcribed stored in a retrieval system translated into any language or transmitted in any form or by any means electronic mechanical magnetic optical chemical photocopying
46. a 64 bit identifier It identifies a physical interface for example an Ethernet port or a virtual interface for example the management IP address for a VLAN One interface should have a unique interface ID The EUI 64 Extended Unique Identifier defined by the IEEE Institute of Electrical and Electronics Engineers is an interface ID format designed to adapt with IPv6 It is derived from the 48 bit 6 byte Ethernet MAC address as shown next EUI 64 inserts the hex digits fffe between the third and fourth bytes of the MAC address and complements the seventh bit of the first byte of the MAC address See the following example Table 53 MAC 00 13 49 12 34 56 Table 54 EUI 64 02 13 49 FF FE 12 34 56 Stateless Autoconfiguration With stateless autoconfiguration in IPv6 addresses can be uniquely and automatically generated Unlike DHCPv6 Dynamic Host Configuration Protocol version six which is used in IPv6 stateful autoconfiguration the owner and status of addresses don t need to be maintained by a DHCP server Every IPv6 device is able to generate its own and unique IP address automatically when IPv6 is initiated on its interface It combines the prefix and the interface ID generated from its own Ethernet MAC address see Interface ID and EUI 64 to form a complete IPv6 address When IPv6 is enabled on a device its interface
47. a computer that is connected to a LAN Ethernet port I can see the Login screen but I cannot log in to the NWA Make sure you have entered the user name and password correctly The default user name is admin and default password is 1234 This fields are case sensitive so make sure Caps Lock is not on Disconnect and re connect the power adaptor or cord to the NWA If this does not work you have to reset the device to its factory defaults See Section 2 3 on page 20 I cannot use FTP to upload new firmware See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator Ignore the suggestions about your browser 12 3 Internet Access I cannot access the Internet through the NWA Check the hardware connections and make sure the LEDs are behaving as expected See the Quick Start Guide and Section 12 1 on page 118 Make sure your NWA is connected to a networking device that provides Internet access Make sure your computer is set to obtain a dynamic IP address or has an IP address which is in the same subnet as the broadband modem or router If you are trying to access the Internet wirelessly make sure the wireless settings on the wireless client are the same as the settings on the AP Disconnect all the cables from your device and follow the directions in the Quick Start Guide again If the problem continues contact your ISP NWA1120 Series User s Guide
48. a wired network and also has a wireless connection to another NWA in Repeater mode Y at the same time Z and Y act as repeaters that forward traffic between associated wireless NWA1120 Series User s Guide Chapter 1 Introducing the NWA clients and the wired LAN Clients A and B access the AP and the wired network behind the AP throught repeaters Z and Y Figure 5 Repeater Application Ethernet INTERNEJ When the NWA is in Repeater mode repeater security between the NWA and other repeater is independent of the security between the wireless clients and the AP or repeater If you do not enable repeater security traffic between APs is not encrypted When repeater security is enabled both APs and repeaters must use the same pre shared key See Section 6 6 on page 73 for more details Once the security settings of peer sides match one another the connection between devices is made At the time of writing repeater security is compatible with the NWA only 1 3 Ways to Manage the NWA Use any of the following methods to manage the NWA e Web Configurator This is recommended for everyday management of the NWA using a supported web browser e FTP File Transfer Protocol for firmware upgrades and configuration backup and restore e SNMP Simple Network Management Protocol The device can be monitored by an SNMP manager NWA1120 Series User s Guide EJ Chapter 1 Introducing the NWA 1 4 Configuring Your NW
49. and RFC 1466 Guidelines for Management of IP Address Space NWA1120 Series User s Guide IPv6 Overview IPv6 Internet Protocol version 6 is designed to enhance IP address size and features The increase in IPv6 address size to 128 bits from the 32 bit IPv4 address allows up to 3 4 x 10 8 IP addresses IPv6 Addressing The 128 bit IPv6 address is written as eight 16 bit hexadecimal blocks separated by colons This is an example IPv6 address 2001 0db8 1a2b 0015 0000 0000 1la2f 0000 IPv6 addresses can be abbreviated in two ways e Leading zeros in a block can be omitted So 2001 0db8 1a2b 0015 0000 0000 1a2 0000 can be written as 2001 db8 1a2b 15 0 0 1a2 0 e Any number of consecutive blocks of zeros can be replaced by a double colon A double colon can only appear once in an IPv6 address So 2001 0db8 0000 0000 1a2 0000 0000 0015 can be written as 2001 0db8 1a2 0000 0000 0015 2001 0db8 0000 0000 1a2 0015 2001 db8 1a2 0 0 15 Or 2001 db8 0 0 la2f 15 Prefix and Prefix Length Similar to an IPv4 subnet mask IPv6 uses an address prefix to represent the network address An IPv6 prefix length specifies how many most significant bits start from the left in the address compose the network address The prefix length is written as x where x is a number For example 2001 db8 1a2b 15 1a2 0 32 means that the first 32 bits 2001 db8 is the subnet prefix Link local Address A link local address
50. are used to encrypt data Both the NWA and the wireless stations must use the same WEP key for data transmission Key 4 If you chose 64 bit WEP then enter any 5 ASCII characters or 10 hexadecimal characters 0 9 A F If you chose 128 bit WEP then enter 13 ASCII characters or 26 hexadecimal characters 0 9 A F You can configure up to four keys but only one key can be activated at any one time Back Click Back to return to the previous screen Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh 6 6 2 Security WPA WPA2 WPA2 MIX This screen varies depending on the operating mode you select in the Wireless LAN Wireless Settings screen 6 6 2 1 Access Point Use this screen to employ WPA or WPA2 as the security mode for your NWA that is in root AP MBSSID or repeater operating mode Select WPA WPA2 or WPA2 MI X in the Security Mode field to display the following screen Figure 31 Security WPA WPA2 for Access Point Security Security Settings Profile Name Security Mode Rekey Options Reauthentication Time Enable Group Key Update Every 100 Seconds max 100 3600 SecProfile1 WPA2 MIX vi 300 Seconds max 100 3600 The following table describes the labels in this screen Table 18 Security WPA WPA2 for Access Point LABEL DESCRIPTION Security Settings Profile Name This is the name that iden
51. clients The throughput of RTS CTS is much lower than CTS to self Using this mode may decrease your wireless performance NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 13 Wireless LAN Wireless Settings Wireless Client continued LABEL DESCRIPTION A MPDU Aggregation This field is not available in the NWA1123 NI Select to enable A MPDU aggregation Message Protocol Data Unit MPDU aggregation collects Ethernet frames along with their 802 11n headers and wraps them in a 802 11n MAC header This method is useful for increasing bandwidth throughput in environments that are prone to high error rates Short GI This field is not available in the NWA1123 NI Select Enabled to use Short GI Guard Interval The guard interval is the gap introduced between data transmission from users in order to reduce interference Reducing the GI increases data transfer rates but also increases interference Increasing the GI reduces data transfer rates but also reduces interference Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh NWA1120 Series User s Guide 67 Chapter 6 Wireless LAN 6 4 4 MBSSID Mode Use this screen to have the NWA function in MBSSID mode Select MBSSI D as the Operation Mode The following screen diplays Figure 25 Wireless LAN gt Wireless Settings MBSSID Wireless Settings SSID Secu
52. configuration file before making configuration changes The backup configuration file will be useful in case you need to return to your previous settings Click Backup to save the NWA s current configuration to your computer 11 8 2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NWA Table 38 Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it Browse Click Browse to find the file you want to upload Remember that you must decompress compressed ZIP files before you can upload them Upload Click Upload to begin the upload process Do not turn off the NWA while configuration file upload is in progress You must then wait one minute before logging into the NWA again NWA1120 Series User s Guide Chapter 11 Maintenance The NWA automatically restarts in this time causing a temporary network disconnect In some operating systems you may see the following icon on your desktop Figure 66 Network Temporarily Disconnected d Local Area Connection Network cable unplugged If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default NWA IP address 192 168 1 2 See Appendix A on page 123 for details on how to set up y
53. des T l communications IBPT Visitez http www ibpt be pour de plus amples d tails Denmark In Denmark the band 5150 5350 MHz is also allowed for outdoor usage I Danmark m frekvensb ndet 5150 5350 ogs anvendes udend rs Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy Unless this wireless LAN product is operating within the boundaries of the owner s property its use requires a general authorization Please check http www sviluppoeconomico gov it for more details Questo prodotto conforme alla specifiche di Interfaccia Radio Nazionali e rispetta il Piano Nazionale di ripartizione delle frequenze in Italia Se non viene installato all interno del proprio fondo l utilizzo di prodotti Wireless LAN richiede una Autorizzazione Generale Consultare http www sviluppoeconomico gov it per maggiori dettagli Latvia The outdoor usage of the 2 4 GHz band requires an authorization from the Electronic Communications Office Please check http www esd lv for more details 2 4 GHz frekven u joslas izmanto anai arpus telp m nepiecie ama atiauja no Elektronisko sakaru direkcijas Vairak inform cijas http www esd lv Notes 1 Although Norway Switzerland and Liechtenstein are not EU member states the EU Directive 1999 5 EC has also been implemented in those countries 2 The regulatory limits for maximum output power are specifi
54. gei TET m 118 12 1 Power Hardware Connections and LEDS 55 5 x rrr rr ko phar epa pA Nn RR ra inan 118 ped pue ctehcgcl m 119 2S iuge Re 120 TAA ir o LAN M 121 Appendix A Setting Up Your Computer s IP Address sssssssse eme 123 Appendix B Pop up Windows JavaScript and Java Permissions sseseeeeeee 151 Appendix C IP Addresses and SUDNING isinsin pr beber e b FR ER HE EC Rr n 162 Pore DU DEG ssa t p pre OECD ec ar CH LIT i Pac DOR CREER CR RC CUR RC na E 170 Append E Wireless LANG asinine 179 Appendix F Customer SUPPE vasca Weber er b c a A HC EF CORE CERA PR 193 Append G egal IntGrfrigllon aociscorekerkeexisre Xr nad e pia Fe REPE RR FED REEL Vi i T ELA GE X Ear 199 j 205 NWA1120 Series User s Guide PART Introducing the NWA This chapter introduces the main applications and features of the NWA It also discusses the ways you can manage your NWA 1 1 Introducing the NWA This User s Guide covers the following models NWA1121 NI NWA1123 NI and NWA1123 AC Your NWA is an IPv6 wireless AP Access Point that can function in several wireless modes It extends the range of your existing wired network without additional wiring providing easy network access to mobile users Table 1 NWA Series Comparison
55. if you have a dynamic IP address Select Statically assigned IP Address if you have a static IP address Fill in the IP address Subnet mask and Hostname fields 7 Click Next to save the changes and close the Network Card Setup window NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 8 If you know your DNS server IP address es click the Hostname DNS tab in Network Settings and then enter the DNS server information in the fields provided YaST2 linux h20z Enter the name for this computer and the DNS domain that it belongs to Optionally enter the name server list and domain search list Note that the hostname is global it applies to all a Network Settings Global Options Overview Hostname DNS J Routing Hostname and Domain Name Hostname Domain Name linux h2oz site _ Change Hostname via DHCP _ Write Hostname to etc hosts interfaces not just this one The domain is especially important if this computer is a mail server If you are using DHCP to get an IP address check whether to get a hostname via DHCP The hostname of your host which can be seen by issuing the hostname command will be set automatically by the DHCP client You may want to disable this option if you connect 4 to different networks vj X Change etc resolv conf manually Name Servers and Domain Search List Name Server 1
56. is assigned the default priority e Ifyou select WMM VOICE WMM VIDEO WMM BESTEFFORT or WMM BACKGROUND the NWA applies that QoS setting to all of that SSID s traffic e If you select None the NWA applies no priority to traffic on this SSID Note When you configure an SSID profile s QoS settings the NWA applies the same QoS setting to all of the profile s traffic BSSID VLAN ID Number of Wireless Stations Allowed to Associate Enter a VLAN ID for the SSID profile Packets coming from the WLAN using this SSID profile are tagged with the VLAN ID number by the NWA Use this field to set a maximum number of wireless stations that may connect to the device Hidden SSID If you do not select the checkbox the NWA broadcasts this SSID a wireless client scanning for an AP will find this SSID Alternatively if you select the checkbox the NWA hides this SSID a wireless client scanning for an AP will not find this SSID Intra BSS Traffic Blocking Select this to prevent wireless clients in this profile s BSS from communicating with one another Enable Layer 2 Select this to enable layer 2 isolation for this profile Wireless clients that connect to Isolation the WLAN using this SSID can access only certain pre defined devices See Section 6 8 on page 81 Intra BSS traffic blocking is enabled automatically when you enable layer 2 isolation Back Click Back to return to the previous screen Appl
57. manual or otherwise without the prior written permission of ZyXEL Communications Corporation Published by ZyXEL Communications Corporation All rights reserved Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the right to make changes in any products described herein without notice This publication is subject to change without notice Your use of the NWA is subject to the terms and conditions of any related service providers Trademarks Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners Certifications Federal Communications Commission FCC Interference Statement The device complies with Part 15 of FCC rules Operation is subject to the following two conditions e This device may not cause harmful interference e This device must accept any interference received including interference that may cause undesired operations This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This device generates uses and can radiate radio frequency energy and if not installed and used in accordanc
58. prepare your computer or computer network to connect to the NWA refer to the Quick Start Guide 2 Launch your web browser NWA1120 Series User s Guide Chapter 2 Introducing the Web Configurator 3 Type 192 168 1 2 as the URL default The login screen appears Figure 7 The Login Screen 4 Type admin as the default username and 1234 as the default password Click Login 5 You should see a screen asking you to change your password highly recommended as shown next Type a new password and retype it to confirm then click Apply Alternatively click Ignore Note If you do not change the password the following screen appears every time you login Figure 8 Change Password Screen You should now see the Dashboard screen See Chapter 2 on page 18 for details about the Dashboard screen NWA1120 Series Users Guide Chapter 2 Introducing the Web Configurator 2 3 Resetting the NWA If you forget your password or cannot access the web configurator you will need to use the RESET button at the rear panel of the NWA This replaces the current configuration file with the factory default configuration file This means that you will lose all the settings you previously configured The password will be reset to 1234 Figure 9 The RESET Button 2 3 1 Methods of Restoring Factory Defaults You can erase the current configuration and restore factory defaults in two ways Use the RESET button to upload
59. procedure click Continue whenever Windows displays a screen saying that it needs your permission to continue NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 6 Select Internet Protocol Version 4 TCP I Pv4 and then select Properties Networking Connect using La Intel R PRO 1000 MT Desktop Connection This connection uses the following items amp Client for Microsoft Networks de Network Monitor Driver e File and Printer Sharing for Microsoft Networks Interg REN Tea PAP ve Link Layer Topology Discovery apper 1 0 Driver Link Layer Topology Discovery Responder Description Transmission Control Protocol Intemet Protocol The default wide area network protocol that provides communication across diverse interconnected networks NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 9 The Internet Protocol Version 4 TCP IPv4 Properties window opens Internet Protocol Version 4 ICP IPv4 Properties EAA General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings 5 Use the following IP address Obtain DNS server address automatically i Use the following DNS server addresses Advanced Emme Selec
60. station B is in wireless client mode Station B is connected to a File Transfer Protocol FTP server You want only specified wireless clients to be able to access station B You also want to allow NWA1120 Series User s Guide Chapter 4 Tutorial wireless traffic between B and wireless clients connected to A W Y and Z X must not be able to connect to the FTP server Other wireless devices Figure 13 FTP Server Connected to a Wireless Client NWA in AP Mode NWA in Wireless Client Mode 4 3 2 Configuring the NWA in MBSSID or Root AP Mode Before setting up the NWA as a wireless client B you need to make sure there is an access point to connect to Use the Ethernet port on NWA A to configure it via a wired connection NWA1120 Series User s Guide Chapter 4 Tutorial Log into the Web Configurator on NWA A and go to the Wireless LAN gt Wireless Settings screen Basic Settings Wireless LAN Interface Enabled Operation Mode Root AP Wireless Mode 802 11b g n Channel 6 Channel Width 20MHZ Select SSID Profile Active Profile Profile 1 Proflet v Profle v 3 E Profile Profile v Repeater Settings Local MAC Address Repeater SSID Profile Profile bd Advanced Settings Beacon Interval 100 25 1000 ms DTIM Interval 4 1 15 Output Power Full v Preamble Type Dynamic iv RTSI CTS Threshold 2346 1 2346
61. the Enabled check box if you do not want the NWA to use the data rate Turn on the Auto option to have the NWA set the data rates automatically to optimize the throughput Note You can set the NWA to use up to four MCS rates at a time Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh NWA1120 Series User s Guide Chapter 6 Wireless LAN 6 4 2 Repeater Mode Use this screen to have the NWA act as a wireless repeater You need to know the MAC address of the peer device which also must be in Repeater or Root AP mode Figure 23 Wireless LAN gt Wireless Settings Repeater Wireless Settings i SSID Security RADIUS l MAC Fiiter Basic Settings Wireless LAN Interface Enabled Operation Mode Repeater v Wireless Mode 802 11b g n xi Channel 6 v Channel Width 20MHZ x Repeater Settings Local MAC Address Repeater SSID Profile Profile2 v Root MAC Address 00 40 c5 01 23 45 Advanced Settings Beacon Interval 100 25 1000 ms DTIM Interval 1 1 15 Output Power Full id Preamble Type Dynamic x RTS CTS Threshold 2346 1 2346 Extension Channel Protection Mode None M A MPDU Aggregation v Enabled Short GI v Enabled MCS Rate Auto 0 2 3 4 5 6 7 8 9 10 111 12 143 7145145 Enabled v The following table describes the bridge labels in this screen Table 12 Wireless LAN gt Wireless Settings Repeater
62. the IP address to the list of Allowed sites Figure 78 Pop up Blocker Settings Pop up Blocker Settings Exceptions Pop ups are currently blocked You can allow pop ups from specific Web sites by adding the site to the list below Address of Web site to allow http 4 192 168 1 1 Allowed sites Notifications and Filter Level Play a sound when a pop up is blocked Show Information Bar when a pop up is blocked Filter Level Medium Block most automatic pop ups Pop up Blocker FAQ 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting JavaScript If pages of the web configurator do not display properly in Internet Explorer check that JavaScript are allowed NWA1120 Series User s Guide Appendix B Pop up Windows JavaScript and Java Permissions 1 InInternet Explorer click Tools I nternet Options and then the Security tab Figure 79 Internet Options Security internet Options TE General Security Privacy Content Connections Programs Advanced Select a Web content zone to specify its security settings j Aa o e Intemet Local intranet Trusted sites Restricted sites Internet Eo This zone contains all Web sites you haven t placed in other zones m Security level for this zone Move the slider to set the security level for this zone Medium Safe browsing and still functional F Prompts before downloading potentially unsafe content
63. the default configuration file Hold this button in for about 3 seconds the light will begin to blink Use this method for cases when the password or IP address of the NWA is not known Use the web configurator to restore defaults refer to Section 11 8 on page 116 NWA1120 Series User s Guide Chapter 2 Introducing the Web Configurator 2 4 Navigating the Web Configurator The following summarizes how to navigate the web configurator from the Dashboard screen This guide uses the NWA1121 NI screens as an example The screens may vary slightly for different models Figure 10 Status Screen of the Web Configurator ZyXEL nwa1i21 ni DASHBOARD System Information System Status System Name NWA1121 NI System Up Time 23 57 34 Up 23 57 WLAN Operating Mode Root AP Current Date Time 1970 01 01 23 57 36 Firmware Version 1 00 AA4BJ 0 System Resource Serial Number CPU Usage Ethernet Information Memory Usage LAN MAC Address 00 03 7F 42 82 68 IPv4 Address 192 168 1 2 Subnet Mask 255 255 255 0 A15 Interface Status Gateway IP Address Interface Pv6 Address LAN Auto Link Local fe80 203 7fff feff ffft G4 WLAN 144 4Mbps Global WLAN Information Channel 45 SSID Status Interface SSID BSSID Security atho ZyXEL 00 03 7F 42 82 68 Disabled ath1 ZyXEL 02 03 7F 42 82 68 Disabled ath2 ZyXEL NWA 12 03 7F 42 82 68 Disabled 4 Summary Statistics Details Association List Details
64. the index number of the MAC address listed MAC Address Enter the MAC addresses of the wireless client AP computer or router that you want to allow the associated wireless clients to have access to in these address fields Enter the MAC address in a valid MAC address format six hexadecimal character pairs for example 12 34 56 78 9a bc Description Enter a name to identify this device Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh 6 9 MAC Filter Screen Every Ethernet device has a unique MAC Media Access Control address The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters for example NWA1120 Series User s Guide Chapter 6 Wireless LAN 00 A0 C5 00 00 02 You need to know the MAC address of each device to configure MAC filtering on the NWA The MAC filter function allows you to configure the NWA to grant access to the NWA from other wireless devices Allow Association or exclude devices from accessing the NWA Deny Association Figure 38 MAC e Z2 YY XX 33 22 11 c AA BB CC 11 22 33 C D 4 7 J a In the figure above wireless client U is able to connect to the Internet because its MAC address is in the allowed association list specified in the NWA The MAC address of client A is either denied association or is not in the list of allowed wireless clients specified in the NWA sanee Use t
65. throughput of RTS CTS is much lower Protection Mode than CTS to self Using this mode may decrease your wireless performance A MPDU This field is available only when 802 11n 802 11b g n 802 11a n or 802 11a n ac is selected as the Wireless Mode Select to enable A MPDU aggregation Message Protocol Data Unit MPDU aggregation collects Ethernet frames along with their 802 11n headers and wraps them in a 802 11n MAC header This method is useful for increasing bandwidth throughput in environments that are prone to high error rates Short GI This field is available only when 802 11n 802 11b g n 802 11a n or 802 11a n ac is selected as the Wireless Mode Select Enabled to use Short GI Guard Interval The guard interval is the gap introduced between data transmission from users in order to reduce interference Reducing the GI increases data transfer rates but also increases interference Increasing the GI reduces data transfer rates but also reduces interference MCS Rate The MCS Rate table is available only when 802 11n 802 11b g n or 802 11a n or 802 11a n ac is selected in the Wireless Mode field IEEE 802 11n supports many different data rates which are called MCS rates MCS stands for Modulation and Coding Scheme This is an 802 11n feature that increases the wireless network performance in terms of throughput For each MCS Rate 0 15 select either Enabled to have the NWA use the data rate Clear the Ena
66. to extend the range of its wireless network at the same time In the figure below both clients A B and C can access the wired network through the root AP Figure 4 Root AP Application e On the NWA in Root AP mode you can have multiple SSIDs active for reqular wireless connections and one SSID for the connection with a repeater repeater SSID Wireless clients can use either SSID to associate with the NWA in Root AP mode A repeater must use the repeater SSID to connect to the NWA in Root AP mode When the NWA is in Root AP mode repeater security between the NWA and other repeater is independent of the security between the wireless clients and the AP or repeater If you do not enable repeater security traffic between APs is not encrypted When repeater security is enabled both APs and repeaters must use the same pre shared key See Section 6 6 on page 73 for more details Unless specified the term security settings refers to the traffic between the wireless clients and the AP At the time of writing repeater security is compatible with the NWA only 1 2 4 Repeater The NWA can act as a wireless network repeater to extend a root AP s wireless network range and also establish wireless connections with wireless clients Using Repeater mode your NWA can extend the range of the WLAN In the figure below the NWA in Repeater mode Z has a wireless connection to the NWA in Root AP mode X which is connected to
67. to locate a list Browse Click this button to locate a previously saved certificate to upload to the NWA Import Click this button to upload the previously saved certificate displayed in the Import Certificate field to the NWA Delete Certificate You can delete a Select the certificate from the list that you want to delete certificate Delete Click this to delete the selected certificate 9 6 Telnet Screen Use this screen to configure your NWA for remote Telnet access You can use Telnet to access the NWA s Command Line Interface CLI Click System Telnet The following screen displays Figure 51 System gt Telnet WWW Certificates Telnet SNMP Telnet Port 23 Server Access Disable Iw Secured Client IP Address 9 Al Selected 0 0 0 0 Secured Client MAC Address 9 Al Selected 00 00 00 00 00 00 NWA1120 Series User s Guide Chapter 9 System The following table describes the labels in this screen Table 30 System gt Telnet LABEL DESCRIPTION TELNET Port You can change the server port number for a service if needed however you must use the same port number in order to use that service for remote management Server Access Select the interface s through which a computer may access the NWA using Telnet and to which the IP and MAC filtering rules you specified below are applied Otherwise select Disable to allow any computer to acces
68. you don t have an external RADIUS server you should use WPA2 PSK WPA2 Pre Shared Key that only requires a single identical password entered into each access point wireless gateway and wireless client As long as the passwords match a wireless client will be granted access to a WLAN If the AP or the wireless clients do not support WPA2 just use WPA or WPA PSK depending on whether you have an external RADIUS server or not Select WEP only when the AP and or wireless clients do not support WPA or WPA2 WEP is less secure than WPA or WPA2 NWA1120 Series User s Guide 187 Appendix E Wireless LANs Encryption WPA improves data encryption by using Temporal Key Integrity Protocol TKIP Message Integrity Check MIC and IEEE 802 1x WPA2 also uses TKIP when required for compatibility reasons but offers stronger encryption than TKIP with Advanced Encryption Standard AES in the Counter mode with Cipher block chaining Message authentication code Protocol CCMP TKIP uses 128 bit keys that are dynamically generated and distributed by the authentication server AES Advanced Encryption Standard is a block cipher that uses a 256 bit mathematical algorithm called Rijndael They both include a per packet key mixing function a Message Integrity Check MIC named Michael an extended initialization vector IV with sequencing rules and a re keying mechanism WPA and WPA2 regularly change and rotate the encryption keys so that the
69. 0 00 01 192 168 1 2 255 255 255 0 LAN DOWN N A WLAN 2 4G UP 6 300Mbps WLAN 5G UP 40 144 4Mbps fe80 237fffffe00 1 64 5G ZyXEL 02 37 FF 00 00 02 Disabled Disabled Channel WLAN 5G ZyXEL_5G 00 37 FF 00 00 03 Disabled Disabled test 02 37 FF 00 00 03 Disabled Disabled Summary Statistics Details Association List Details View Log Details NWA1120 Series User s Guide Chapter 3 Dashboard The following table describes the labels in this screen Table4 The Dashboard Screen LABEL DESCRIPTION Refresh Interval Select how often you want the NWA to update this screen Refresh Now Click this to update this screen immediately System Information System Name This field displays the NWA system name It is used for identification You can change this in the Maintenance General screen s System Name field WLAN Operating This field displays the current operating mode of the wireless module Root AP Mode Repeater Client or MBSSI D You can change the operating mode in the Configuration gt Wireless LAN gt Wireless Settings screen 2 4G This field displays the current operating mode of the 2 4G wireless module Root AP Repeater Client or MBSSI D You can change the operating mode in the Configuration Wireless LAN Wireless Settings 2 4G screen 5G This field displays the current operating mode of the 5G wireless m
70. 00 192 255 255 255 224 27 1110 0000 224 255 255 255 240 28 1111 0000 240 255 255 255 248 29 1111 1000 248 255 255 255 252 30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub networks In the following example a network administrator creates two sub networks to isolate a group of servers from the rest of the company network for security reasons In this example the company network address is 192 168 1 0 The first three octets of the address 192 168 1 are the network number and the remaining octet is the host ID allowing a maximum of 28 2 or 254 possible hosts The following figure shows the company network before subnetting Figure 89 Subnetting Example Before Subnetting a H Y Internet a a A I 0 I D I n I 0 I i y 192 168 1 0 24 a a A um m um um um um Em um Um um um You can borrow one of the host ID bits to divide the network 192 168 1 0 into two separate sub networks The subnet mask is now 25 bits 255 255 255 128 or 25 The borrowed host ID bit can have a value of either 0 or 1 allowing two subnets 192 168 1 0 25 and 192 168 1 128 25 NWA1120 Series User s Guide Appendix C IP Addresses and Subnetting Example The following figure shows the company network after subnetting There are now two sub networks A and B Figure 90 Subnetting Example After Subne
71. 05 99d Ceniiicalon PON EER MNS Lasse Mh ada a Yea eR ER Le pL RR RE Rodas pad ota Fina e e eap 105 9 9 5 Checking the Fingerprint of a Certificate on Your Computer seesseeeecenee 106 6 NWA1120 Series User s Guide Table of Contents Chapter 10 LOJ ici e 107 QUSS c i Mee TR 107 10 2 What You Can Da n this Chaptal i2 ceiiedit eee pla tee ui Stir ne pra sper epa PURI Sese raai S ee x Gol Sae SW INER 107 TOG VIRAL rou Negd TO GO Fuissaasssxsuriteluxa bru QUERER ELE URL d PRELA RAO UC HERR QUod Cb CERE E VY E CEU bI Ried teu di 108 OE MEAE orecchie T US 108 Chapter 11 PU 111 NES 1 ep HR 111 TT 2 What You Can Do inthis Chapel asse cede SR bre CE EFE RISduS REA Fut US NEM AR UCHES SERI QU IO MEER PIE eee 111 11a What E Mid Pe A 112 p Generol Spree RES T NS UT Tnm TIR EM 112 TIAM PSST SPCC asesor vd dedi eivai de fa b ee eo 113 EO PSI DURO DIT RA 114 DESI 2156611 DEM EIUS 115 11 8 Conmngutreation File SOFBOITiiiiceteceiiiacdxci veccdeti iun i22 quc lotis docti cot ez deua ci o ASA 116 TATE kur OE A e anh adeiaamEd 116 TIS RE Te CONNOR AUOW adcccdxisian tubus cni aiastetrodeeeroinpu dee ati das aS 116 11 8 3 Back to Factory DefaullS 11 erii dete actu sd dta ut datas Na 117 TES RESER Sn EE I m o mU Tus 117 Chapter 12 Bie
72. 1111 11111111 11111111 11000000 NWA1120 Series User s Guide Appendix C IP Addresses and Subnetting Table 43 Subnet 1 continued IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE Subnet Address Lowest Host ID 192 168 1 1 192 168 1 0 Broadcast Address Highest Host ID 192 168 1 62 192 168 1 63 Table 44 Subnet 2 LAST OCTET BIT IP SUBNET MASK NETWORK NUMBER VALUE IP Address 192 168 1 64 IP Address Binary 11000000 10101000 00000001 01000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address Lowest Host ID 192 168 1 65 192 168 1 64 Broadcast Address Highest Host ID 192 168 1 126 192 168 1 127 Table 45 Subnet 3 IP SUBNET MASK NETWORK NUMBER DA aaa IP Address 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 128 Lowest Host ID 192 168 1 129 Broadcast Address 192 168 1 191 Highest Host ID 192 168 1 190 Table 46 Subnet 4 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 192 IP Address Binary 11000000 10101000 00000001 11000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 192 Lowest Host ID 192 168 1 193 Broadcast Address 192 168 1 255 Highest Host ID 192 168 1 254 Example
73. 2 0015 2001 db8 1a2 0 0 15 Or 2001 db8 0 0 la2f 15 Prefix and Prefix Length Similar to an IPv4 subnet mask IPv6 uses an address prefix to represent the network address An IPv6 prefix length specifies how many most significant bits start from the left in the address compose the network address The prefix length is written as x where x is a number For example 2001 db8 1a2b 15 1a2 0 32 means that the first 32 bits 2001 db8 is the subnet prefix Link local Address A link local address uniquely identifies a device on the local network the LAN It is similar to a private IP address in IPv4 You can have the same link local address on multiple interfaces on a device A link local unicast address has a predefined prefix of fe80 10 The link local unicast address format is as follows Table 26 Link local Unicast Address Format 1111 1110 10 0 Interface ID 10 bits 54 bits 64 bits Global Address A global address uniquely identifies a device on the Internet It is similar to a public IP address in IPv4 A global unicast address starts with a 2 or 3 NWA1120 Series User s Guide Chapter 7 LAN 7 4 LAN IP Screen Use this screen to configure the IP address for your NWA Click Network LAN to display the following screen Figure 42 LAN IP IPv4 Address Assignment Obtain IP Address Automatically 9 Use Fixed IP Address IP Address Subnet Mask Gateway IP Ad
74. 2 Introducing Rol de 18 BE 1 Ker ER m 18 dL PERSIST Web COMON O cosas toot hana e qae CR a ERA P DARREN 18 2a Resetting he NIA 20 2435 1 Methods of Restoring Factory Defaulis oasacieccissascucesssanaaieatcsninaaedessavausesisenpkaedarsnbud hen Rie nk t 20 24 riscumesBucXuliEeenp uM 21 Z0 HS BE eco a tede oii nlt es ded o n E o aT I E 21 2A 2 UY PBI TT EUM 22 pA T is 23 Chapter 3 i i 24 21 MUMS LSU UNEVEN Bs SO MNT LOT LEER 24 4 NWA1120 Series User s Guide Table of Contents Chapter 4 i node 28 4 1 How to Configure the Wireless LAN iiiusiuuen ener tnn tta mn ka Etna kt ehh ka ku Ead nE 28 341 1 Choosing the Wireless MOGG iauucuicenessecueeesscsee aei saos toit iE SS 28 ped i apa ns EET 28 4 2 How to Configure Multiple Wireless Networks eicere eerte retten eterne eap tea nne yo ote re AERRR Ea Sek inaa 28 422 T4600 9urs tie SSIEFPEGRIGS uus rdc dodo yr d dd bc d or p dt d d t d 30 4 2 2 Configure the Standard Network ieeeessieis eiiis esee inan haha anth haha dn nta Aaa dne RE Adda 32 4 2 3 Configure the VolP NGDWOIK A tiniru inin n EE ceusreeinzaaareente 33 4 2 4 Configure tive
75. 2 bet Yos Neb TO NNO minesinin lord ubi tt hi rt pb t Rad do Hav hatt ts a ti ul dde 53 m muip ccmlsigcdeel get aie tngitdn aceon tanmeas can aentaoi anand 57 cl RODE AP MOGO e 58 ir Maz MOE ENTE OTT QUT TNNT IER 62 ccm Vrele Cion o e mm 65 RAY WA MOIE e 68 HEED ey S e se cco a hc Sens OMNE ARTE A N AE 71 6 5 1 Configuring b X T2 NWA1120 Series User s Guide 5 Table of Contents CO VVNGISSS SOUN COOR T3 ceee e llc TD o LO UTE 75 5 5 2 Security WPA WIPAS VUPRI M IX cd ccasicecascasiucivurncioenontiadertantanniyed Fase e ER FEE atin E Eina ak 76 6 6 3 Security WPA PSK WPA2 PSK WPA2 PSK MIX ssssssssesesseeenen nennen nnns 78 Er RADIUS Sorel a o idiot ipia oR I e pe at puta bue ante atu extulit M ean 79 6 0 Layar leolalliON M 81 ME ase GREE yai aR TO EE E OO 82 Dg RAC Fiter Sree asauude beu n E 83 D TO Technical RTS CS naia o e db i c Ub do br a o o on UL ERA 85 6 10 1 Additional Wireless TEMS ss sac Sta dats ed ania x apd uk bara adn aa eR eap FREE aaraa ana anle s lapels rales 86 MBs pt ep HUE 86 Apex DN ssXtislp M E 87 Chapter 7 LAN Rec 88 TOVE x tette en bp M AM intulutciu iam t
76. 20 I cannot see or access the Login screen in the web configurator 1 Make sure you are using the correct IP address e The default IP address is 192 168 1 2 e If you changed the IP address Section 7 4 on page 90 use the new IP address e If you changed the IP address and have forgotten it see the troubleshooting suggestions for I forgot the IP address for the NWA 2 Check the hardware connections and make sure the LEDs are behaving as expected See the Quick Start Guide and Section 1 7 on page 17 3 Make sure your Internet browser does not block pop up windows and has JavaScript and Java enabled See Section 12 1 on page 118 4 Make sure your computer is in the same subnet as the NWA If you know that there are routers between your computer and the NWA skip this step e If there is no DHCP server on your network make sure your computer s IP address is in the same subnet as the NWA 5 Resetthe device to its factory defaults and try to access the NWA with the default IP address See Chapter 2 on page 20 6 If the problem continues contact the network administrator or vendor or try one of the advanced suggestions NWA1120 Series User s Guide Chapter 12 Troubleshooting Advanced Suggestions e Try to access the NWA using another service such as Telnet If you can access the NWA check the remote management settings to find out why the NWA does not respond to HTTP e If your computer is connected wirelessly use
77. 2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT NWA1120 Series User s Guide 123 Appendix A Setting Up Your Computer s IP Address 1 2 3 Click Start Control Panel e Internet Explorer eA My Documents 3 Outlook Express E My Recent Documents gt W Paint cA My Pictures 99i Files and Settings Transfer W gt x BY Command Prompt e My Music E Acrobat Reader 4 0 I My Computer Tour Windows xP Vl Windows Movie Maker tg Printers and Faxes Q9 Help and Support All Programs gt 177 Run B Log Off Turn Off Computer start untitled Paint In the Control Panel click the Network Connections icon E Control Panel File Edit View Favorites Tools Help Q d DO search gt Folders fal G Control Panel Address V Control Panel Qe Switch to Category view See Also Game Controllers Windows Update Right click Local Area Connection and then select Properties ocal Area Connection nabled L a Standard PCI Fast Ethernet Disable Status Repair Bridge Connections Create Shortcut Rename NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 4 On the General tab select Internet Protocol TCP IP and then click Properties Local Area Connection Properties General Authentication Advanced
78. 6 9 on page 83 for more information on MAC Filter Q1 Goto Wireless LAN gt MAC Filter Click the Edit icon next to MacProfilel MAC Filter Profiles Profile Name Filter Action Modify 1 MacProfile1 Disabled C 2 MacProfile2 Disabled 3 3 MacProfile3 Disabled 4 4 MacProfile4 Disabled a 5 MacProfile5 Disabled 3 6 MacProfile6 Disabled 4 7 MacProfile7 Disabled 3 8 MacProfile8 Disabled 3 2 Select Allow in the Access Control Mode field Enter the MAC addresses of the wireless clients W Y and Z you want to associate with the NWA Click Apply MAC Filter MAC Filter Settings Profile Name MacProfile1 Access Control Mode MAC Address MAC Address 1 2 3 4 Now only the authorized wireless clients W Y and Z can access the FTP server NWA1120 Series User s Guide EB Chapter 4 Tutorial 4 3 5 Testing the Connection and Troubleshooting This section discusses how you can check if you have correctly configured your network setup as described in this tutorial e Try accessing the FTP server from wireless clients W Y or Z Test if you can send or retrieve a file If you cannot establish a connection with the FTP server do the following steps Make sure W Y and Z use the same wireless security settings as A and can access A Make sure B uses the same wireless and wireless security settings as A and can access A Make sure intra BSS traffic is enabled on A e Try accessing the FTP server fro
79. 71 Ubuntu 8 Network Tools Mc Devices Network Jools eben ub 3a Tool Edit Help Devices Ping Netstat Traceroute Port Scan Lookup Finger whois Network device 3i Configure IP Information Protocol IP Address Netmask Prefix Broadcast Scope IPv4 10 0 2 15 255 255 255 0 10 0 2 255 IPv6 fe80 a00 27ff fe30 el6c 64 Link Interface Information Interface Statistics Hardware address 08 00 27 30 e1 6c sremitied sytes 684 6 KiB Multicast Enabled Transmitted packets 1425 MTU 1500 Transmission errors 0 Link speed not available Received bytes 219 5 KiB State Active Received packets 1426 Reception errors 0 Collisions 0 mm Linux openSUSE 10 3 KDE This section shows you how to configure your computer s TCP IP settings in the K Desktop Environment KDE using the openSUSE 10 3 Linux distribution The procedure screens and file locations may vary depending on your specific distribution release version and individual configuration The following screens use the default openSUSE 10 3 installation Note Make sure you are logged in as the root administrator Follow the steps below to configure your computer IP address in the KDE NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 1 Click K Menu Computer Administrator Settings YaST Ka seach iri F3 Applications a Administrator Settings
80. 92 VoIP 12 73 W warranty 200 note 200 WDS 14 Web Configurator 18 password 19 requirements 18 supported browsers 18 WEP 55 WEP key encrypting 87 Wi Fi Multimedia QoS 86 Wi Fi Protected Access 55 187 Wired Equivalent Privacy 55 Wireless Client 41 wireless client WPA supplicants 189 Wireless Distribution System WDS 14 Wireless Mode 54 Wireless Mode Choosing the Access Point 28 Bridge 28 Wireless Client 28 Wireless Security 16 how to improve 16 Levels 55 wireless security 12 184 Wireless Security Screen WEP 75 WPA 76 Access Point 76 Wireless Client 77 WPA PSK WPA2 PSK WPA2 PSK MIX 78 Wireless Settings Screen 52 Access Point Mode 58 Antenna 86 AP Bridge Mode 65 Bridge Mode 62 BSS 53 Channel 54 ESS 53 Fragmentation Threshold 86 Intra BSS Traffic 86 Operating Mode 53 Preamble 86 Roaming 86 RTS CTS Threshold 86 SSID 53 Wireless Client Mode 65 Wireless Mode 54 WMM QoS 86 WLAN interference 181 security parameters 190 WMM 73 WMM QoS 86 WPA 55 187 key caching 188 pre authentication 188 user authentication 188 vs WPA PSK 188 wireless client supplicant 189 with RADIUS application example 189 WPA2 55 187 user authentication 188 vs WPA2 PSK 188 wireless client supplicant 189 with RADIUS application example 189 WPA2 MIX 55 WPA2 Pre Shared Key 187 WPA2 PSK 187 188 application example 189 WPA2 PSK MIX 55 WPA PSK 187 188 application example 189 NWA1120 Series User s Guide Index
81. A 802 1X WPA ZyXELO4 TU CAavanced 1 a Click the lock to prevent further changes 6 Click Apply and close the window NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address Verifying Settings Check your TCP IP properties by clicking Applications Utilities Network Utilities and then selecting the appropriate Network interface from the Info tab Figure 70 Mac OS X 10 5 Network Utility eoo twork Utili Info Netstat AppleTalk Ping Lookup Traceroute Whois Finger PortScan Please sels eiueckinterface for information Network Interface en1 a Hardware Address 00 30 65 25 6a b3 Sent Packets 1230 Transfer Statistics IP Address es 10 0 2 2 Send Errors 0 Link Speed 11 Mbit s Recv Packets 1197 Link Status Active Recv Errors 0 Vendor Apple Collisions 0 Model Wireless Network Adapter 802 11 Linux Ubuntu 8 GNOME This section shows you how to configure your computer s TCP IP settings in the GNU Object Model Environment GNOME using the Ubuntu 8 Linux distribution The procedure screens and file locations may vary depending on your specific distribution release version and individual configuration The following screens use the default Ubuntu 8 installation Note Make sure you are logged in as the root administrator Follow the steps below to configure your computer IP address in GNOME 1 Click System gt Administration gt Network Syste
82. A is to slow down Memory Usage This field displays what percentage of the NWA s volatile memory is currently in use The higher the memory usage the more likely the NWA is to slow down Some memory is required just to start the NWA and to run the web configurator Interface Status Interface This column displays each interface of the NWA Status This field indicates whether or not the NWA is using the interface For each interface this field displays Up when the NWA is using the interface and Down when the NWA is not using the interface Channel This shows the channel number which the NWA is currently using over the wireless LAN Rate For the LAN port this displays the port speed and duplex setting For the WLAN interface it displays the downstream and upstream transmission rate or N A if the interface is not in use SSID Status This section is not available when the WLAN operation mode is Client Interface This column displays each of the NWA s wireless interfaces SSID This field displays the SSID s currently used by each wireless module BSSID This field displays the MAC address of the wireless module Security This field displays the type of wireless security used by each SSID VLAN This field displays the VLAN ID of each SSID in use or Disabled if the SSID does not use VLAN NWA1120 Series User s Guide 27 Tutorial This chapter first provides an overview
83. A s Security Features Your NWA comes with a variety of security features This section summarizes these features and provides links to sections in the User s Guide to configure security settings on your NWA Follow the suggestions below to improve security on your NWA and network 1 4 1 Control Access to Your Device Ensure only people with permission can access your NWA e Control physical access by locating devices in secure areas such as locked rooms Most NWAs have a reset button If an unauthorized person has access to the reset button they can then reset the device s password to its default password log in and reconfigure its settings e Change any default passwords on the NWA such as the password used for accessing the NWA s web configurator if it has a web configurator Use a password with a combination of letters and numbers and change your password regularly Write down the password and put it in a safe place e See Section 11 5 on page 113 for instructions on changing your password e Configure remote management to control who can manage your NWA See Chapter 9 on page 94 for more information If you enable remote management ensure you have enabled remote management only on the IP addresses services or interfaces you intended and that other remote management settings are disabled 1 4 2 Wireless Security Wireless devices are especially vulnerable to attack Take the following measures to improve wireless security e E
84. ADIUS MAC Filtering QoS BSSID VLAN ID Number of Wireless Stations Allowed to Associate Hidden SSID Intra BSS Traffic Blocking SSID01 SSID01 Disabled vi RadProfile1 v Disabled v WMM v 1 1 4094 64 1 64 Enabled Enabled 4 Repeat Step 2 and 3 to change Profile2 and Profile3 to Vol P_SSID and Guest SSID NWA1120 Series User s Guide Chapter 4 Tutorial 4 2 1 1 MBSSID 1 Goto Wireless LAN Wireless Settings Select MBSSI D from the Operation Mode drop down list box 2 SSIDOI is the standard network so select SSI DO1 as the first profile It is always active 3 Select VoIP SSID as the second profile and Guest SSI D as the third profile Select the corresponding Active check boxes 4 Click Apply to save your settings Now the three SSIDs are activated Wireless Setings SSID Securiy RADIUS WAC Fiver lll Basic Settings Wireless LAN Interface Y Enabled Wireless Mode 802 41b g n ivl Channel 6 M Channel Width 20MHZ v Select SSID Profile Profile Active Profile 1 ss001 2 ssi x 3 VolP SSID 4 ssi x 5 Guest SSID 6 SSiD x 7 O ssiD01 w 8 ssp x Advanced Settings Beacon Interval 100 25 1000 ms DTIM Interval 1 1 15 Output Power Full iv Preamble Type Dynamic vi RTSICTS Threshold 2346 1 2346 Extension Channel Protection Mod
85. AES No Enable WPA2 PSK TKIP AES Yes Disable Antenna Overview An antenna couples RF signals onto air A transmitter within a wireless device sends an RF signal to the antenna which propagates the signal through the air The antenna also operates in reverse by capturing RF signals from the air Positioning the antennas properly increases the range and coverage area of a wireless LAN Antenna Characteristics Frequency An antenna in the frequency of 2 4GHz or 5GHz is needed to communicate efficiently in a wireless LAN Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna s coverage area Antenna Gain Antenna gain measured in dB decibel is the increase in coverage within the RF beam width Higher antenna gain improves the range of the signal for better communications For an indoor site each 1 dB increase in antenna gain results in a range increase of approximately 2 5 For an unobstructed outdoor site each 1dB increase in gain results in a range increase of approximately 5 Actual results may vary depending on the network environment Antenna gain is sometimes specified in dBi which is how much the antenna increases the signal power compared to using an isotropic antenna An isotropic antenna is a theoretical perfect antenna that sends out radio signals equally well in all directions dBi represents the true gain that the antenna provides Types of Antennas f
86. Advanced Opera can start with your favorite Web pages or continue from last time Startup Continue From last time Home page ntte fiportal opera com Lise Current Choose how you prefer to handle pop ups Pop ups C Open all pop t Open pop ups in background Block unwanted pop ups Block all pop ups Select your preferred language for Opera and Web pages Language Engish US en US Y Details Enabling Java x Preferences ox cme He From Opera click Tools then Preferences In the Advanced tab select Content from the left side menu Select the check boxes as shown in the following screen Figure 86 Opera Enabling Java Preferences General Forms Search Web Pag quy Tabs Enable animated images Browsing Notifications Enable sound in Web pages Enable JavaScript E JavaScript Option Enable plug ins Style Options Content settings can be adapted to each site Manage Site Preferences Blocked Content x OK Cancel Help NWA1120 Series User s Guide Appendix B Pop up Windows JavaScript and Java Permissions To customize JavaScript behavior in the Opera browser click JavaScript Options Figure 87 Opera JavaScript Options x Allow resizing of windows Allow moving of windows Allow raising of windows Allow lowering of windows Allow changing of status field Allow scripts to detect context
87. Authority CA to handle certificates which imposes a management overhead EAP TTLS Tunneled Transport Layer Service EAP TTLS is an extension of the EAP TLS authentication that uses certificates for only the server side authentications to establish a secure connection Client authentication is then done by sending username and password through the secure connection thus client identity is protected For client authentication EAP TTLS supports EAP methods and legacy authentication methods such as PAP CHAP MS CHAP and MS CHAP v2 PEAP Protected EAP Like EAP TTLS server side certificate authentication is used to establish a secure connection then use simple username and password methods through the secured connection to authenticate the clients thus hiding client identity However PEAP only supports EAP methods such as EAP MD5 EAP MSCHAPv2 and EAP GTC EAP Generic Token Card for client authentication EAP GTC is implemented only by Cisco NWA1120 Series User s Guide Appendix E Wireless LANs LEAP LEAP Lightweight Extensible Authentication Protocol is a Cisco implementation of IEEE 802 1x Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server This key expires when the wireless connection times out disconnects or reauthentication times out A new WEP key is generated each time reauthentication is performed If this feature is enabled it is not necessary to configure a defau
88. COUNTRY CODE SELECTION USAGE WLAN DEVICES Note The country code selection is for non US model only and is not available to all US model Per FCC regulation all Wi Fi product marketed in US must fixed to US operation channels only Your product is marked with this symbol which is known as the WEEE mark WEEE stands for Waste Electronics and Electrical Equipment It means that used electrical and electronic products should not be mixed with general waste Used electrical and electronic equipment should be treated separately NWA1120 Series User s Guide Appendix G Legal Information Environmental Product Declaration English Deutsch German Espa ol Spanish Fran ais Frenchi Environmental product declaration RoHS WEEE PPW REACH ErP Directive 2011 65 EU Directive 2012 19 EU Directive 94 62 EC Regulation EC No 1907 2006 Directive 2009 125 EC Name title Raymond Huang Quality amp Customer Service Division Assistant VP Date ddi mm yyyy 01 10 2013 Signature Orel Heo Italiano Italian Dichiarazione ambientale di prodotto RoHS WEEE PPW Direttiva 2011 65 UE Direttiva 2012 19 UE Direttiva 84 62 CE REGOLAMENTO CE n 1907 2006 Direttiva 2009 125 CE Nome ttolo Raymond Huang Quality amp Customer Service Division Assistant VP Data aaaa mm gg Produkt Umweltdeklaration Richtinie 2011 65 EU Richtlinie 2012 19 EU Richtlinie 94 62 EG VERORDNUNG EG
89. Chapter 12 Troubleshooting I cannot access the Internet anymore I had access to the Internet with the NWA but my Internet connection is not available anymore 1 Check the hardware connections and make sure the LEDs are behaving as expected See the Quick Start Guide and Section 1 7 on page 17 2 Reboot the NWA 3 If the problem continues contact your ISP or network administrator The Internet connection is slow or intermittent 1 There might be a lot of traffic on the network Look at the LEDs and check Section 1 7 on page 17 If the NWA is sending or receiving a lot of information try closing some programs that use the Internet especially peer to peer applications 2 Checkthe signal strength If the signal is weak try moving the NWA in wireless client mode closer to the AP if possible and look around to see if there are any devices that might be interfering with the wireless network microwaves other wireless networks and so on 3 Reboot the NWA 4 Ifthe problem continues contact the network administrator or vendor or try one of the advanced suggestions Advanced Suggestions e Check the settings for QoS If it is disabled you might consider activating it 12 4 Wireless LAN I cannot access the NWA or ping any computer from the WLAN 1 Make sure the wireless LAN is enabled on the NWA 2 Make sure the wireless adapter on the wireless station is working properly 3 Make sure the wireles
90. Client IP Address 9 Al Selected 0 0 0 0 Secured Client MAC Address 9 Al Selected 00 00 00 00 00 00 SNMP FTP The following table describes the labels in this screen Table 32 System gt FTP LABEL DESCRIPTION FTP Port You may change the server port number for a service if needed however you must use the same port number in order to use that service for remote management Server Access Select the interface s through which a computer may access the NWA using this service and to which the IP and MAC filtering rules you specified below are applied Otherwise select Disable to allow any computer to access the NWA through any interface using this service Secured Client IP Address A secured client is a trusted computer that is allowed to communicate with the NWA using this service Select All to allow any computer to access the NWA using this service Choose Selected to just allow the computer with the IP address that you specify to access the NWA using this service Secured Client MAC Address Select All to allow any computer to access the NWA using this service Choose Selected to just allow the computer with the MAC address that you specify to access the NWAe using this service Apply Click Apply to save your customized settings Cancel Click Cancel to begin configuring this screen afresh 9 9 Technical Reference This section provides some technical
91. D Default Secure Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802 1x EAP with RADIUS Server Authentication Wi Fi Protected Access WPA WPA2 Most Secure The available security modes in your NWA are as follows e None No data encryption e WEP Wired Equivalent Privacy WEP encryption scrambles the data transmitted between the wireless stations and the access points to keep network communications private e WPA Wi Fi Protected Access WPA is a subset of the IEEE 802 11i standard e WPA2 WPA2 IEEE 802 11i is a wireless security standard that defines stronger encryption authentication and key management than WPA e WPA2 MI X This commands the NWA to use either WPA2 or WPA depending on which security mode the wireless client uses e WPA PSK This adds a pre shared key on top of WPA standard e WPA2 PSK This adds a pre shared key on top of WPA2 standard e WPA2 PSK MI X This commands the NWA to use either WPA PSK or WPA2 PSK depending on which security mode the wireless client uses Note To guarantee 802 11n wireless speed please only use WPA2 or WPA2 PSK security mode Other security modes may degrate the wireless speed performance to 802 11g NWA1120 Series User s Guide 55 Chapter 6 Wireless LAN Passphrase A passphrase functions like a password In WEP security mode it is further converted by the NWA into a complicated string that
92. Disabled RadProfile1 WMM Disabled g 5 Profile5 ZyXEL Disabled RadProfile1 WMM Disabled Lg 6 Profile6 ZyXEL Disabled RadProfile1 WMM Disabled 3 7 Profile7 ZyXEL Disabled RadProfile1 WMM Disabled Li 8 Profiles ZyXEL Disabled RadProfile1 WMM Disabled 2 2 Select SecProfile2 as the Security Profile for the VoIP network Select the Hidden SSI D check box NWA1120 Series User s Guide Chapter 4 Tutorial 3 Select WMM VOICE in the QoS field to give VoIP the highest priority in the wireless network Click Apply Profile Settings Profile Name VolP_SSID SSID VoIP_SSID RADIUS RadProfile1 vi MAC Filtering Disabled Y WMM VOICE BSSID VLAN ID 4 1 4094 Number of Wireless Stations Allowed to 64 1 1 54 Associate Hidden SSID v Enabled Intra BSS Traffic Blocking C Enabled Back Gx ply Cancel 4 Next click Wireless LAN gt Security Click the Edit icon next to SecProfile2 Security Profiles Profile Name Security Mode Modify 1 SecProfile1 WPA2 PSK MIX Ei 2 SecProfile2 None 3 SecProfile3 None Fi 4 SecProfile4 None s 5 SecProfile5 None 3 6 SecProfile6 None 4 7 SecProfile7 None 4 8 SecProfile8 None 4 NWA1120 Series User s Guide Chapter 4 Tutorial 5 Select WPA2 PSK as the Security Mode and enter the Pre Shared Key In this example use ThisisVol PPreSharedKey Click Apply Security Settings Profile Name Security Mode Pre Shared Key
93. Domain Search 10 0 2 3 Name Server 2 Name Server 3 _ Update DNS data via DHCP 9 Click Finish to save your settings and close the window Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP IP properties From the Options sub menu select Show Connection I nformation Figure 73 openSUSE 10 3 KNetwork Manager i Disable Wireless v 4 Show Connection Information Configure 44 KNetworkManager Ey Wired Devices 3 Switch to Offline Mode X Wired Network Dial Up Connections X Options NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address When the Connection Status KNetwork Manager window opens click the Statistics tab to see if your connection is working properly Figure 74 openSUSE Connection Status KNetwork Manager Connection Status KNetworkManager Device Addresse T Statistics Received Transmitted Bytes 2317441 841875 MBytes 2 2 0 8 Packets 3621 3140 Errors 0 0 Dropped 0 0 KBytes s 0 0 0 0 NWA1120 Series User s Guide Pop up Windows JavaScript and Java Permissions In order to use the web configurator you need to allow e Web browser pop up windows from your device JavaScript enabled by default e Java permissions enabled by default Note The screens used below belong to Internet Explorer version 6 7 and 8 Scre
94. LAN Information SSID This field displays the SSID Service Set Identifier This is available only when the WLAN operation mode is Client Channel The channel or frequency used by the NWA to send and receive information in the 2 4G or 5G wireless network Status This shows the current status of the wireless LAN This is available only when the WLAN operation mode is Client Security Mode This displays the security mode the NWA is using This is available only when the WLAN operation mode is Client Summary Statistics Association List Click this link to view port status and packet specific statistics See Section 5 4 on page 48 Click this to see a list of wireless clients currently associated to each of the NWA s wireless modules See Section 5 5 on page 49 NWA1120 Series User s Guide Chapter 3 Dashboard Table 4 The Dashboard Screen continued LABEL DESCRIPTION View Log Click this to see a list of logs produced by the NWA See Section 5 3 on page 47 System Status System Up Time This field displays the elapsed time since the NWA was turned on Current Date Time This field displays the date and time configured on the NWA You can change this in the Maintenance Time screen System Resource CPU Usage This field displays what percentage of the NWA s processing ability is currently being used The higher the CPU usage the more likely the NW
95. NWA Select WEP in the Security Mode field to display the following screen Figure 30 Security WEP Security Security Settings Profile Name Security Mode Authentication Type Data Encryption Passphrase Note Enter a passphrase to automatically generate a WEP key or leave it blank if you want to manually enter the WEP key Key 1 2 Y O Key 2 ran Key 3 O Key 4 Note SecProfile1 WEP iv Open y 128 bit WEP iv Generate tmax 16 alphanumeric printable characters 64 bit WEP Enter 5 ASCII characters or 10 hexadecimal characters 0 9 A F 128 bit WEP Enter 13 ASCII characters or 26 hexadecimal characters 0 9 A F Back Apply Cancel The following table describes the labels in this screen Table 17 Security WEP LABEL DESCRIPTION Profile Name This is the name that identifying this profile Security Mode Choose WEP in this field Authentication Type Select Open or Shared from the drop down list box Data Encryption Select 64 bit WEP or 128 bit WEP to enable data encryption Passphrase Enter the passphrase or string of text used for automatic WEP key generation on wireless client adapters Generate Click this to get the keys from the Passphrase you entered NWA1120 Series User s Guide 75 Chapter 6 Wireless LAN Table 17 Security WEP continued LABEL DESCRIPTION Key 1 to The WEP keys
96. Power Set the output power of the NWA in this field If there is a high density of APs in an area decrease the output power of the NWA to reduce interference with other APs Select one of the following Full Full Power 50 25 or 12 596 See the product specifications for more information on your NWA s output power Preamble Type Select Dynamic to have the NWA automatically use short preamble when the wireless network your NWA is connected to supports it otherwise the NWA uses long preamble Select Long preamble if you are unsure what preamble mode the wireless device your NWA is connected to supports and to provide more reliable communications in busy wireless networks RTS CTS Threshold Request To Send The threshold number of bytes for enabling RTS CTS handshake Data with its frame size larger than this value will perform the RTS CTS handshake Setting this attribute to be larger than the maximum MSDU MAC service data unit size turns off the RTS CTS handshake Setting this attribute to its smallest value 1 turns on the RTS CTS handshake Fragmentation This field is not available in the NWA1123 NI The threshold number of bytes for the fragmentation boundary for directed messages It is the maximum data fragment size that can be sent Extension channel protection mode You can use CTS to self or RTS CTS protection mechanism to reduce conflicts with other wireless networks or hidden wireless
97. Pv3 Admin Settings SNMPv3 Admin Enabled User Name SNMPv3Admin Password prevem l ke 32 alphanumeric printable characters and no spaces Confirm Password eeccccce Access Type Read Write v Authentication Protocol SHA Privacy Protocol DES v SNMPv3 User Settings SNMPv3 User v Enabled User Name SNMPv3User Password seccccce 8 32 alphanumeric printable characters and no spaces Confirm Password eeccccce Access Type Read Only v Authentication Protocol MD5 dv Privacy Protocol None ivl NWA1120 Series User s Guide Chapter 9 System The following table describes the labels in this screen Table 31 System SNMP LABEL DESCRIPTION SNMP Port You can change the server port number for a service if needed however you must use the same port number in order to use that service for remote management Server Access Select the interface s through which a computer may access the NWA using SNMP and to which the IP and MAC filtering rules you specified below are applied Otherwise select Disable to allow any computer to access the NWA through any interface using SNMP Secured Client IP Address Secured Client MAC Address SNMP Configuration A secured client is a trusted computer that is allowed to communicate with the NWA using this service Select All to allow any computer to access the NWA using this service
98. R BIRRA ER 2 Mae ERMER ie SS EA o EVEZH WUE LE E o EREE gt IRESE c BIRIA RIE K BBR REESE PERIERE a Z AURERTE SERBS SERT RU NAAR e YD ERE SE gt SALI f TE 5 25 5 35 GHz PRENE ER Se gt PRPS ZEA BE Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This Class B digital apparatus complies with Canadian ICES 003 Cet appareil num rique de la classe B est conforme a la norme NMB 003 du Canada ErP Energy related Products Declaration of Conformity All ZyXEL products put on the EU market in compliance with the requirement of the European Parliament and the Council published Directive 2009 125 EC establishing a framework for the setting of ecodesign requirements for energy related products recast so called as ErP Directive Energy related Products directive This product has been outside the scope of Energy efficiency limitation requirement in the light of the terms of Regulation EC No 1275 2008 Annex II 2 Four years after this Regulation has come into force c Availability of off mode and or standby mode Equipment shall except where this is inappropriate for the intended use provide off mode and or standby mode and or another condition which does not exceed the applicable power consumption requirements for off mode and or standby mode when the equipment is con
99. Startup Type Log On As SRy DCOM Server Process Launcher Provides la Started Automatic Local System i anages ni Started Automa ocal System Start the service h Dibbler a DHCPv dient EM Automatic Local System SD M RE arted Automatic ocal System x Distributed Transaction Coordinator Coordinate Manual Network S Description Dns Client Resolves a Started Automatic Network 5 Dibbler a p ortable DHCPv6 By Error Reporting Service Allows erro Started Reon Local System This is DHCPv6 cient 3 Event Log Enables ev Started Automatic Local System is cent version Sis Extensible Authentication Protocol Provides wi Manual Local System 0 7 2 Sie Fast User Switching Compatibility Provides m Manual Local System Sis FLEXnet Licensing Service This servic Manual Local System ise e i i Extended 5 Click Start and then OK Dibbler a DHCP v6 client Properties Local Computer a General Log On Recovery Dependencies Service name DHCPv6Client Display name Dibbler a DHCPv6 client Description Dibbler a portable DHCP v6 This is DHCP v6 client version 0 7 2 Path to executable C Program Files DHCPv6Client_dibbler dibbler client exe service d C NPr Startup type Automatic x Service status Stopped sten You can specify the start parameters that apply when you start the service from here Start parameters Dia 6 Now your computer can obtain an
100. View Log Details As illustrated above the Web Configurator screen is divided into these parts e A title bar e B navigation panel e C main window 2 4 1 Title Bar Click Logout at any time to exit the Web Configurator Click ZAbout to open the about window which provides information of the boot module and driver versions NWA1120 Series User s Guide Chapter 2 Introducing the Web Configurator 2 4 2 Navigation Panel Use the menu items on the navigation panel to open screens to configure NWA features The following tables describe each menu item Table 3 Navigation Panel Summary LINK TAB FUNCTION Dashboard This screen shows the NWA s general device and network status information Use this screen to access the statistics and client list Monitor Logs View Log Use this screen to view the logs for the categories that you selected Statistics Use this screen to view port status packet specific statistics the system up time and so on Association List Use this screen to view the wireless stations that are currently associated to the NWA Channel Usage Use this screen to know whether a channel is used by another wireless network or not Configuration Network Wireless LAN Wireless Use this screen to configure the wireless LAN settings and NWA s Settings operation mode Wireless Settings 2 4G Wireless Settings 5G SSID Use
101. WA1120 Series User s Guide Customer Support In the event of problems that cannot be solved by using this manual you should contact your vendor If you cannot contact your vendor then contact a ZyXEL office for the region in which you bought the device Regional websites are listed below see also http www zyxel com about zyxel zyxel worldwide shtml Please have the following information ready when you contact an office Required Information Product model and serial number e Warranty Information e Date that you received your device e Brief description of the problem and the steps you took to solve it Corporate Headquarters Worldwide Taiwan e ZyXEL Communications Corporation e http www zyxel com Asia China e ZyXEL Communications Shanghai Corp ZyXEL Communications Beijing Corp ZyXEL Communications Tianjin Corp e http www zyxel cn India e ZyXEL Technology India Pvt Ltd e http www zyxel in Kazakhstan e ZyXEL Kazakhstan e http www zyxel kz NWA1120 Series User s Guide Appendix F Customer Support Europe Korea e ZyXEL Korea Corp e http www zyxel kr Malaysia e ZyXEL Malaysia Sdn Bhd e http www zyxel com my Pakistan e ZyXEL Pakistan Pvt Ltd e http www zyxel com pk Philipines e ZyXEL Philippines e http www zyxel com ph Singapore e ZyXEL Singapore Pte Ltd e http www zyxel com sg Taiwan e ZyXEL Communications Corporation e http www z
102. Wireless Client SSID Security RADIUS MAC Filter Wireless Settings Basic Settings Wireless LAN Interface Y Enabled Operation Mode Client v SSID Profile Profile x Channel 6 vj Channel Width 20MHZ v Advanced Settings Output Power Full vi Preamble Type Dynamic Iv RTSICTS Threshold 2346 1 234 Extension Channel Protection Mode None v A MPDU Aggregation v Enabled Short GI v Enabled The following table describes the general wireless LAN labels in this screen Table 13 Wireless LAN Wireless Settings Wireless Client LABEL DESCRIPTION Basic Settings Wireless LAN Select the check box to turn on the wireless LAN on the NWA Interface Operation Mode Select Client in this field Site Survey Click this to view a list of available wireless access points within the range Select the AP you want to use Note After selecting Client as the Operation Mode in the Basic Settings section you must click Apply to be able to select from the AP list NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 13 Wireless LAN Wireless Settings Wireless Client continued LABEL DESCRIPTION SSID Profile The SSID Service Set IDentifier identifies the Service Set with which a wireless station is associated Wireless stations associating to the access point AP must have the same SSID In this fie
103. ZyXEL NWA1120 Series Wireless LAN Ceiling Mountable PoE Access Point Version 1 00 Edition 2 10 2013 Default Login Details LAN IP Address http 192 168 1 2 User Name admin Password 1234 Copyright 2013 ZyXEL Communications Corporation IMPORTANT READ CAREFULLY BEFORE USE KEEP THIS GUIDE FOR FUTURE REFERENCE This is a User s Guide for a series of products Not all products support all firmware features Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system Every effort has been made to ensure that the information in this manual is accurate Related Documentation e Quick Start Guide The Quick Start Guide shows how to connect the NWA and access the Web Configurator NWA1120 Series User s Guide Contents Overview Contents Overview Usora I ESI IT PATIO I E I 8 Iuyesepnwupu dpbqpeee cec 10 mirocucmo we Won ES TRUM AN s Gasp RE Rao ax eX DUO OR ad ax ao D UO RR o RR RR n RR SR D RR oss 18 Mule MENU E E E E T T T DN 24 TULOA 28 Technical HaTerBHCO a isa edat isis TA RA AH Fa pI0 I2 ERI FARM a ELO 2A ROI reer errr ters EA OX MP FLA PUn Oda 45 era Wece cre EP EE 47 Wireless EAN pc sess b bn E ERO and Die Cad ens pgs adu ca D ei ae edt a a eR D re aan ul 52 Eg
104. a of this device and all persons Industry Canada Statement This device complies with RSS 210 of the Industry Canada Rules Operation is subject to the following two conditions 1 this device may not cause interference and 2 this device must accept any interference including interference that may cause undesired operation of the device This device has been designed to operate with an antenna having a maximum gain of 3dBi Antenna having a higher gain is strictly prohibited per regulations of Industry Canada The required antenna impedance is 50 ohms To reduce potential radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication NWA1120 Series User s Guide Appendix G Legal Information IC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment End users must follow the specific operating instructions for satisfying RF exposure compliance gt HE KP EDRERE EHRE Ja em ME CES IDEE gt FERRET AT gt rx AARE BE aE Bs gt B TAR BSE EE ERE BEU
105. affic must first go through a router In Multi Tenant Unit MTU applications VLAN is vital in providing isolation and security among the subscribers When properly configured VLAN prevents one subscriber from accessing the network resources of another on the same LAN thus a user will not see the printers and hard disks of another user in the same building NWA1120 Series User s Guide Chapter 8 VLAN VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain In traditional switched environments all broadcast packets go to each and every individual port With VLAN all broadcasts are confined to a specific broadcast domain IEEE 802 1Q Tag The IEEE 802 1Q standard defines an explicit VLAN tag in the MAC header to identify the VLAN membership of a frame across bridges A VLAN tag includes the 12 bit VLAN ID and 3 bit user priority The VLAN ID associates a frame with a specific VLAN and provides the information that devices need to process the frame across the network 8 3 VLAN Screen Use this screen to set up the VLAN for managing the NWA Click Network VLAN to display the screen as shown Figure 44 Network gt VLAN VLAN Settings 802 10 VLAN Management VLAN Management VLAN ID Enabled Enabled 1 4094 The following table describes the labels in this screen Figure 45 Network VLAN LABEL DESCRIPTION
106. age types rather than IGMP message types MLDv1 is equivalent to IGMPv2 and MLDv2 is equivalent to IGMPv3 MLD allows an IPv6 switch or router to discover the presence of MLD listeners who wish to receive multicast packets and the IP addresses of multicast groups the hosts want to join on its network MLD snooping and MLD proxy are analogous to IGMP snooping and IGMP proxy in IPv4 MLD filtering controls which multicast groups a port can join MLD Messages A multicast router or switch periodically sends general queries to MLD hosts to update the multicast forwarding table When an MLD host wants to join a multicast group it sends an MLD Report message for that address An MLD Done message is equivalent to an IGMP Leave message When an MLD host wants to leave a multicast group it can send a Done message to the router or switch The router or switch then sends a group specific query to the port on which the Done message is received to determine if other devices connected to this port should remain in the group NWA1120 Series Users Guide 175 Appendix D IPv6 Example Enabling IPv6 on Windows XP 2003 Vista By default Windows XP and Windows 2003 support IPv6 This example shows you how to use the ipv6 install command on Windows XP 2003 to enable IPv6 This also displays how to use the ipconfig command to see auto generated IP addresses C N ipv6 install Installing Succeeded C gt ipconfig Windows IP Configuration
107. ail Log Category System Maintenance Click this to receive logs related to system maintenance System Error Click this to receive logs related to system errors 802 1x Click this to receive logs related to the 802 1x mode Wireless Click this to receive logs related to the wireless function Email Log Now Select the categories of alerts for which you want the NWA to immediately send e mail alerts Apply Click Apply to save your customized settings Cancel Click Cancel to begin configuring this screen afresh NWA1120 Series User s Guide Maintenance 11 1 Overview This chapter describes the maintenance screens It discusses how you can upload new firmware manage configuration and restart your NWA without turning it off and on This chapter provides information and instructions on how to identify and manage your NWA over the network Figure 58 NWA Setup NWA s In the figure above the NWA connects to a Domain Name Server DNS server to avail of a domain name It also connects to an Network Time Protocol NTP server to set the time on the device 11 2 What You Can Do in this Chapter e Use the General screen to specify the system name see Section 11 4 on page 112 e Use the Password screen to manage the password for your NWA see Section 11 5 on page 113 e Use the Time screen to change your NWA s time and date This screen allows you to configu
108. ally identifiable information without implicit consent Pop up Blocker Prevent most pop up windows from appearing _ Block pop ups 3 Click Apply to save this setting Enable Pop up Blockers with Exceptions Alternatively if you only want to allow pop up windows from your device see the following steps 1 In Internet Explorer select Tools Internet Options and then the Privacy tab NWA1120 Series User s Guide Appendix B Pop up Windows JavaScript and Java Permissions 2 Select Settings to open the Pop up Blocker Settings screen Figure 77 Internet Options Privacy Internet Options Ag General Security Privacy Content Connections Programs Advanced Settings Move the slider to select a privacy setting for the Internet RE zone Medium Blocks third party cookies that do not have a compact privacy policy Blocks third party cookies that use personally identifiable information without your implicit consent Restricts first party cookies that use personally identifiable information without implicit consent Pop up Blocker Prevent most pop up windows from appearing Block pop ups 3 Type the IP address of your device the web page that you do not want to have blocked with the prefix http For example http 192 168 167 1 NWA1120 Series User s Guide Appendix B Pop up Windows JavaScript and Java Permissions 4 Click Add to move
109. apupa ue roBa o6opyaBaHe e B CbOTBETCTBME CbC ceujecrBeHurTe N3NCKBAHNA N ApyrnTe npnnoxnmn pasnopea6ure Ha AnpektusBa 1999 5 EC Icelandic H r me l sir ZyXEL v yfir a essi b na ur er samr mi vid grunnkr fur og nnur vi eigandi kv i tilskipunar 1999 5 EC Norwegian Erkl rer herved ZyXEL at dette utstyret er I samsvar med de grunnleggende kravene og andre relevante bestemmelser I direktiv 1999 5 EF Romanian Prin prezenta ZyXEL declar c acest echipament este in conformitate cu cerin ele esen iale si alte prevederi relevante ale Directivei 1999 5 EC NWA1120 Series User s Guide Appendix G Legal Information National Restrictions This product may be used in all EU countries and other countries following the EU directive 1999 5 EC without any limitation except for the countries mentioned below Ce produit peut tre utilis dans tous les pays de l UE et dans tous les pays ayant transpos s la directive 1999 5 CE sans aucune limitation except pour les pays mentionn s ci dessous Questo prodotto utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesii menzionati di seguito Das Produkt kann in allen EU Staaten ohne Einschr nkungen eingesetzt werden sowie in anderen Staaten die der EU Direktive 1995 5 CE folgen mit AuBnahme der folgenden aufgef hrten Staaten In the majority of th
110. as two keys One key is public and can be made openly available The other key is private and must be kept secure These keys work like a handwritten signature in fact certificates are often referred to as digital signatures Only you can write your signature exactly as it should look When people know what your signature looks like they can verify whether something was signed by you or by someone else In the same way your private key writes your digital signature and your public key allows people to verify whether data was signed by you or by someone else This process works as follows 1 Tim wants to send a message to Jenny He needs her to be sure that it comes from him and that the message content has not been altered by anyone else along the way Tim generates a public key pair one public key and one private key 2 Tim keeps the private key and makes the public key openly available This means that anyone who receives a message seeming to come from Tim can read it and verify whether it is really from him or not 3 Tim uses his private key to sign the message and sends it to Jenny 4 Jenny receives the message and uses Tim s public key to verify it Jenny knows that the message is from Tim and that although other people may have been able to read the message no one can have altered it because they cannot re sign the message with Tim s private key 5 Additionally Jenny uses her own private key to sign a message and Tim uses
111. atc E eine ciae 88 f Wha Yot Can Doin ihis GE sasise BAIE be IA ERROR beREEL PR ELSE EE ERA EAM ES Ed 88 Ta anat rou Need TO EDON RM 88 Fk LAN IP I II E a IE 90 Chapter 8 pea AREN EE E A A ET E E A E MEE 92 CMRE aA E E NII E EN PEINE dud EATER ENOR AN AE EEN AINTE UH RE 92 8 1 1 What You Can Do in This Chaplor sg pude e o REHUU diane eisai eee 92 B 2 What You Need ta KOW aosdcettern ie iid e er t i rm Re RR Fb RO ka c d nen pe OR 92 SACR eric MSN T TU E RR RN NIURDETIISEIN NOSE 93 Chapter 9 DUE DID oae usce e pu cur bin A T uius B odia qua uo im E gn p lac A REC RM lu E MM IMMER NM DS DrACdEME 94 EP ME OURAN e T TET 94 9 2 What Yos Can Do in this Chapel sass oom t daa Tite e RR EU Eee ad GRE PRAR EVER Fat d a a Daa Leen pi En 94 9 3 What You Need TO Rm EE 95 Sg MN SEICE uou tede pet EAE 97 DO OHNE S DIG sk fe rca asl Mou tabu A EDI N AEN Veena UE DR AN cen TLJBIU C MERCI FERA ERAN Ktas d K ERAT G ELI 98 Oo MOUNT GIN e T EE 99 SE SNMP SEGET chr elvat S e ir c bea wot e ase ce S COR C eset 101 DO FIP OCIS wh cutdiqct telenovela telum san pp vata nisu et be MEE 103 29 Technical PRICING sous ec iekri lie HE sdupUs axes ICE adii E d Mar E COE M beli Sd ER Masc on PI boI Ie ERO QIA BE BEd 2 miU ERA 104 CECI E TNI T RI INTE TRE IOIO AT A A E O UIN dias amen UNS EAN E RENTRER 104 90 2 muIpored MIB ado e Eie M E ere I MN M MM EIU ENIM DM 105 9 3 Private Publie CBrific Bes 4 5 x oe e s d a d dnd eda bea RR e a ER 1
112. ategory SB Control Panel Adjust your computer s settings System and Security Review your computer s status Back up your computer Find and fix problems Ne k and x View network status and task cose homegroup and sharing options jd t i Hardware and Sound View devices and printers Programs Uninstall a program View by Category Y User Accounts and Family Safety 9 Add or remove user accounts Set up parental controls for any user Appearance and Personalization Change the theme Change desktop background Adjust screen resolution ay Clock Language and Region Change keyboards or other input methods Change display language MR Ease of Access Let Windows suggest settings Optimize visual display Add a device 3 Click Change adapter settings Manage wireless networks a A Change adapter settings siete Change advanced sharing This computer settings View your active networks ZyXEL com Work network ET ET GO E gt Control Panel Network and Internet Network and Sharing Center v p Search Control Panel Home A 2 A View your basic network information and set up connections See full map ZyXEL com Internet Connect or disconnect Access type Internet Connections g Local Area Connection NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 4 Double cl
113. automatically generates a link local address beginning with fe80 When the interface is connected to a network with a router and the NWA is set to automatically obtain an IPv6 network prefix from the router for the interface it generates another address which 172 NWA1120 Series User s Guide Appendix D IPv6 combines its interface ID and global and subnet information advertised from the router This is a routable global IP address DHCPv6 The Dynamic Host Configuration Protocol for IPv6 DHCPv6 RFC 3315 is a server client protocol that allows a DHCP server to assign and pass IPv6 network addresses prefixes and other configuration information to DHCP clients DHCPv6 servers and clients exchange DHCP messages using UDP Each DHCP client and server has a unique DHCP Unique IDentifier DUID which is used for identification when they are exchanging DHCPv6 messages The DUID is generated from the MAC address time vendor assigned ID and or the vendor s private enterprise number registered with the IANA It should not change over time even after you reboot the device Identity Association An Identity Association IA is a collection of addresses assigned to a DHCP client through which the server and client can manage a set of related IP addresses Each IA must be associated with exactly one interface The DHCP client uses the IA assigned to an interface to obtain configuration from a DHCP server for that interface Each IA c
114. background information about the topics covered in this chapter 9 9 1 MIB Managed devices in an SMNP managed network contain object variables or managed objects that define each piece of information to be collected about a device Examples of variables include such NWA1120 Series User s Guide Chapter 9 System as number of packets received node port status etc A Management Information Base MIB is a collection of managed objects SNMP itself is a simple request response protocol based on the manager agent model The manager issues a request and the agent returns responses using the following protocol operations e Get Allows the manager to retrieve an object variable from the agent e GetNext Allows the manager to retrieve the next object variable from a table or list within an agent In SNMPvi when a manager wants to retrieve all elements of a table from an agent it initiates a Get operation followed by a series of GetNext operations e Set Allows the manager to set values for object variables within an agent e Trap Used by the agent to inform the manager of some events 9 9 2 Supported MIBs The NWA supports MIB II that is defined in RFC 1213 and RFC 1215 as well as the proprietary ZyXEL private MIB The purpose of the MIBs is to let administrators collect statistical data and monitor status and performance 9 9 3 Private Public Certificates When using public key cryptology for authentication each host h
115. bled check box if you do not want the NWA to use the data rate Turn on the Auto option to have the NWA set the data rates automatically to optimize the throughput Note You can set the NWA to use up to four MCS rates at a time Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh NWA1120 Series User s Guide Chapter 6 Wireless LAN 6 5 SSID Screen Use this screen to view and modify the settings of the SSID profiles on the NWA Click Wireless LAN gt SSID to display the screen as shown Figure 26 Wireless LAN SSID SSID Security RADIUS MAC Filter Wireless Settings Profile Settings Profi Profi Profi Profi Profi Profi Profi Profi on c uU F amp F t DY Profile Name e1 e2 e3 e4 e5 e6 e7 e8 SSID Security RADIUS QoS MAC Filter Modify ZyXEL NWA Disabled RadProfile1 None Disabled a ZyXEL SecProfile2 RadProfile1 None Disabled a ZyXEL Disabled RadProfile1 None Disabled 3 ZyXEL Disabled RadProfile1 None Disabled 4 ZyXEL Disabled RadProfile1 None Disabled g ZyXEL Disabled RadProfile1 None Disabled 4 ZyXEL Disabled RadProfile1 None Disabled 4 ZyXEL Disabled RadProfile1 None Disabled a The following table describes the labels in this screen Table 15 Wireless LAN gt SSID LABEL DESCRIPTION Profile Settings This field displays the index number of each SSID profile Profile Name This fi
116. cannot communicate with each other Figure 92 Basic Service Set r 1 1 1 SY i D BSS 1 i N H N 1 L 7 1 A Z 4 s s e v Lu P Pd Mi E oe a see SS e eee ESS An Extended Service Set ESS consists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution System DS This type of wireless LAN topology is called an Infrastructure WLAN The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate neighborhood NWA1120 Series User s Guide Appendix E Wireless LANs An ESSID ESS IDentification uniquely identifies each ESS All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate Figure 93 Infrastructure WLAN Ethernet Channel A channel is the radio frequency ies used by wireless devices to transmit and receive data Channels available depend on your geographical area You may have a choice of channels for your region so you should use a channel different from an adjacent AP access point to reduce interference Interference occurs when radio signals from different access points overlap causing interference and degrading performance Adjacent channels partially overlap however To a
117. d very secure since you can freely distribute public keys and you never need to transmit private keys 9 4 WWW Screen Use this screen to configure your NWA via the World Wide Web WWW using a Web browser This lets you specify which IP addresses or computers are able to communicate with and access the NWA NWA1120 Series User s Guide Chapter 9 System To change your NWA s WWW settings click System WWW The following screen shows Figure 49 System WWW WWW Certificates Telnet SNMP WWW HTTP Port 80 HTTPS Port 443 Server Access Disable v Secured Client IP Address 9 Al Selected 0 0 0 0 Secured Client MAC Address 9 All Selected 00 00 00 00 00 00 The following table describes the labels in this screen Table 28 System gt WWW Server Access LABEL DESCRIPTION WWW HTTP Port You may change the server port number for a service if needed however you must use the same port number in order to use that service for remote management HTTPS Port The HTTPS proxy server listens on port 443 by default If you change the HTTPS proxy server port to a different number on the NWA for example 8443 then you must notify people who need to access the NWA web configurator to use https NWA IP Address 8443 as the URL Select the interface s through which a computer may access the NWA using WWW and to which the IP and MAC filtering rules you specified below are applied Otherwise
118. d write rights meaning that the user can create and edit the MIBs on the NWA Read Only The SNMP administrator has read rights only meaning the user can collect information from the NWA Authentication Protocol Select an authentication algorithm used for SNMP communication with the SNMP administrator MD5 Message Digest 5 and SHA Secure Hash Algorithm are hash algorithms used to authenticate SNMP data SHA authentication is generally considered stronger than MD5 but is slower NWA1120 Series User s Guide Chapter 9 System Table 31 System SNMP continued LABEL DESCRIPTION Privacy Protocol Specify the encryption method used for SNMP communication with the SNMP administrator DES Data Encryption Standard is a widely used but breakable method of data encryption It applies a 56 bit key to each 64 bit block of data AES Advanced Encryption Standard is another method for data encryption that also uses a secret key AES applies a 128 bit key to 128 bit blocks of data SNMPv3 User Settings SNMPv3 User Select the check box to enable the SNMP user account for authentication with SNMP managers using SNMP v3 User Name Specify the user name of the SNMP user account Password Enter the password for SNMP user authentication Confirm Password Access Type Retype the password for confirmation Specify the SNMP user s access rights to MIBs Read Only
119. ddress Binary 11000000 10101000 00000001 00000010 Subnet Mask Binary 11111111 11111111 11111111 00000000 Network Number 11000000 10101000 00000001 Host ID 00000010 By convention subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask followed by a continuous sequence of zeros for a total number of 32 bits NWA1120 Series User s Guide Appendix C IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part the bits with a 1 value For example an 8 bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes Subnet masks are expressed in dotted decimal notation just like IP addresses The following examples show the binary and decimal notation for 8 bit 16 bit 24 bit and 29 bit subnet masks Table 40 Subnet Masks BINARY 1ST 2ND 3RD am oar IDECIMAE OCTET OCTET OCTET 8 bit mask 11111111 00000000 00000000 00000000 255 0 0 0 16 bit mask 11111111 11111111 00000000 00000000 255 255 0 0 24 bit mask 11111111 11111111 11111111 00000000 255 255 255 0 29 bit mask 11111111 11111111 11111111 11111000 255 255 255 248 Network Size Notation The size of the network number determines the maximum number of possible hosts you can have on your network The larger the number of network number bits the smaller the number of remaining host ID bits An
120. decimal notation Therefore each octet has a possible range of 00000000 to 11111111 in binary or O to 255 in decimal NWA1120 Series User s Guide Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets 192 168 1 are the network number and the fourth octet 16 is the host ID Figure 88 Network Number and Host ID 192 168 1 16 nemen e L4 i 4 hr iN ue E C e AN D jac B I E M i NE 1 P T B E 1 4 i 1 P a mn m m m m m m m mm V How much of the IP address is the network number and how much is the host ID varies according to the subnet mask Subnet Masks A subnet mask is used to determine which bits are part of the network number and which bits are part of the host ID using a logical AND operation The term subnet is short for sub network A subnet mask has 32 bits If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network number If a bit in the subnet mask is 0 then the corresponding bit in the IP address is part of the host ID The following example shows a subnet mask identifying the network number in bold text and host ID of an IP address 192 168 1 2 in decimal Table 39 Subnet Masks 2ND 3RD 1ST OCTET 72 on 4TH OCTET 192 168 1 2 IP A
121. dress IPv6 Address Assignment Enable Stateful Address Auto configuration Oo IPv6 Address Prefix Length System DNS Servers Primary DNS Server Secondary DNS Server 192 168 1 2 255 255 255 0 The following table describes the labels in this screen Table 27 LAN IP LABEL DESCRIPTION IPv4 Address Assignment Obtain IP Address Automatically Select this option if your NWA is using a dynamically assigned IPv4 address from a DHCP server each time Note You must know the IP address assigned to the NWA by the DHCP server to access the NWA again Use Fixed IP Address Select this option if your NWA is using a static IPv4 address When you select this option fill in the fields below IP Address Subnet Mask Enter the IP address of your NWA in dotted decimal notation Note If you change the NWA s IP address you must use the new IP address if you want to access the web configurator again Type the subnet mask Gateway IP Address Type the IPv4 address of the gateway The gateway is an immediate neighbor of your NWA that will forward the packet to the destination On the LAN the gateway must be a router on the same segment as your NWA over the WAN the gateway must be the IP address of one of the remote nodes NWA1120 Series User s Guide Chapter 7 LAN Table 27 LAN IP continued LABEL DESCRIPTION IPv6 Address A
122. e NWA1120 Series User s Guide Chapter 2 Introducing the Web Configurator Table 3 Navigation Panel Summary LINK TAB FUNCTION Configuration File Use this screen to backup and restore your device s configuration settings or reset the factory default settings Restart Use this screen to reboot the NWA without turning the power off 2 4 3 Main Window The main window displays information and configuration fields It is discussed in the rest of this document NWA1120 Series User s Guide Dashboard The Dashboard screens display when you log into the NWA or click Dashboard in the navigation menu Use the Dashboard screen to look at the current status of the device system resources and interfaces The Dashboard screens also provide detailed information about system statistics associated wireless clients and logs 3 1 The Dashboard Screen Use this screen to get a quick view of system Ethernet WLAN and other information regarding your NWA NWA1120 Series User s Guide Chapter 3 Dashboard Click Dashboard The following screen displays Figure 11 The Dashboard Screen NWA1121 NI DASHBOARD CS Refresh Interval 4 System Information System Status System Name NWA1121 NI System Up Time 23 57 34 Up 23 57 WLAN Operating Mode Root AP Current Date Time 1970 01 01 23 57 36 Firmware Version 1 00 AABJ 0 System Resource
123. e None ha A MPDU Aggregation Enabled Short GI v Enabled MCS Rate Auto 0 1 2 3 4 5 6 y 8 9 10 41 42 157543 1 4471745 Enabled v CD ma NWA1120 Series User s Guide Chapter 4 Tutorial 4 2 2 Configure the Standard Network 1 Click Wireless LAN SSID Click the Edit icon next to SSI DO1 oOo fF WN on oO Profile Settings Profile Name SSID01 VoIP SSID Guest SSID Profile4 Profiles Profile6 Profile7 Profiles SSID SSIDO01 VoIP SSID Guest SSID ZyXEL ZyXEL ZyXEL ZyXEL ZyXEL Security RADIUS QoS Disabled RadProfile1 WMM Disabled RadProfile1 WMM Disabled RadProfile1 WMM Disabled RadProfile1 WMM Disabled RadProfile1 WMM Disabled RadProfile1 WMM Disabled RadProfile1 WMM Disabled RadProfile1 WMM MAC Filter Modify Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Sy Cy Uy Uy Uy Sy Sy Select SecProfilel as SSI DO1 s security profile Select the Hidden SSID checkbox as you want only authorized company employees to use this network so there is no need to broadcast the SSID to wireless clients scanning the area Also the clients on SSIDO1 might need to access other clients on the same wireless network Do not select the Intra BSS Traffic blocking check box Click Apply Profile Name SSID RADIUS MAC Filtering Qos idden SSID Profile Settings BSSID VLAN ID ntra BSS Traffic B
124. e 2 4 GHz band and is fully compatible with the IEEE 802 11b standard This means an IEEE 802 11b adapter can interface directly with an IEEE 802 11g access point and vice versa at 11 Mbps or lower depending on range IEEE 802 11g has several intermediate rate steps between the maximum and minimum data rates 54 Mbps and 1 Mbps respectively IEEE 802 11a has a data rate of up to 54 Mbps using the 5 GHz band IEEE 802 11a is not interoperable with IEEE 802 11b or IEEE 802 11g IEEE 802 11n can operate both in the 2 4 GHz and 5 GHz bands and is backward compatible with the IEEE 802 11a IEEE 802 11b and IEEE 802 11g standards It improves network throughput and increases the maximum raw data rate from 54 Mbps to 300 Mbps by using multiple input multiple output MIMO a channel width of 40 MHz frame aggregation and short guard interval Table 55 Wireless LAN Standards Comparison Table WIRELESS LAN MAXIMUM NET FREQUENCY STANDARD DATA RATE BAND COMPATIBILITY IEEE 802 11g IEEE 802 11b 11 Mbps 2 4 GHz IEEE 802 11n IEEE 802 11b IEEE 802 11g 54 Mbps 2 4 GHz IEEE 802 11n NWA1120 Series User s Guide Appendix E Wireless LANs Table 55 Wireless LAN Standards Comparison Table WIRELESS LAN MAXIMUM NET FREQUENCY STANDARD DATA RATE BAND COMPATIBILITY IEEE 802 11a 54 Mbps 5 GHz IEEE 802 11n IEEE 802 11b IEEE 802 11n 300 Mbps 2 4 GHz 5 GHz IEEE 802 11g IEEE 802 11a Wireless Security Ove
125. e DNS server if that information was provided Click OK to close the Internet Protocol TCP I P Properties window Click OK to close the Local Area Connection Properties window Verifying Settings 1 2 Click Start gt All Programs gt Accessories gt Command Prompt In the Command Prompt window type ipconfig and then press ENTER You can also go to Start gt Control Panel gt Network Connections right click a network connection click Status and then click the Support tab to view your IP address and connection information NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address Windows Vista 1 2 This section shows screens from Windows Vista Professional Click Start Control Panel Be RES Y Dr eye 7 0 Professional Connect To eval Media Player Classic d Control Panel Default Programs gt AllPrograms o v j WM Nol GOo Control Panel bal neal 2 File Edit View Tools Help Back up your computer Appearance and Personalization Change desktop background Change the color scheme Adjust screen resolution Control Panel Home z t System and Maintenance User Accounts Classic View e Wi C E i Get started with Windows Change account type Security Ay Check for updates Allow a program through Windows Firewall etwork and Internet A Connect to the Internet Clock Language and Region View ne
126. e EU and other European countries the 2 4 and 5 GHz bands have been made available for the use of wireless local area networks LANs Later in this document you will find an overview of countries inwhich additional restrictions or requirements or both are applicable The requirements for any country may evolve ZyXEL recommends that you check with the local authorities for the latest status of their national regulations for both the 2 4 and 5 GHz wireless LANs The following countries have restrictions and or requirements in addition to those given in the table labeled Overview of Regulatory Requirements for Wireless LANs Overview of Regulatory Requirements for Wireless LANs Frequency Band MHz Max Power Level Indoor ONLY Indoor and Outdoor EIRP mW 2400 2483 5 100 V 5150 5350 200 V 5470 5725 1000 V Belgium The Belgian Institute for Postal Services and Telecommunications BIPT must be notified of any outdoor wireless link having a range exceeding 300 meters Please check http www bipt be for more details Draadloze verbindingen voor buitengebruik en met een reikwijdte van meer dan 300 meter dienen aangemeld te worden bij het Belgisch Instituut voor postdiensten en telecommunicatie BIPT Zie http www bipt be voor meer gegevens Les liaisons sans fil pour une utilisation en ext rieur d une distance sup rieure 300 m tres doivent tre notifi es l Institut Belge des services Postaux et
127. e with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this device does cause harmful interference to radio television reception which can be determined by turning the device off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between the equipment and the receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio TV technician for help FCC Caution Any changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate this equipment FCC Radiation Exposure Statement e This transmitter must not be co located or operating in conjunction with any other antenna or transmitter e For operation within 5 15 5 25GHz frequency range it is restricted to indoor environment IEEE 802 11b 802 11g or 802 11n 20MHz operation of this product in the U S A is firmware limited to channels 1 through 11 IEEE 802 11n 40MHz operation of this product in the U S A is firmware limited to channels 3 through 9 To comply with FCC RF exposure compliance requirements a separation distance of at least 20 cm must be maintained between the antenn
128. ed in EIRP The EIRP level in dBm of a device can be calculated by adding the gain of the antenna used specified in dBi to the output power available at the connector specified in dBm NWA1120 Series User s Guide Appendix G Legal Information List of national codes COUNTRY ISO 3166 2 LETTER CODE COUNTRY ISO 3166 2 LETTER CODE Austria AT Malta MT Belgium BE Netherlands NL Cyprus CY Poland PL Czech Republic CR Portugal PT Denmark DK Slovakia SK Estonia EE Slovenia SI Finland FI Spain ES France FR Sweden SE Germany DE United Kingdom GB Greece GR Iceland IS Hungary HU Liechtenstein LI Ireland IE Norway NO Italy IT Switzerland CH Latvia LV Bulgaria BG Lithuania ET Romania RO Luxembourg LU Turkey TR Safety Warnings e Do NOT use this product near water for example in a wet basement or near a swimming pool e Do NOT expose your device to dampness dust or corrosive liquids e Do NOT store things on the device e Do NOT install use or service this device during a thunderstorm There is a remote risk of electric shock from lightning e Connect ONLY suitable accessories to the device Do NOT open the device or unit Opening or removing covers can expose you to dangerous high voltage points or other risks ONLY qualified service personnel should service or disassemble this device Please contact your vendor for further information Make sure to connect the cables
129. eld displays the identification name of each SSID profile on the NWA SSID This field displays the SSID Service Set IDentifier that is the name of the wireless network to which a wireless client can connect When a wireless client scans for an AP to associate with this is the name that is broadcast and seen in the wireless client utility Security This field indicates which security profile is currently associated with each SSID profile See Section 6 6 on page 73 for more information RADIUS This field displays which RADIUS profile is currently associated with each SSID profile if you have a RADIUS server configured Qos This field displays the Quality of Service setting for this profile or NONE if QoS is not configured on a profile MAC Filter This field displays which MAC filter profile is currently associated with each SSID profile or Disable if MAC filtering is not configured on an SSID profile Modify Click Edit to go to the SSID configuration screen where you can modify settings in an SSID profile NWA1120 Series User s Guide 71 Chapter 6 Wireless LAN 6 5 1 Configuring SSID Use this screen to configure an SSID profile In the Wireless LAN SSID screen click Edit next to the SSID profile you want to configure to display the following screen Figure 27 SSID Edit SSID Profile Settings Profile Name Profile1 SSID ZyXEL Security Disabled iv RADIUS RadProfile x MAC Fil
130. elete and import certificates seen Section 9 5 on page 98 e Use the Telnet screen to configure through which interface s and from which IP address es you can use Telnet to manage the NWA A Telnet connection is prioritized by the NWA over other remote management sessions see Section 9 6 on page 99 NWA1120 Series User s Guide Chapter 9 System Use the SNMP screen to configure through which interface s and from which IP address es a network systems manager can access the NWA see Section 9 7 on page 101 e Use the FTP screen to configure through which interface s and from which IP address es you can use File Transfer Protocol FTP to manage the NWA You can use FTP to upload the latest firmware for example see Section 9 8 on page 103 9 3 What You Need To Know WWW The World Wide Web allows you to access files hosted in a remote server For example you can view text files usually referred to as pages using your web browser via HyperText Transfer Protocol HTTP Telnet Telnet is short for Telecommunications Network which is a client side protocol that enables you to access a device over the network FTP File Transfer Protocol FTP allows you to upload or download a file or several files to and from a remote location using a client or the command console SNMP Simple Network Management Protocol SNMP is a member of the TCP IP protocol suite used for exchanging management information between net
131. en to display all logs or logs for a certain category NWA1120 Series User s Guide 107 Chapter 10 Log Settings 10 3 What You Need To Know Alerts and Logs An alert is a type of log that warrants more serious attention Some categories such as System Error consist of both logs and alerts You can differentiate them by their color in the Monitor gt Logs screen Alerts are displayed in red and logs are displayed in black Receiving Logs via E mail If you want to receive logs in your e mail account you need to have the necessary details ready such as the Server Name or Simple Mail Transfer Protocol SMTP Address of your e mail account Ensure that you have a valid e mail address Enabling Syslog Logging To enable Syslog Logging obtain your Syslog server s IP address or server name 10 4 Log Settings Screen Use this screen to configure to where and when the NWA is to send the logs and which logs and or immediate alerts it is to send NWA1120 Series User s Guide Chapter 10 Log Settings To change your NWA s log settings click Configuration Log Settings The screen appears as shown Figure 57 Log Settings Log Settings E mail Log Settings Mail Server Outgoing SMTP Server NAME or IP Address Mail Subject Send Log to E Mail Address SMTP Authentication C Enabled User Name l i Password P Syslog Logging Syslog Logging C Enabled Syslog Ser
132. ength Security ZyXEL NAS Aslan 6 00 02 CF 9C 63 F0 802 11b g alil 73 WPA2 PSK ZyXEL_MIS_WPA 6 06 19 CB 8A 34 D0 802 11b g al 22 WPA2 HClLab 9 00 17 94 50 24 9F 802 11b g alll 77 WPA2 PSK ZyXEL 4CWHW7 6 00 13 49 FA 54 B4 802 11b g all 46 WPA2 PSK ZyXEL_MT01991 6 C8 6C 87 80 D2 6C 802 11b g a 26 WPA2 PSK kkap 6 04 46 65 74 C8 F9 802 11b g 1 19 WPA2 PSK SecureWirelessNetwork 6 00 19 CB 00 00 00 802 11b g 0 16 WPA2 PSK 6 68 92 34 09 9E C1 802 11b g Bi 9 WPA PSK 5200 TUN24G IN PSK 6 22 44 03 05 82 3B 802 11b g 0 16 WPA2 PSK 5200 TUN24G OUT WPA2 6 02 44 03 05 82 3B 802 11b g 0 16 WPA2 5200 TUN24G IN WPA2 6 40 44 03 05 82 3B 802 11b g Wil 16 WPA2 TN private H77E9W 7 00 13 49 12 84 60 802 11b g al 4 WPA PSK ZyXEL_MIS_WPA 11 40 44 03 69 D9 F5 802 1 1b g all 43 WPA2 ZyXEL_MIS_WPA 1 50 67 F0 37 A0 25 802 11b g atilllazs WPA2 ZyXEL GUEST 36 62 67 F0 37 A0 26 802 11a 0 5 WEP The following table describes the labels in this screen Table 9 Channel Usage LABEL DESCRIPTION SSID This is the Service Set IDentification SSID name of the AP in an Infrastructure wireless network or wireless station in an Ad Hoc wireless network For our purposes we define an Infrastructure network as a wireless network that uses an AP and an Ad Hoc network also known as Independent Basic Service Set IBSS as one that doesn t See the chapter on wireless configuration for more information on basic service sets BSS and ex
133. ens for other Internet Explorer versions may vary Internet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blocking and create an exception for your device s IP address Disable Pop up Blockers 1 In Internet Explorer select Tools Pop up Blocker and then select Turn Off Pop up Blocker Figure 75 Pop up Blocker Mail and News Pop up Blocker Manage Add ons Synchronize Windows Update Windows Messenger Internet Options You can also check if pop up blocking is disabled in the Pop up Blocker section in the Privacy tab 1 In Internet Explorer select Tools Internet Options Privacy NWA1120 Series User s Guide 151 Appendix B Pop up Windows JavaScript and Java Permissions 2 Clear the Block pop ups check box in the Pop up Blocker section of the screen This disables any web pop up blockers you may have enabled Figure 76 Internet Options Privacy Internet Options General Security Privacy Content Connections Programs Advanced Settings 1 Move the slider to select a privacy setting for the Internet RE zone Medium Blocks third party cookies that do not have a compact privacy policy Blocks third party cookies that use personally identifiable LJ information without your implicit consent Restricts first party cookies that use person
134. er Hardware Connections and LEDs The NWA does not turn on None of the LEDs turn on 1 Make sure you are using the power adaptor or cord included with the NWA 2 Make sure the power adaptor or cord is connected to the NWA and plugged in to an appropriate power source Make sure the power source is turned on 3 Disconnect and re connect the power adaptor or cord to the NWA 4 If the problem continues contact the vendor One of the LEDs does not behave as expected 1 Make sure you understand the normal behavior of the LED See Section 1 7 on page 17 2 Check the hardware connections See the Quick Start Guide 3 Inspect your cables for damage Contact the vendor to replace any damaged cables 4 Disconnect and re connect the power adaptor to the NWA 5 Ifthe problem continues contact the vendor NWA1120 Series User s Guide Chapter 12 Troubleshooting 12 2 NWA Access and Login I forgot the IP address for the NWA 1 The default IP address is 192 168 1 2 2 If the NWA is working as a DHCP client and receives an IP address from a DHCP server check the DHCP server for the NWA s IP address 3 If you configured a static IP address and have forgotten it you have to reset the device to its factory defaults See Section 2 3 on page 20 I forgot the password 1 The default password is 1234 2 Ifthis does not work you have to reset the device to its factory defaults See Section 2 3 on page
135. er Certification Au RSA 1000 Bits hal 4463 C531 D 7CC C100 6794 612B B656 D3BF 8257 846F 4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields The secure method may vary according to your situation Possible examples would be over the telephone or through an HTTPS connection 106 NWA1120 Series User s Guide Log Settings 10 1 Overview This chapter provides information on viewing and generating logs on your NWA Logs are files that contain recorded network activity over a set period They are used by administrators to monitor the health of the system s they are managing Logs enable administrators to effectively monitor events errors progress etc so that when network problems or system failures occur the cause or origin can be traced Logs are also essential for auditing and keeping track of changes made by users Figure 56 Accessing Logs in the Network The figure above illustrates three ways to access logs The user U can access logs directly from the NWA A via the Web configurator Logs can also be located in an external log server B An email server C can also send harvested logs to the user s email account 10 2 What You Can Do in this Chapter Use the Log Settings screen to configure where and when the NWA will send the logs and which logs it will send Section 10 4 on page 108 Use the Monitor Logs scre
136. er and the NWA The key must be the same on the external accounting and your NWA The key is not sent over the network Back Click Back to return to the previous screen Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh 6 8 Layer 2 Isolation Layer 2 isolation is used to prevent wireless clients associated with your NWA from communicating with other wireless clients APs computers or routers in a network In the following example layer 2 isolation is enabled on the NWA to allow a guest wireless client A to access the main network router B The router provides access to the Internet and the network printer C while preventing the client from accessing other computers and servers on the NWA1120 Series User s Guide Chapter 6 Wireless LAN network The client can communicate with other wireless clients only if Intra BSS Traffic blocking is disabled Note I ntra BSS Traffic Blocking is activated when you enable layer 2 isolation Figure 36 Layer 2 Isolation Application NWA MAC addresses that are not listed in the layer 2 isolation table are blocked from communicating with the NWA s wireless clients except for broadcast packets Layer 2 isolation does not check the traffic between wireless clients that are associated with the same AP Intra BSS Traffic allows wireless clients associated with the same AP to communicate with each other 6 8 1 Layer 2 Isolation Screen
137. ertificate owner EAP MD5 Message Digest Algorithm 5 MD5 authentication is the simplest one way authentication method The authentication server sends a challenge to the wireless client The wireless client proves that it knows the password by encrypting the password with the challenge and sends back the information Password is not sent in plain text However MD5 authentication has some weaknesses Since the authentication server needs to get the plaintext passwords the passwords must be stored Thus someone other than the authentication server may access the password file In addition it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication Finally MD5 authentication method does not support data encryption with dynamic session key You must configure WEP encryption keys for data encryption EAP TLS Transport Layer Security With EAP TLS digital certifications are needed by both the server and the wireless clients for mutual authentication The server presents a certificate to the client After validating the identity of the server the client sends a different certificate to the server The exchange of certificates is done in the open before a secured tunnel is created This makes user identity vulnerable to passive attacks A digital certificate is an electronic ID card that authenticates the sender s identity However to implement EAP TLS you need a Certificate
138. ess fe80 25d8 dcab c80a 5189 11 IPv4 Address s 172 16 100 61 Subnet Mask e s 0 we wx t 255 255 255 410 Default Gateway e80 213 49 feaa 7125 11 172 16 100 254 178 NWA1120 Series Users Guide Wireless LANs Wireless LAN Topologies This section discusses ad hoc and infrastructure wireless LAN topologies Ad hoc Wireless LAN Configuration The simplest WLAN configuration is an independent Ad hoc WLAN that connects a set of computers with wireless adapters A B C Any time two or more wireless adapters are within range of each other they can set up an independent network which is commonly referred to as an ad hoc network or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an ad hoc wireless LAN Figure 91 Peer to Peer Communication in an Ad hoc Network BSS A Basic Service Set BSS exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point AP Intra BSS traffic is traffic between wireless clients in the BSS When Intra BSS is enabled wireless client A and B can access the wired network and communicate with each other When Intra BSS is NWA1120 Series User s Guide 179 Appendix E Wireless LANs disabled wireless client A and B can still access the wired network but
139. ess Settings Screen Use this screen to choose the operating mode for your NWA Click Network gt Wireless LAN gt Wireless Settings Network gt Wireless LAN gt Wireless Settings 2 4G or Network gt Wireless LAN gt Wireless Settings 5G The screen varies depending upon the operating mode you select NWA1120 Series User s Guide Chapter 6 Wireless LAN 6 4 1 Root AP Mode Use this screen to use your NWA as an access point Select Root AP as the Operation Mode The following screen displays Figure 22 Wireless LAN Wireless Settings Root AP Wireless Settings Basic Settings Wireless LAN Interface Operation Mode Wireless Mode Channel Channel Width Select SSID Profile Active 1 3 Repeater Settings Local MAC Address Repeater SSID Profile Advanced Settings Beacon Interval DTIM Interval Output Power Preamble Type RTS CTS Threshold Extension Channel Protection Mode A MPDU Aggregation Short GI MCS Rate Auto 0 Enabled Active Profiet v 2 n Profile2 v 4 oO 100 25 1000 ms n es Dynamic v 23345 ct 2348 v Enabled v Enabled 2 i 37 4 1 5 316 8 Profile Profile x Profilet v MOR ODT AZ re tara 5 NWA1120 Series User s Guide Chapter 6 Wireless LAN The following table describes the general wireless LAN labels in this screen Table 11 Wireless LAN gt Wireless Settin
140. ettings NWA1120 Series User s Guide Chapter 5 Monitor Click Monitor gt Association List to display the screen as shown next Figure 17 Association List Association List View Association List MAC Address SSID Association Time Signal Strength 1 00 19 cb 32 be ac ZyXEL 1970 01 01 00 17 51 ail oos The following table describes the labels in this screen Table8 Association List LABEL DESCRIPTION This is the index number of an associated wireless device MAC Address This field displays the MAC address of an associated wireless device SSID This field displays the SSID to which the wireless device is associated Association Time This field displays the time a wireless device first associated with the NWA s wireless network Signal Strength This field displays the RSSI Received Signal Strength Indicator of the wireless connection Refresh Click Refresh to reload the list 5 6 Channel Usage Use this screen to know whether a channel is used by another wireless network or not If a channel is being used you should select a channel removed from it by five channels to completely avoid overlap Click Monitor gt Channel Usage to display the screen shown next EB NWA1120 Series User s Guide Chapter 5 Monitor Wait a moment while the NWA compiles the information Figure 18 Channel Usage Channel Usage Site Survey SSID Channel MAC Address Wireless Mode Signal Str
141. fault settings If you backed up an earlier configuration file you would not have to totally re configure the NWA You could simply restore your last configuration 1 6 Hardware Connections See your Quick Start Guide for information on making hardware connections 1 7 LED Figure 6 LED Table2 LED COLOR STATUS DESCRIPTION Amber On There is system error and the NWA cannot boot up or the NWA doesn t have an Ethernet connection with the LAN Flashing The NWA is starting up Off The NWA is receiving power and ready for use Green On The WLAN is active Blinking The WLAN is active and transmitting or receiving data Off The WLAN is not active NWA1120 Series User s Guide Introducing the Web Configurator This chapter describes how to access the NWA s web configurator and provides an overview of its screens 2 1 Overview The NWA Web Configurator allows easy management using an Internet browser In order to use the Web Configurator you must Use Internet Explorer 7 0 and later versions Mozilla Firefox 9 0 and later versions Safari 4 0 and later versions or Google Chrome 10 0 and later versions e Allow pop up windows e Enable JavaScript enabled by default e Enable Java permissions enabled by default e Enable cookies The recommended screen resolution is 1024 x 768 pixels and higher 2 2 Accessing the Web Configurator 1 Make sure your hardware is properly connected and
142. figuring an external RADI US server see Section 6 7 on page 79 e Configuring MAC Filtering see Section 6 9 on page 83 4 2 How to Configure Multiple Wireless Networks In this example you have been using your NWA as an access point for your office network Now your network is expanding and you want to make use of the MBSSID feature see Section 6 4 4 on NWA1120 Series User s Guide Chapter 4 Tutorial page 68 to provide multiple wireless networks Each wireless network will cater to a different type of user You want to make three wireless networks one standard office wireless network with all the same settings you already have another wireless network with high priority QoS settings for Voice over IP VoIP users and a guest network that allows visitors to access only the Internet and the network printer To do this you will take the following steps 1 Edit the SSID profiles 2 Change the operating mode from Root AP to MBSSID and reactivate the standard network 3 Configure different security modes for the networks 4 Configure a wireless network for standard office use 5 Configure a wireless network for VoIP users 6 Configure a wireless network for guests to your office The following figure shows the multiple networks you want to set up Your NWA is marked Z the main network router is marked A and your network printer is marked B MAC 00 AA 00 AA 00 AA The standard network SSI DO1 has access to all reso
143. gs Root AP LABEL DESCRIPTION Basic Settings Wireless LAN Select the check box to turn on the wireless LAN on the NWA Interface Operation Mode Select Root AP from the drop down list Wireless Mode If you are in the Wireless LAN gt Wireless Settings or Wireless LAN gt Wireless Settings 2 4G screen you can select from the following e 802 11b g to allow both IEEE802 11b and IEEE802 11g compliant WLAN devices to associate with the NWA The transmission rate of your NWA might be reduced e 802 11b g n to allow IEEE802 11b IEEE802 11g and IEEE802 11n compliant WLAN devices to associate with the NWA The transmission rate of the NWA might be reduced e 802 11n to allow only IEEE802 11n compliant WLAN devices to associate with the NWA If you are in the Wireless LAN Wireless Settings 5G screen you can select from the following e 802 11a n to allow IEEE802 11a and IEEE802 11n compliant WLAN devices to associate with the NWA e 802 11a to allow only IEEE802 11a compliant WLAN devices to associate with the NWA e 802 11n to allow only IEEE802 11n compliant WLAN devices to associate with the NWA e 802 11a n ac to allow IEEE802 11a IEEE802 11n and IEEE802 11ac compliant WLAN devices to associate with the NWA The transmission rate of the NWA might be reduced Channel Select the operating frequency channel depending on your particular region from the drop down list box Channel W
144. gt RADIUS Wireless Settings SSID RADIUS Profiles Profile Primary Server Primary Server Backup Server Backup Server Modify Name Status Accounting Status Accounting 1 RadProfile1 Active Inactive Inactive Inactive 3 2 RadProfile2 Inactive Inactive Inactive Inactive g 3 RadProfile3 Inactive Inactive Inactive Inactive 2 4 RadProfile4 Inactive Inactive Inactive Inactive C Security RADIUS MAC Filter NWA1120 Series User s Guide 79 Chapter 6 Wireless LAN Select a profile you want to configure and click Edit Figure 35 Wireless LAN gt RADIUS RADIUS Profile Profile Name RadProfile1 RADIUS Server Settings Primary RADIUS Server Enabled Primary Server IP Address 0 0 0 0 Primary Server Port 4812 I Primary Share Secret password Backup RADIUS Server C Enabled Backup Server IP Address Backup Server Port Backup Share Secret Accounting Server Settings Primary Accounting Server C Enabled Primary Server IP Address Primary Server Port Primary Share Secret Backup Accounting Server Enabled Backup Server IP Address Backup Server Port Backup Share Secret Back Apply Cancel The following table describes the labels in this screen Table 21 Wireless LAN RADIUS LABEL DESCRIPTION Profile Name This is the name that identifying this RADIUS profile Primary RADIUS Select the check box to enable user authe
145. he PSK you want to use in your network in the Pre Shared Key field In this example the PSK is ThisismyGuestWPApre sharedkey Click Apply Security Settings Profile Name SecProfile3 Security Mode WPA PSK ThisismyGuestWPApre 8 63 ASCII Characters Back Apply Cancel 8 Your guest wireless network is now ready to use 4 2 5 Testing the Wireless Networks To make sure that the three networks are correctly configured do the following e On a computer with a wireless client scan for access points You should see the Guest SSID network but not the SSIDO1 and VoIP SSID networks If you can see the SSIDO1 and VoIP SSID networks go to its SSID Edit screen and make sure to select the Hidden SSID check box and click Apply e Try to access each network using the correct security settings and then using incorrect security settings such as the WPA PSK for another active network If the behavior is different from expected for example if you can access the SSIDO1 or VoIP SSID wireless network using the security settings for the Guest SSI D wireless network check that the SSID profile is set to use the correct security profile and that the settings of the security profile are correct 4 3 NWA Setup in AP and Wireless Client Modes This example shows you how to restrict wireless access to your NWA 4 3 1 Scenario In the figure below there are two NWAs A and B in the network A is in MBSSID or root AP mode while
146. his screen to enable MAC address filtering in your NWA You can specify MAC addresses to either allow or deny association with your NWA Click Wireless LAN gt MAC Filter The screen displays as shown Figure 39 Wireless LAN gt MAC Filter Wireless Settings Security RADIUS MAC Filter MAC Filter Profiles Profile Name Filter Action Modify 1 MacProfile1 Disabled 3 2 MacProfile2 Disabled Li 3 MacProfile3 Disabled g 4 MacProfile4 Disabled sg 5 MacProfile5 Disabled 4 6 MacProfile6 Disabled a 7 MacProfile7 Disabled g 8 MacProfile8 Disabled 4 NWA1120 Series User s Guide Chapter 6 Wireless LAN Select a profile you want to configure and click Edit Figure 40 MAC Filter Edit MAC Filter i MAC Filter Settings Profile Name MacProfile1 Access Control Mode Disabled xi MAC Address MAC Address 1 mm 2 EB 3 4 5 6 7 8 9 10 11 12 3 127 128 Back Apply Cancel The following table describes the labels in this screen Table 23 Wireless LAN gt MAC Filter LABEL DESCRIPTION Profile Name This is the name that identifying this profile Access Control Mode Select Disabled if you do not want to use this feature Select Allow to permit access to the NWA MAC addresses not listed will be denied access to the NWA Select Deny to block access to theNWA MAC addresses not listed will be allowed to access the NWA This is the index number of the MAC address
147. iagnostic functions such as ping Neighbor Discovery Protocol NDP The Neighbor Discovery Protocol NDP is a protocol used to discover other IPv6 devices and track neighbor s reachability in a network An IPv6 device uses the following ICMPv6 messages types e Neighbor solicitation A request from a host to determine a neighbor s link layer address MAC address and detect if the neighbor is still reachable A neighbor being reachable means it responds to a neighbor solicitation message from the host with a neighbor advertisement message e Neighbor advertisement A response from a node to announce its link layer address e Router solicitation A request from a host to locate a router that can act as the default router and forward packets e Router advertisement A response to a router solicitation or a periodical multicast advertisement from a router to advertise its presence and other parameters IPv6 Cache 174 An IPv6 host is required to have a neighbor cache destination cache prefix list and default router list The NWA maintains and updates its IPv6 caches constantly using the information from response messages In IPv6 the NWA configures a link local address automatically and then sends a neighbor solicitation message to check if the address is unique If there is an address to be resolved or verified the NWA also sends out a neighbor solicitation message When the NWA receives a neighbor advertisement in response it
148. ick Local Area Connection and then select Properties QU gt Control Panel Network and Internet Network Connections gt Organize v Disable this network device Diagnose this connection Rename this A Local Area Connection Wireless Network Connection ae _ Unidentified network y i ZyXEL_RT3062_AP1 4 Broadcom NetXtreme Gigabit Eth ill 802 11n Wirel SB Adapter General Connection IPv4 Connectivity No network access IPv6 Connectivity No network access Media State Enabled Duration 00 04 36 Speed 100 0 Mbps Details Sent As Received Packets 432 0 Goa ee Note During this procedure click Continue whenever Windows displays a screen saying that it needs your permission to continue NWA1120 Series User s Guide Appendix A Setting Up Your Computers IP Address 5 Select Internet Protocol Version 4 TCP I Pv4 and then select Properties Connect using e Broadcom NetXtreme Gigabit Ethemet This connection uses the following items 9l Client for Microsoft Networks E QoS Packet Scheduler vi dalzie Link Layer Topology Discovery Responder unns Properties Description Transmission Control Protocol Intemet Protocol The default wide area network protocol that provides communication across diverse interconnected networks NWA1120 Series Users Guide 133 Appendix A Setting Up Your Computer s IP Addre
149. idth This field displays only when you select 802 11n 802 11a n 802 11b g n or 802 11a n ac in the Wireless Mode field A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a 40MHz channel uses two standard channels and offers speeds of up to 300Mbps However not all devices support 40MHz channels Select the channel bandwidth you want to use for your wireless network It is recommended that you select 20 40MHz This allows the NWA to adjust the channel bandwidth depending on network conditions Select 20MHz if you want to lessen radio interference with other wireless devices in your neighborhood or the wireless clients do not support channel bonding Select SSID The SSID Service Set IDentifier identifies the Service Set with which a wireless station is Profile associated Wireless stations associating to the access point AP must have the same SSID You can have up to four SSIDs active at the same time Note If you are configuring the NWA from a computer connected to the wireless LAN and you change the NWA s SSID or security settings you will lose your wireless connection when you press Apply to confirm You must then change the wireless settings of your computer to match the NWA s new settings This is the index number of each SSID profile Activve Select the check box to enable an SSID profile Otherwise clear the check box Profile Select an SSID Profile from the drop down list box
150. ield If there is a high density of APs in an area decrease the output power of the NWA to reduce interference with other APs Select one of the following Full Full Power 5096 2596 or 12 596 See the product specifications for more information on your NWA s output power Preamble Type Select Dynamic to have the AP automatically use short preamble when wireless adapters support it otherwise the AP uses long preamble Select Long if you are unsure what preamble mode the wireless adapters support and to provide more reliable communications in busy wireless networks RTS CTS Threshold Fragmentation Request To Send The threshold number of bytes for enabling RTS CTS handshake Data with its frame size larger than this value will perform the RTS CTS handshake Setting this attribute to be larger than the maximum MSDU MAC service data unit size turns off the RTS CTS handshake Setting this attribute to its smallest value 1 turns on the RTS CTS handshake The threshold number of bytes for the fragmentation boundary for directed messages It is the maximum data fragment size that can be sent Extension You can use CTS to self or RTS CTS protection mechanism to reduce conflicts with other Channel wireless networks or hidden wireless clients The throughput of RTS CTS is much lower Protection Mode than CTS to self Using this mode may decrease your wireless performance A MPDU This field is available only when 802 11
151. il Subject 109 Send Log to 109 Syslog 110 Logs Uses of 107 MAC Filter Allow Association 84 Deny Association 84 Maintenance 111 Association List 112 Backup 116 Restore 116 Management Information Base MIB 105 managing the device good habits 16 MBSSID 11 Media Access Control 83 Message Integrity Check MIC 188 message relay 57 Microsoft Challenge Handshake Authentication Protocol Version 2 56 MSCHAPv2 56 MSDU 60 64 70 N NAT 169 Netscape Navigator 18 Network Time Protocol NTP 111 NTP 111 O Operating Mode 53 other documentation 2 Output Power Management 60 64 66 69 P Pairwise Master Key PMK 188 190 Passphrase 56 Password 119 PEAP 56 Personal Information Exchange Syntax Standard 97 PFX PKCS 12 97 pop up windows 18 Preamble 86 preamble mode 183 Preamble Type 60 64 66 70 Pre Shared Key 56 priorities 87 product registration 200 Protected Extensible Authentication Protocol 56 PSK 56 188 Q QoS 73 Quick Start Guide 2 R Radio Frequency 86 RADIUS 56 185 Accounting 57 Authentication 57 Authorization 57 message types 185 NWA1120 Series User s Guide 207 Index messages 185 shared secret key 185 RADIUS Screen Accounting Server 81 Accounting Server IP Address 81 RADIUS server 55 Backup 81 Primary 80 Rates Configuration 60 64 67 70 registration product 200 related documentation 2 Remote Authentication Dial In User Service 56 remote
152. ing to access AP again The NWA automatically restarts in this time causing a temporary network disconnect In some operating systems you may see the following icon on your desktop Figure 64 Network Temporarily Disconnected a Local Area Connection Network cable unplugged After the upload was finished log in again and check your new firmware version in the Dashboard screen NWA1120 Series User s Guide Chapter 11 Maintenance 11 8 Configuration File Screen Use this screen to backup restore and reset the configuration of your NWA Click Maintenance Configuration File The screen appears as shown next Figure 65 Maintenance gt Configuration File Configuration File Backup Configuration Restore Configuration File Path Back to Factory Defaults Password will be 1234 Click to save the current configuration of your system to your computer To restore a previously saved configuration file to your system browse to the location of the configuration file and click Upload Click to clear all user entered configuration information and return to factory defaults After resetting the LAN IP address will be 192 168 1 2 Crews Upload 11 8 1 Backup Configuration Backup configuration allows you to back up save the NWA s current configuration to a file on your computer Once your NWA is configured and functioning properly it is highly recommended that you back up your
153. is referred to as the key This key is requested from all devices wishing to connect to a wireless network PSK The Pre Shared Key PSK is a password shared by a wireless access point and a client during a previous secure connection The key can then be used to establish a connection between the two parties Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network Encryption is like a secret code If you do not know the secret code you cannot understand the message Encryption is the process of converting data into unreadable text This secures information in network communications The intended recipient of the data can unlock it with a pre assigned key making the information readable only to him The NWA when used as a wireless client employs Temporal Key Integrity Protocol TKIP data encryption EAP Extensible Authentication Protocol EAP is a protocol used by a wireless client an access point and an authentication server to negotiate a connection The EAP methods employed by the NWA when in Wireless Client operating mode are Transport Layer Security TLS Protected Extensible Authentication Protocol PEAP Lightweight Extensible Authentication Protocol LEAP and Tunneled Transport Layer Security TTLS The authentication protocol may either be Microsoft Challenge Handshake Authentication Protocol Version 2 MSCHAPv2 or Generic Token Card GTC Further information o
154. ld select the SSID profile of the AP you want to use Click Apply The SSID used in the selected SSID profile automatically changes to be the one you select in the Site Survey screen Set the security configuration for this operating mode in the Wireless LAN Security screen Check the Dashboard screen to check if the settings you set show in the WLAN information Note If you are configuring the NWA from a computer connected to the wireless LAN and you change the NWA s SSID or security settings you will lose your wireless connection when you press Apply to confirm You must then change the wireless settings of your computer to match the NWA s new settings Channel This shows the operating frequency channel in use This field is read only when you select Client as your operation mode Channel Width This field is not available in the NWA1123 NI A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a 40MHz channel uses two standard channels and offers speeds of up to 300Mbps However not all devices support 40MHz channels Select the channel bandwidth you want to use for your wireless network It is recommended that you select 20 40MHz This allows the NWA to adjust the channel bandwidth depending on network conditions Select 20MHz if you want to lessen radio interference with other wireless devices in your neighborhood or the AP do not support channel bonding Advanced Setting S Output
155. listed MAC Address Enter the MAC addresses in XX XX XX XX XX XX format of the wireless station to be allowed or denied access to the NWA Back Click Back to return to the previous screen Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh 6 10 Technical Reference This section provides technical background information about the topics covered in this chapter Refer to Appendix E on page 179 for further readings on Wireless LAN NWA1120 Series User s Guide 85 Chapter 6 Wireless LAN 6 10 1 Additional Wireless Terms Table 24 Additional Wireless Terms TERM DESCRIPTION Intra BSS Traffic This describes direct communication not through the NWA between two wireless devices within a wireless network You might disable this kind of communication to enhance security within your wireless network RTS CTS Threshold In a wireless network which covers a large area wireless devices are sometimes not aware of each other s presence This may cause them to send information to the AP at the same time and result in information colliding and not getting through By setting this value lower than the default value the wireless devices must sometimes get permission to send information to the NWA The lower the value the more often the devices must get permission If this value is greater than the fragmentation threshold value see below then wireless devices never have t
156. locking Number of Wireless Stations Allowed to Associate SSIDO1 SSID01 secre RadProfile1 Disabled WMM Enabled 7 Enabled 1 4094 1 64 Back Cancel NWA1120 Series User s Guide Chapter 4 Tutorial 3 Next click Wireless LAN gt Security Click the Edit icon next to SecProfile1 Security Profiles Profile Name Security Mode Modify 1 SecProfile1 None C 2 SecProfile2 None 3 3 SecProfile3 None g 4 SecProfile4 None a 5 SecProfile5 None g 6 SecProfile6 None 4 7 SecProfile7 None 3 8 SecProfile8 None Lf 4 Since SSI DOI is the standard network that has access to all resources assign a more secure security mode Select WPA2 PSK MI X as the Security Mode and enter the Pre Shared Key In this example use ThisisSSI DO1PreSharedKey Click Apply Security Settings Profile Name SecProfile1 Security Mode WPA2 PSK MIX v Pre Shared Key ThisisSSIDO1PreShare 8 63 ASCII Characters Back Cancel 5 You have finished configuring the standard network SSI DO1 4 2 3 Configure the VoIP Network 1 Goto Wireless LAN gt SSID Click the Edit icon next to VoIP SSID Profile Settings Profile Name SSID Security RADIUS QoS MAC Filter Modify 1 SSID01 SSIDO01 Disabled RadProfile1 WMM Disabled a 2 VoIP_SSID VoIP_SSID Disabled RadProfile1 WMM Disabled 3 Guest_SSID Guest_SSID Disabled RadProfile1 WMM Disabled 3 4 Profile4 ZyXEL
157. lt encryption key in the wireless security configuration screen You may still configure and store keys but they will not be used while dynamic WEP is enabled Note EAP MD5 cannot be used with Dynamic WEP Key Exchange For added security certificate based authentications EAP TLS EAP TTLS and PEAP use dynamic keys for data encryption They are often deployed in corporate environments but for public deployment a simple user name and password pair is more practical The following table is a comparison of the features of authentication types Table 57 Comparison of EAP Authentication Types EAP MD5 EAP TLS EAP TTLS PEAP LEAP Mutual Authentication No Yes Yes Yes Yes Certificate Client No Yes Optional Optional No Certificate Server No Yes Yes Yes No Dynamic Key Exchange No Yes Yes Yes Yes Credential Integrity None Strong Strong Strong Moderate Deployment Difficulty Easy Hard Moderate Moderate Moderate Client Identity Protection No No Yes Yes No WPA and WPA2 Wi Fi Protected Access WPA is a subset of the IEEE 802 11i standard WPA2 IEEE 802 11i is a wireless security standard that defines stronger encryption authentication and key management than WPA Key differences between WPA or WPA2 and WEP are improved data encryption and user authentication If both an AP and the wireless clients support WPA2 and you have an external RADIUS server use WPA2 for stronger data encryption If
158. m tisable Jav 9 High safety Q Low safety Reset custom settings Reset to Medium Reset ced JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sure that Use Java 2 for applet under Java Sun is selected NWA1120 Series User s Guide 157 Appendix B Pop up Windows JavaScript and Java Permissions Click OK to close the window Figure 82 Java Sun Internet Options Ad xl General Security Privacy Content Connections Programs Advanced Settings O Use inline AutoComplete Use Passive FTP for firewall and DSL modem compatibility Use smooth scrolling HTTP 1 1 settings v Use HTTP 1 1 O Use HTTP 1 1 through proxy connections 9 Java E d Use Java 2141 0T for enol eques esi gt 2 v1 4 1 07 for d Use Java 2141 0T for enol eques esi gt requires restart 5 Microso v B Java console enabled requires restart O Java logging enabled JIT compiler for virtual machine enabled requires restart Multimedia O Always show Internet Explorer 5 0 or later Radio toolbar O Don t display online media content in the media bar Enable Automatic Image Resizing Restore Defaults Apply Mozilla Firefox Mozilla Firefox 2 0 screens are used here Screens for other versions may vary slightly The steps below apply to Mozilla Firefox 3 0 as well You can enable Java Javascript and pop ups in one
159. m e Preferences F Authorizations o Hal T E Hardware Drivers elp and Suppo About GNOME G About Ubuntu Hardware Testing ISl Language Support i Login Window Quit Bis 2 Network Tools NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 2 3 When the Network Settings window opens click Unlock to open the Authenticate window By default the Unlock button is greyed out until clicked You cannot make changes to your configuration unless you first enter your admin password Network Settings ia Location Connections General DNS Hosts B Point to point connec This network interface is not c In the Authenticate window enter your admin account name and password then click the Authenticate button e Authenticate x E fo System policy prevents modifying the configuration An application is attempting to perform an action that requires privileges Authentication as one of the users below is required to perform this action amp CJ chris gt Details E cancel 4 Authenticate gt H NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 4 Inthe Network Settings window select the connection that you want to configure then click Properties Network Settings tocation i8 8 Connections General DNS Hosts Poi
160. m X If you are able to access the FTP server do the following Make sure MAC filtering is enabled Make sure X s MAC address is not entered in the list of allowed devices NWA1120 Series User s Guide PART Il Technical Reference The appendices provide general information Some details may not apply to your NWA Monitor 5 1 Overview This chapter discusses read only information related to the device state of the NWA Note To access the Monitor screens you can also click the links in the Summary table of the Dashboard screen to view the wireless packets sent received as well as the status of clients connected to the NWA 5 2 What You Can Do e Use the Logs screen to see the logs for the categories that you selected in the Configuration gt Log Settings screen see Section 5 3 on page 47 You can view logs in this page Once the log entries are all used the log will wrap around and the old logs will be deleted e use the Statistics screen to view 802 11 mode channel number wireless packet specific statistics and so on see Section 5 4 on page 48 e Use the Association List screen to view the wireless devices that are currently associated to the NWA see Section 5 5 on page 49 e Use the Channel Usage screen to view whether a channel is used by another wireless network or not If a channel is being used you should select a channel removed from it by five channels to completely avoid overlap see Section 5 6 o
161. management 16 remote management limitations 95 Roaming 86 RootAP 14 RTS Request To Send 182 threshold 181 182 RTS CTS Threshold 60 64 66 70 86 S screen resolution 18 Security Mode Choosing the 87 Security Modes None 55 WEP 55 WPA 55 WPA2 55 WPA2 MIX 55 WPA2 PSK 55 Service Set IDentifier 53 Service Set Identifier see SSID Simple Mail Transfer Protocol 108 SMTP 108 110 SNMP MIBs 105 Spanning Tree Protocol 86 SSID 11 53 SSID profile pre configured 12 SSID profiles 11 Status Screens 24 802 11 Mode 48 Channel ID 48 Ethernet 24 FCS Error Count 48 Firmware Version 26 Interface Status 27 Poll Interval 48 Retry Count 48 Statistics 49 system statistics 24 WLAN 24 Subnet 162 Subnet Mask 88 163 subnetting 165 supported browsers 18 Syslog Logging 108 System Screens General 112 Password 113 Time Time and Date Setup 114 Time Zone 114 T telnet 99 Temporal Key Integrity Protocol 56 Temporal Key Integrity Protocol TKIP 188 TFTP restrictions 96 Thumbprint Algorithm 106 TKIP 56 TLS 56 trademarks 199 Transport Layer Security 56 Troubleshooting 118 connection is slow or intermittent 121 DHCP 119 factory defaults 120 firmware 120 Internet 120 LAN ETHERNET port 120 QoS 121 Web Configurator 119 TTLS 56 NWA1120 Series User s Guide Index Tunneled Transport Layer Security 56 Tutorial 28 U User Authentication 55 V Virtual Local Area Network 92 VLAN 92 introduction
162. menu events Allow script to hide address bar Open console on error Mser JavaScript Folder Choose cma Select the items you want Opera s JavaScript to apply NWA1120 Series User s Guide C IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks IP addresses identify individual devices on a network Every networking device including computers servers routers printers etc needs an IP address to communicate across the network These networking devices are also known as hosts Subnet masks determine the maximum number of possible hosts on a network You can also use subnet masks to divide one network into multiple sub networks Introduction to IP Addresses One part of the IP address is the network number and the other part is the host ID In the same way that houses on a street share a common street name the hosts on a network share a common network number Similarly as each house has its own house number each host on the network has its own unique identifying number the host ID Routers use the network number to send packets to the correct network while the host ID determines to which host on the network the packets are delivered Structure An IP address is made up of four parts written in dotted decimal notation for example 192 168 1 1 Each of these four parts is known as an octet An octet is an eight digit binary number for example 11000000 which is 192 in
163. messages The remote ID option carries a user defined string 1 In IPv6 all network interfaces can be associated with several addresses NWA1120 Series Users Guide 173 Appendix D IPv6 such as the system name The interface ID option provides slot number port information and the VLAN ID to the DHCPv6 server The remote ID option if any is stripped from the Relay Reply messages before the relay agent sends the packets to the clients The DHCP server copies the interface ID option from the Relay Forward message into the Relay Reply message and sends it to the relay agent The interface ID should not change even after the relay agent restarts Prefix Delegation ICMPv6 Prefix delegation enables an IPv6 router to use the IPv6 prefix network address received from the ISP or a connected uplink router for its LAN The NWA uses the received IPv6 prefix for example 2001 db2 48 to generate its LAN IP address Through sending Router Advertisements RAs regularly by multicast the NWA passes the IPv6 prefix information to its LAN hosts The hosts then can use the prefix to generate their IPv6 addresses Internet Control Message Protocol for IPv6 ICMPv6 or ICMP for IPv6 is defined in RFC 4443 ICMPv6 has a preceding Next Header value of 58 which is different from the value used to identify ICMP for IPv4 ICMPv6 is an integral part of IPv6 IPv6 nodes use ICMPv6 to report errors encountered in packet processing and perform other d
164. mit this frame must first send an RTS Request To Send message to the AP for permission to send it The AP then responds with a CTS Clear to Send message to all other stations within its range to notify them to defer their transmission It also reserves and confirms with the requesting station the time frame for the requested transmission Stations can send frames smaller than the specified RTS CTS directly to the AP without the RTS Request To Send CTS Clear to Send handshake You should only configure RTS CTS if the possibility of hidden nodes exists on your network and the cost of resending large frames is more than the extra network overhead involved in the RTS Request To Send CTS Clear to Send handshake If the RTS CTS value is greater than the Fragmentation Threshold value see next then the RTS Request To Send CTS Clear to Send handshake will never occur as data frames will be fragmented before they reach RTS CTS size Note Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size between 256 and 2432 bytes that can be sent in the wireless network before the AP will fragment the packet into smaller data frames A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for b
165. n Root MAC Specify the peer device s MAC address The peer device can be a NWA in either root AP Address mode or repeater mode Advanced Settings Beacon Interval When a wirelessly network device sends a beacon it includes with it a beacon interval This specifies the time period before the device sends the beacon again The interval tells receiving devices on the network how long they can wait in lowpower mode before waking up to handle the beacon A high value helps save current consumption of the access point NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 12 Wireless LAN gt Wireless Settings Repeater continued LABEL DESCRIPTION DTIM Interval Delivery Traffic Indication Message DTIM is the time period after which broadcast and multicast packets are transmitted to mobile clients in the Active Power Management mode A high DTIM value can cause clients to lose connectivity with the network Output Power Set the output power of the NWA in this field If there is a high density of APs in an area decrease the output power of the NWA to reduce interference with other APs Select one of the following Full Full Power 50 25 or 12 5 See the product specifications for more information on your NWA s output power Preamble Type Select Dynamic to have the AP automatically use short preamble when wireless adapters support it otherwise the AP uses long preamble Selec
166. n 802 11b g n 802 11a n or 802 11a n ac Aggregation is selected as the Wireless Mode Select to enable A MPDU aggregation Message Protocol Data Unit MPDU aggregation collects Ethernet frames along with their 802 11n headers and wraps them in a 802 11n MAC header This method is useful for increasing bandwidth throughput in environments that are prone to high error rates Short GI This field is available only when 802 11n 802 11b g n 802 11a n or 802 11a n ac is selected as the Wireless Mode Select Enabled to use Short GI Guard Interval The guard interval is the gap introduced between data transmission from users in order to reduce interference Reducing the GI increases data transfer rates but also increases interference Increasing the GI reduces data transfer rates but also reduces interference NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 11 Wireless LAN gt Wireless Settings Root AP continued LABEL DESCRIPTION MCS Rate The MCS Rate table is available only when 802 11n 802 11b g n 802 11a n or 802 112 n ac is selected in the Wireless Mode field IEEE 802 11n supports many different data rates which are called MCS rates MCS stands for Modulation and Coding Scheme This is an 802 11n feature that increases the wireless network performance in terms of throughput For each MCS Rate 0 15 select either Enabled to have the NWA use the data rate Clear
167. n 185 Encryption 56 75 78 encryption 14 188 ESS 53 180 Ethernet device 83 Extended Service Set 53 Extended Service Set See ESS 180 Extensible Authentication Protocol 56 F Factory Defaults 117 restoring 20 FCC interference statement 199 Firefox 18 Firmware 112 Fragmentation 60 64 66 70 Fragmentation threshold 86 fragmentation threshold 182 FTP 96 restrictions 96 G Generic Token Card 56 GTC 56 Guide Quick Start 2 H hidden node 181 IANA 169 IBSS 179 IEEE 802 11g 183 IEEE 802 1x 54 Import Certificate 99 Independent Basic Service Set See IBSS 179 initialization vector IV 188 Internet Assigned Numbers Authority See IANA Internet Explorer 18 Internet Protocol version 6 see IPv6 Internet telephony 12 IP Address 88 Gateway IP address 88 IP Screen 88 DHCP 90 IPv6 89 170 addressing 89 170 EUI 64 172 global address 89 171 interface ID 172 link local address 89 170 Neighbor Discovery Protocol 89 170 ping 89 170 prefix 89 170 prefix length 89 170 stateless autoconfiguration 172 unspecified address 171 J Java permissions 18 JavaScripts 18 K key 56 76 L layer 2 isolation 81 example 81 MAC address 82 LEAP 56 NWA1120 Series User s Guide Index LEDs 17 118 Blinking 17 Flashing 17 Off 17 Lightweight Extensible Authentication Protocol 56 Log 47 Log Screens 107 Logs accessing logs 107 receiving logs via e mail 108 Logs Screen Mail Server 109 Ma
168. n page 50 5 3 View Logs Use the Logs screen to see the logged messages for the NWA Log entries in red indicate system error logs The log wraps around and deletes the old entries after it fills NWA1120 Series User s Guide Chapter 5 Monitor Click Monitor gt Logs Figure 15 Logs View Log Log List Display All Logs Timev 1 00 50 48 2 01 00 24 3 01 00 24 4 01 01 24 5 01 03 22 6 01 07 38 7 01 12 37 8 01 15 56 9 01 16 21 10 01 16 34 11 01 17 34 12 01 17 36 13 01 18 36 14 01 18 38 15 01 19 38 16 01 34 21 ij E Mail Log Now Refresh Clear Log Message Source hostapd Stationhasassociated Interface ath0 MAC 00 19 cb 32 be ac hostapd Stationhasdisassociated Interface ath MAC cc 08 e0 86 5f 17 hostapd Stationhasassociated Interface athO MAC cc 08 e0 86 5f 17 hostapd Stationhasdisassociated Interface ath0 MAC cc 08 e0 86 5f 17 hostapd Stationhasdisassociated Interface athO MAC cc 08 e0 86 5f 17 hostapd Stationhasassociated Interface athO MAC 40 a6 d9 cc 03 28 hostapd Stationhasdisassociated Interface athO MAC 40 a6 d9 cc 03 28 hostapd Stationhasassociated Interface athO MAC 40 a6 d9 cc 03 28 hostapd Stationhasdisassociated Interface ath0 MAC 40 36 d9 cc 03 28 hostapd Stationhasassociated Interface ath0 MAC 40 a6 d9 cc 03 28 hostapd Stationhasdisassociated Interface ath0 MAC 40 36 d9 cc 03 28 hostapd Stationhasassociated Interface ath0 MAC 40 36 d9 cc 03 28 hostapd Stationhasdisassociated In
169. n these terms can be found in Appendix E on page 179 RADIUS Remote Authentication Dial In User Service RADIUS is a protocol that can be used to manage user access to large networks It is based on a client server model that supports authentication authorization and accounting The access point is the client and the server is the RADIUS server Figure 21 RADIUS Server Setup NWA1120 Series User s Guide Chapter 6 Wireless LAN In the figure above wireless clients A and B are trying to access the Internet via the NWA The NWA in turn queries the RADIUS server if the identity of clients A and U are allowed access to the Internet In this scenario only client U s identity is verified by the RADIUS server and allowed access to the Internet The RADIUS server handles the following tasks e Authentication which determines the identity of the users e Authorization which determines the network services available to authenticated users once they are connected to the network e Accounting which keeps track of the client s network activity RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server You should know the IP addresses ports and share secrets of the external RADIUS server and or the external RADIUS accounting server you want to use with your NWA You can configure a primary and backup RADIUS and RADIUS accounting server for your NWA 6 4 Wirel
170. nable wireless security on your NWA Choose the most secure encryption method that all devices on your network support See Section 6 6 on page 73 for directions on configuring encryption If you have a RADIUS server enable IEEE 802 1x or WPA 2 user identification on your network so users must log in This method is more common in business environments e Hide your wireless network name SSID The SSID can be regularly broadcast and unauthorized users may use this information to access your network See Section 6 5 on page 71 for directions on using the web configurator to hide the SSID e Enable the MAC filter to allow only trusted users to access your wireless network or deny unwanted users access based on their MAC address See Section 6 9 on page 83 for directions on configuring the MAC filter 1 5 Good Habits for Managing the NWA Do the following things regularly to make the NWA more secure and to manage it more effectively e Change the password Use a password that s not easy to guess and that consists of different types of characters such as numbers and letters e Write down the password and put it in a safe place NWA1120 Series User s Guide Chapter 1 Introducing the NWA e Back up the configuration and make sure you know how to restore it Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes If you forget your password you will have to reset the NWA to its factory de
171. nagement Limitations Remote management over LAN or WLAN will not work when e You have disabled that service in one of the remote management screens e The IP address in the Secured Client I P Address field does not match the client IP address If it does not match the NWA will disconnect the session immediately e You may only have one remote management session running at one time The NWA automatically disconnects a remote management session of lower priority when another remote management session of higher priority starts The priorities for the different types of remote management sessions are as follows NWA1120 Series User s Guide Chapter 9 System 1 Telnet 2 HTTP Certificate A certificate contains the certificate owner s identity and public key Certificates provide a way to exchange public keys for use in authentication Figure 48 Certificates Example Authentication U In the figure above the NWA Z checks the identity of the notebook A using a certificate before granting access to the network The certification authority certificate that you can import to your NWA should be in PFX PKCS 12 file format This format referred to as the Personal Information Exchange Syntax Standard is comprised of a private key public certificate pair that is further encrypted with a password Before you import a certificate into the NWA you should verify that you have the correct certificate Key distribution is simple an
172. nected to the mains power source d Power management another condition which does not exceed the applicable power consumption requirements for off mode and or standby mode when the equipment is connected to the mains power source The power anagement function shall be activated before delivery 4 Information to be provided by manufacturers c the characteristics of equipment relevant for assessing conformity with the requirements set out in point 1 c or the requirements set out in points 2 c and or 2 d as applicable including the time taken to automatically reach standby or off mode or another condition which does not exceed the applicable power consumption requirements for off mode and or standby mode In particular if applicable the technical justification shall be provided that the requirements set out in point 1 c or the requirements set out in points 2 c and or 2 d are inappropriate for the intended use of equipment EU Directive amp Regulation ErP Directive Directive 2009 125 EC Standby amp off mode Regulation EC No 1275 2008 Guidance accompanying Commission Regulation EC No 1275 2008 source http ec europa eu energy efficiency ecodesign eco_design_en htm Viewing Certifications Go to http www zyxel com to view this product s documentation and certifications ZyXEL Limited Warranty ZyXEL warrants to the original end user purchaser that this product is free from any defects in material or
173. nly when 802 11n 802 11b g n 802 11a n or 802 11a n ac is selected as the Wireless Mode Select Enabled to use Short GI Guard Interval The guard interval is the gap introduced between data transmission from users in order to reduce interference Reducing the GI increases data transfer rates but also increases interference Increasing the GI reduces data transfer rates but also reduces interference MCS Rate The MCS Rate table is available only when 802 11n 802 11b g n 802 11a n or 802 112 n ac is selected in the Wireless Mode field IEEE 802 11n supports many different data rates which are called MCS rates MCS stands for Modulation and Coding Scheme This is an 802 11n feature that increases the wireless network performance in terms of throughput For each MCS Rate 0 15 select either Enabled to have the NWA use the data rate Clear the Enabled check box if you do not want the NWA to use the data rate Turn on the Auto option to have the NWA set the data rates automatically to optimize the throughput Note You can set the NWA to use up to four MCS rates at a time Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh NWA1120 Series User s Guide Chapter 6 Wireless LAN 6 4 3 Wireless Client Mode Use this screen to turn your NWA into a wireless client Select Client as the Operation Mode The following screen displays Figure 24 Wireless LAN gt Wireless Settings
174. not select the Hidden SSID check box so the guests can easily find the wireless network 3 Select WMM BESTEFFORT in the QoS field to give the guest a lower QoS priority NWA1120 Series User s Guide Chapter 4 Tutorial 4 Select the check box of Intra BSS Traffic blocking Enabled Click Apply Profile Settings Profile Name Guest SSID SSID Guest SSID SecProfile3 RADIUS RadProfile1 y MAC Filtering Disabled x BSSID VLAN ID 1 1 4094 Number of Wireless Stations Allowed to 64 1 64 Associate idden SSID Enabled Intra BSS Traffic Blocking Enabled Bac Appy Cancel 5 Next click Wireless LAN gt Security Click the Edit icon next to SecProfile3 Security Profiles Profile Name Security Mode Modify 1 SecProfile1 WPA2 PSK MIX 4 2 SecProfile2 WPA2 PSK 4 3 SecProfile3 None 4 SecProfile4 None s 5 SecProfile5 None i 6 SecProfile6 None g 7 SecProfile7 None s 8 SecProfile8 None 4 6 Select WPA PSK in the Security Mode field WPA PSK provides strong security that is supported by most wireless clients Even though your Guest SSID clients do not have access to sensitive information on the network you should not leave the network without security An attacker could still cause damage to the network or intercept unsecured communications or use your Internet access for illegal activities NWA1120 Series User s Guide Chapter 4 Tutorial 7 Enter t
175. nt s password and allows it to join the network only if the password matches The AP and wireless clients generate a common PMK Pairwise Master Key The key itself is not sent over the network but is derived from the PSK and the SSID The AP and wireless clients use the TKIP or AES encryption process the PMK and information exchanged in a handshake to create temporal encryption keys They use these keys to encrypt data exchanged between them Figure 96 WPA 2 PSK Authentication INTERNEJ Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type MAC address filters are not dependent on how you configure these security features Table 58 Wireless Security Relational Matrix METHOD KEY EE EHE IEEE 802 1X N METHOD MANUAL KEY E MANAGEMENT PROTOCOL Open None No Disable Enable without Dynamic WEP Key Open WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable Shared WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable WPA TKIP AES No Enable WPA PSK TKIP AES Yes Disable NWA1120 Series User s Guide Appendix E Wireless LANs Table 58 Wireless Security Relational Matrix continued AUTHENTICATION ENCRYPTIO ENTER METHOD KEY EOE GALE LKE 2 EEEO02 1X MANAGEMENT PROTOCOL WPA2 TKIP
176. nt to point connec This network interface is not c tj end Properties x Connection Settings IP address Subnet mask Gateway address e In the Configuration list select Automatic Configuration DHCP if you have a dynamic IP address e In the Configuration list select Static IP address if you have a static IP address Fill in the IP address Subnet mask and Gateway address fields 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 7 Ifyou know your DNS server IP address es click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided fe Netwonesernnge E E B Location Connections l General DNS Hosts DNS Servers F Add w Delete F Add w Delete P Help s unlock Close Search Domains 8 Click the Close button to apply the changes NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address Verifying Settings Check your TCP IP properties by clicking System Administration Network Tools and then selecting the appropriate Network device from the Devices tab The Interface Statistics column shows data if your connection is working properly Figure
177. nternet amp N Mac Network QuickTime Sharing System Accounts Date amp Time Parental Software Speech Startup Disk Time Machine X Universal Controls Update Access 3 When the Network preferences pane opens select Ethernet from the list of available connection types e Internal Modem Not Connected Status Not Connected The cable for Ethernet is connected but e PPPoE your computer does not have an IP address Not Connected dicii Configure Using DHCP Hd Not Connected g x g e FireWire Not Connected AirPort e Off eww DNS Server Search Domains 802 1X WPA ZyXELO4 1 id Click the lock to prevent further changes 4 From the Configure list select Using DHCP for dynamically assigned settings 5 Forstatically assigned settings do the following NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address From the Configure list select Manually In the IP Address field enter your IP address e In the Subnet Mask field enter your subnet mask e In the Router field enter the IP address of your NWA Location Automatic E e Internal Modem Qe Not Connected Status Not Connected The cable for Ethernet is connected but e PPPoE Qe your computer does not have an IP address Not Connected Ethernet 2 1 Ww einn Configure padares 0000 a Y Subnet Mask gt e on m D Router CO DNS Server Search Domains
178. ntication through an external authentication Server server Primary Server IP Enter the IP address of the RADIUS server to be used for authentication Address Primary Server Enter the port number of the RADIUS server to be used for authentication Port Primary Share Enter a password up to 64 alphanumeric characters as the key to be shared Secret between the external authentication server and the NWA The key must be the same on the external authentication server and your NWA The key is not sent over the network NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 24 Wireless LAN RADIUS continued LABEL DESCRIPTION Backup RADIUS If the NWA cannot communicate with the primary RADIUS server you can have the Server NWA use a backup RADIUS server Make sure the check boxe is selected if you want to use the backup server The NWA will attempt to communicate three times before using the backup server Requests can be issued from the client interface to use the backup server The length of time for each authentication is decided by the wireless client or based on the configuration of the Reauthentication Time field in the Wireless LAN Security screen Backup Server IP Address Enter the IP address of the RADIUS server to be used for authentication Backup Server Port Enter the port number of the RADIUS server to be used for authentication Backup Share Secret Enter a password up t
179. nually Configuring or Deleting Choose a network card to change or remove Then press Configure or Delete as desired AMD PCnet Fast 79C971 MAC 08 00 27 96 ed 3d Device Name eth etho Started automatically at boot P address assigned using DHCP NWA1120 Series User s Guide 147 Appendix A Setting Up Your Computer s IP Address 5 When the Network Card Setup window opens click the Address tab Figure 72 openSUSE 10 3 Network Card Setup YaST2 linux h2o0z Address Setup Select No Address Setup if you do not want any IP address for this device This is particularly useful for bonding ethernet devices Select Dynamic address if you do not have a static IP address assigned by the system administrator or your cable or DSL provider You can choose one of the dynamic address assignment method Select DHCP if you have a DHCP server running on your local network Network addresses are then obtained automatically from the server To automatically search for free IP and then assign it statically select Zeroconf To use Network Card Setup General Address onfiguration Name Ethernet I _ No IP Address for Bonding Devices D Dynamic Address DHCP i Statically assigned IP Address IP Address Subnet Mask Hostname IL jl Cancel 6 Select Dynamic Address DHCP
180. o 64 alphanumeric characters as the key to be shared between the external authentication server and the NWA The key must be the same on the external authentication server and your NWA The key is not sent over the network Primary Accounting Select the check box to enable user accounting through an external authentication Server server Primary Server IP Enter the IP address of the external accounting server in dotted decimal notation Address Primary Server Enter the port number of the external accounting server Port Primary Share Enter a password up to 64 alphanumeric characters as the key to be shared Secret between the external accounting server and the NWA The key must be the same on the external accounting server and your NWA The key is not sent over the network Backup Accounting Server If the NWA cannot communicate with the primary accounting server you can have the NWA use a backup accounting server Make sure the check boxe is selected if you want to use the backup server The NWA will attempt to communicate three times before using the backup server Backup Server IP Address Enter the IP address of the external accounting server in dotted decimal notation Backup Server Port Enter the port number of the external accounting server Backup Share Enter a password up to 64 alphanumeric characters as the key to be shared Secret between the external accounting serv
181. o get permission to send information to the NWA Preamble A preamble affects the timing in your wireless network There are two preamble modes long and short If a device uses a different preamble mode than the NWA does it cannot communicate with the NWA Fragmentation A small fragmentation threshold is recommended for busy networks while a larger Threshold threshold provides faster performance if the network is not very busy Roaming If you have two or more NWAs or other wireless access points on your wireless network you can enable this option so that wireless devices can change locations without having to log in again This is useful for devices such as notebooks that move around a lot Antenna An antenna couples Radio Frequency RF signals onto air A transmitter within a wireless device sends an RF signal to the antenna which propagates the signal through the air The antenna also operates in reverse by capturing RF signals from the air Positioning the antennas properly increases the range and coverage area of a wireless LAN 6 10 2 WMM QoS WMM Wi Fi MultiMedia QoS Quality of Service ensures quality of service in wireless networks It controls WLAN transmission priority on packets to be transmitted over the wireless network WMM QoS prioritizes wireless traffic according to the delivery requirements of the individual and applications WMM QoS is a part of the IEEE 802 11e QoS enhancement to certified
182. odule Root AP Repeater Client or MBSSI D You can change the operating mode in the Configuration Wireless LAN Wireless Settings 5G screen Firmware Version This field displays the current version of the firmware inside the device It also shows the date the firmware version was created You can change the firmware version by uploading new firmware in Maintenance Firmware Upgrade Serial Number This field displays the serial number of the NWA Ethernet Information LAN MAC Address This displays the MAC Media Access Control address of the NWA on the LAN Every network device has a unique MAC address which identifies it across the network IPv4 Address This field displays the current IPv4 address of the NWA on the network Subnet Mask Subnet masks determine the maximum number of possible hosts on a network You can also use subnet masks to divide one network into multiple sub networks Gateway IP Address IPv6 Address This is the IP address of the gateway The gateway is a router or switch on the same network segment as the device s LAN port The gateway helps forward packets to their destinations This field displays the current IPv6 address es of the NWA on the network Link Local This is the IPv6 link local address that the NWA generates automatically Global This is the NWA s IPv6 global address that you specify manually in the Configuration LAN screen W
183. of how to configure the wireless LAN on your NWA and then gives step by step guidelines showing how to configure your NWA for some example scenarios 4 1 How to Configure the Wireless LAN This section illustrates how to choose which wireless operating mode to use on the NWA and how to set up the wireless LAN in each wireless mode See Section 4 1 2 on page 28 for links to more information on each step 4 1 1 Choosing the Wireless Mode e Use MBSSID Multiple Basic Service Set Identifier operating mode if you want to use the NWA as an access point with some groups of users having different security or QoS settings from other groups of users See Section 1 2 1 on page 11 for details e Use Client operating mode if you want to use the NWA to access a wireless network See Section 1 2 2 on page 12 for details e Use Root AP operating mode if you want to allow wireless clients to access your wired network through the NWA and also have repeaters communicate with the NWA to expand wireleass coverage See Section 1 2 3 on page 14 for details Use Repeater operating mode if you want to use the NWA to communicate with the root AP or other repeaters See Section 1 2 4 on page 14 for details 4 1 2 Further Reading Use these links to find more information on the steps Choosing 802 11 Mode see Section 6 4 on page 57 e Choosing a wireless Channel ID see Section 6 4 on page 57 e Choosing a Security mode see Section 6 6 on page 73 e Con
184. onitor Statistics The following screen pops up Figure 16 Statistics Statistics View Status Description 802 11 Mode Channel ID RX Pkts TX Pkts Retry Count FCS Error Count WLAN1 802 11ng 6 7288510 936751 0 0 Poll Interval s 5 1 65534 sec Setintemal Stop The following table describes the labels in this screen Table7 Statistics LABEL DESCRIPTION Description This is the wireless interface on the NWA 802 11 Mode This field shows which 802 11 mode the NWA is using Channel ID This shows the channel number which the NWA is currently using over the wireless LAN RX Pkts This is the number of received packets on this port TX Pkts This is the number of transmitted packets on this port Retry Count This is the total number of retries for transmitted packets TX FCS Error Count This is the total number of checksum error of received packets RX Poll Interval Enter the time interval for refreshing statistics Set Interval Click this button to apply the new poll interval you entered above Stop Click this button to stop refreshing statistics 5 5 Association List View the wireless devices that are currently associated with the NWA in the Association List screen Association means that a wireless client for example your network or computer with a wireless network card has connected successfully to the AP or wireless router using the same SSID channel and security s
185. onsists of a unique IAID and associated IP information The IA type is the type of address in the IA Each IA holds one type of address IA NA means an identity association for non temporary addresses and IA TA is an identity association for temporary addresses An IA NA option contains the T1 and T2 fields but an IA TA option does not The DHCPv6 server uses T1 and T2 to control the time at which the client contacts with the server to extend the lifetimes on any addresses in the IA NA before the lifetimes expire After T1 the client sends the server S1 from which the addresses in the IA NA were obtained a Renew message If the time T2 is reached and the server does not respond the client sends a Rebind message to any available server S2 For an IA TA the client may send a Renew or Rebind message at the client s discretion T2 Tl OF l l Re Ren Re i Rene r eut pee sea TO S2 ew Renew new je quce cd T to S DHCP Relay Agent A DHCP relay agent is on the same network as the DHCP clients and helps forward messages between the DHCP server and clients When a client cannot use its link local address and a well known multicast address to locate a DHCP server on its network it then needs a DHCP relay agent to send a message to a DHCP server that is not attached to the same network The DHCP relay agent can add the remote identification remote ID option and the interface ID option to the Relay Forward DHCPv6
186. or WLAN There are two types of antennas used for wireless LAN applications e Omni directional antennas send the RF signal out in all directions on a horizontal plane The coverage area is torus shaped like a donut which makes these antennas ideal for a room environment With a wide coverage area it is possible to make circular overlapping coverage areas with multiple access points NWA1120 Series User s Guide Appendix E Wireless LANs e Directional antennas concentrate the RF signal in a beam like a flashlight does with the light from its bulb The angle of the beam determines the width of the coverage pattern Angles typically range from 20 degrees very directional to 120 degrees less directional Directional antennas are ideal for hallways and outdoor point to point applications Positioning Antennas In general antennas should be mounted as high as practically possible and free of obstructions In point to point application position both antennas at the same height and in a direct line of sight to each other to attain the best performance For omni directional antennas mounted on a table desk and so on point the antenna up For omni directional antennas mounted on a wall or ceiling point the antenna down For a single AP application place omni directional antennas as close to the center of the coverage area as possible For directional antennas point the antenna in the direction of the desired coverage area E N
187. our computer s IP address 11 8 3 Back to Factory Defaults Pressing the Reset button in this section clears all user entered configuration information and returns the NWA to its factory defaults as shown on the screen The following screen will appear Figure 67 Reset Message Configuration File Rebooting AP is rebooting now system will back to factory defaults As there will be no indication of when the process is complete please wait for 52 seconds before attempting to access AP again You can also press the RESET button to reset your NWA to its factory default settings Refer to Section 2 3 on page 20 for more information 11 9 Restart Screen Use this screen to reboot the NWA without turning the power off Click Maintenance gt Restart The following screen displays Figure 68 Maintenance Restart Restart System Restart Click to have the device perform a software The SYS LED blinks as the device restarts and then stays steady off ifthe restart is successful Wait 80 sec before logging into the device again Click Restart to have the NWA reboot This does not affect the NWA s configuration NWA1120 Series Users Guide 117 Troubleshooting This chapter offers some suggestions to solve problems you might encounter The potential problems are divided into the following categories e Power Hardware Connections and LEDs e NWA Access and Login e Internet Access e Wireless LAN 12 1 Pow
188. ow NWA1120 Series User s Guide 137 Appendix A Setting Up Your Computer s IP Address Verifying Settings Check your TCP IP properties by clicking Applications gt Utilities gt Network Utilities and then selecting the appropriate Network I nterface from the I nfo tab Figure 69 Mac OS X 10 4 Network Utility eoe Network Utility info Netstat AppleTalk Ping Lookup Traceroute Whois Finger Port Scan iaterface for information Network Interface en0 i Transfer Statistics Hardware Address 00 16 cb 8b 50 2e Sent Packets 20607 IP Address es 118 169 44 203 Send Errors 0 Link Speed 100 Mb Recv Packets 22626 Link Status Active Recv Errors 0 Vendor Marvell Collisions 0 Model Yukon Gigabit Adapter 88E8053 Mac OS X 10 5 and 10 6 1 The screens in this section are from Mac OS X 10 5 but can also apply to 10 6 Click Apple System Preferences Finder File Edit Viev About This Mac Software Update Mac OS X Software ee System Preferences UO gt Recent Items b Force Quit EO Sleep Restart Shut Down NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address 2 In System Preferences click the Network icon Personal c ow M B uU o Q Appearance Desktop amp Expos amp International Security Spotlight Screen Saver Spaces Hardware E V o S a CDs amp DVDs Displays Energy Dist amp Print amp Fax Saver Mouse I
189. pliant WLAN devices to associate with the NWA The transmission rate of your NWA might be reduced e 802 11b g n to allow IEEE802 11b IEEE802 11g and IEEE802 11n compliant WLAN devices to associate with the NWA The transmission rate of the NWA might be reduced e 802 11n to allow only IEEE802 11n compliant WLAN devices to associate with the NWA If you are in the Wireless LAN gt Wireless Settings 5G screen you can select from the following e 802 11a n to allow IEEE802 11a and IEEE802 11n compliant WLAN devices to associate with the NWA e 802 11a to allow only IEEE802 11a compliant WLAN devices to associate with the NWA e 802 11n to allow only IEEE802 11n compliant WLAN devices to associate with the NWA e 802 11a n ac to allow IEEE802 11a IEEE802 11n and IEEE802 11ac compliant WLAN devices to associate with the NWA The transmission rate of the NWA might be reduced Channel Select the operating frequency channel depending on your particular region from the drop down list box Channel Width This field displays only when you select 802 11n 802 11a n 802 11b g n or 802 11a n ac in the Wireless Mode field A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a 40MHz channel uses two standard channels and offers speeds of up to 300Mbps However not all devices support 40MHz channels Select the channel bandwidth you want to use for your wireless network Select 20MHz if you want to les
190. re the NWA s time based on your local time zone see Section 11 6 on page 114 Use the Firmware Upgrade screen to upload the latest firmware for your NWA see Section 11 7 on page 115 e Use the Configuration File screen to view information related to factory defaults backup configuration and restoring configuration see Section 11 8 on page 116 e Use the Restart screen to reboot the NWA without turning the power off see Section 11 9 on page 117 NWA1120 Series User s Guide EN Chapter 11 Maintenance 11 3 What You Need To Know You can find the firmware for your device at www zyxel com It is a file that uses the system project code with a bin extension for example V100AAEOO bin The upload process uses HTTP Hypertext Transfer Protocol and may take up to two minutes After a successful upload the system will reboot 11 4 General Screen Use the General screen to identify your NWA over the network Click Maintenance General The following screen displays Figure 59 Maintenance gt General General System Settings System Name max 15 alphanumeric printable characters and no spaces The following table describes the labels in this screen Table 34 Maintenance General LABEL DESCRIPTION System Settings System Name Type a descriptive name to identify the NWA in the Ethernet network This name can be up to 15 alphanumeric characters long Spaces are not allowed but
191. rity RADIUS MAC Filter Basic Settings Wireless LAN Interface Operation Mode Wireless Mode Channel Channel Width Select SSID Profile Active 1 3 a 5 Dj 7 Lj Advanced Settings Beacon Interval DTIM Interval Output Power Preamble Type RTS CTS Threshold Extension Channel Protection Mode A MPDU Aggregation Short Gl MCS Rate Auto 0 Enabled v Enabled MBSSID 802 11b gin 6 20MHZ Profile Profile vl Profile2 v Profile iv Profile v 100 4 Full Dynamic 2346 None Y Enabled Y Enabled x v i xj Active Profile 2 Profile v 4 Profile v 6 Profile1 x 8 1 Profile1 x 25 1000 ms 1 15 x x 1 2346 The following table describes the labels in this screen Table 14 Wireless LAN gt Wireless Settings MBSSID LABEL DESCRIPTION Basic Settings Wireless LAN Select the check box to turn on the wireless LAN on the NWA Interface Operation Mode Select MBSSI D from the drop down list NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 14 Wireless LAN gt Wireless Settings MBSSID continued LABEL DESCRIPTION Wireless Mode If you are in the Wireless LAN gt Wireless Settings or Wireless LAN gt Wireless Settings 2 4G screen you can select from the following e 802 11b g to allow both IEEE802 11b and IEEE802 11g com
192. rity Mode WPA2 v Data Encryption AES v IEEE802 1X Authentication Eap Type TLS x User Information Login Name Certificate User Certificate Password Back Apply Cancel NWA1120 Series User s Guide TT Chapter 6 Wireless LAN The following table describes the labels in this screen Table 19 Security WPA WPA2 for Wireless Client LABEL DESCRIPTION Security Settings Profile Name This is the name that identifying this profile Security Mode Choose the same security mode used by the AP Data Encryption This shows the encryption method used by the NWA IEEE802 1x Authentication Eap Type The options on the left refer to EAP methods You can choose either TLS LEAP PEAP or TTLS If you select TTLS or PEAP the options on the right refer to authentication protocols You can choose between PAP CHAP MSCHAP MSCHAPv2 and or GTC User Information Username Supply the user name of the account created in the RADIUS server Login Name Password Supply the password of the account created in the RADIUS server Certificate User Certificate If you select TLS enter the name of the certificate used to to verify the identity of clients Back Click Back to return to the previous screen Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh 6 6 3 Security WPA PSK WPA2
193. ro Configuration wireless client However you must run Windows XP to use it WPA 2 with RADIUS Application Example To set up WPA 2 you need the IP address of the RADIUS server its port number default is 1812 and the RADIUS shared secret A WPA 2 application example with an external RADIUS server looks as follows A is the RADIUS server DS is the distribution system 1 The AP passes the wireless client s authentication request to the RADIUS server 2 The RADIUS server then checks the user s identification against its database and grants or denies network access accordingly 3 A256 bit Pairwise Master Key PMK is derived from the authentication process by the RADIUS server and the client 4 The RADIUS server distributes the PMK to the AP The AP then sets up a key hierarchy and management system using the PMK to dynamically generate unique data encryption keys The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients Figure 95 WPA 2 with RADIUS Application Example n INTERNEJ WPA 2 PSK Application Example A WPA 2 PSK application looks as follows NWA1120 Series User s Guide Appendix E Wireless LANs First enter identical passwords into the AP and all wireless clients The Pre Shared Key PSK must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters including spaces and symbols The AP checks each wireless clie
194. rview Wireless security is vital to your network to protect wireless communication between wireless clients access points and the wired network Wireless security methods available on the NWA are data encryption wireless client authentication restricting access by device MAC address and hiding the NWA identity The following figure shows the relative effectiveness of these wireless security methods available on your NWA Table 56 Wireless Security Levels SECURITY LEVEL SECURITY TYPE Least Unique SSID Default Secure Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802 1x EAP with RADIUS Server Authentication Wi Fi Protected Access WPA WPA2 Most Secure Note You must enable the same wireless security settings on the NWA and on all wireless clients that you want to associate with it IEEE 802 1x In June 2001 the IEEE 802 1x standard was designed to extend the features of IEEE 802 11 to support extended authentication as well as providing additional accounting and control features It is supported by Windows XP and a number of network devices Some advantages of IEEE 802 1x are e User based identification that allows for roaming e Support for RADIUS Remote Authentication Dial In User Service RFC 2138 2139 for centralized user profile and accounting management on a network RADIUS server e Support for EAP Extensible Authentication Protocol RFC 2486
195. s adapter installed on your computer is IEEE 802 11 compatible and supports the same wireless standard as the NWA 4 Make sure your computer with a wireless adapter installed is within the transmission range of the NWA NWA1120 Series User s Guide 121 Chapter 12 Troubleshooting 5 Check that both the NWA and your wireless client are using the same wireless and wireless security settings 122 NWA1120 Series User s Guide Setting Up Your Computer s IP Address Note Your specific NWA may not support all of the operating systems described in this appendix See the product specifications for more information about which operating systems are supported This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network Windows Vista XP 2000 Mac OS 9 OS X and all versions of UNIX LINUX include the software components you need to use TCP IP on your computer If you manually assign IP information instead of using a dynamic IP make sure that your network s computers have IP addresses that place them in the same subnet In this appendix you can set up an IP address for e Windows XP NT 2000 on page 123 e Windows Vista on page 127 e Windows 7 on page 131 e Mac OS X 10 3 and 10 4 on page 135 e Mac OS X 10 5 and 10 6 on page 138 e Linux Ubuntu 8 GNOME on page 141 e Linux openSUSE 10 3 KDE on page 145 Windows XP NT
196. s the NWA through any interface using Telnet Secured Client IP Address A secured client is a trusted computer that is allowed to communicate with the NWA using this service Select All to allow any computer to access the NWA using this service Choose Selected to just allow the computer with the IP address that you specify to access the NWA using this service Secured Client MAC Address Select All to allow any computer to access the NWA using this service Choose Selected to just allow the computer with the MAC address that you specify to access the NWA using this service Apply Click Apply to save your customized settings Cancel Click Cancel to begin configuring this screen afresh NWA1120 Series User s Guide Chapter 9 System 9 7 SNMP Screen Use this screen to have a manager station administrate your NWA over the network and configure SNMP accounts on the SNMP v3 manager An SNMP administrator user is an SNMP manager To change your NWA s SNMP settings click System SNMP The following screen displays Figure 52 System gt SNMP Server Access Disable x Secured Client IP Address 9 Al Selected 0 0 0 0 Secured Client MAC Address 9 Al O Selected 00 00 00 00 00 00 SNMP Configuration Protocol Version V3 iv Get Community public Set Community private Trap Community private Trap Destination 192 468 110 SNM
197. sabled v Qos WMM vl BSSID VLAN ID 1 E g 1 4094 Number of Wireless Stations Allowed to 64 1 64 Associate Hidden SSID Enabled Intra BSS Traffic Blocking v Enabled NWA1120 Series User s Guide Chapter 4 Tutorial 11 Go to Wireless LAN gt Security Click the Edit icon next to SecProfile1 Security Profiles Profile Name Security Mode Modify 1 SecProfile1 None 2 SecProfile2 None Ei 3 SecProfile3 None P d 4 SecProfile4 None 4 5 SecProfile5 None 3 6 SecProfile6 None 3 7 SecProfile7 None 4 8 SecProfile8 None 4 12 Configure WPA PSK as the Security Mode and enter ThisisMyPreSharedKey in the Pre Shared Key field 13 Click Apply to finish configuration for NWA A Security Settings Profile Name SecProfile1 4 3 3 Configuring the NWA in Wireless Client Mode The NWA B should have a wired connection before it can be set to wireless client operating mode Connect your NWA to the FTP server Login to NWA B s Web Configurator and go to the Wireless LAN gt Wireless Settings screen Follow these steps to configure station B NWA1120 Series User s Guide EB Chapter 4 Tutorial 1 2 3 Select Client as Operation Mode Click Apply Basic Settings Wireless LAN Interface Enabled SSID Profile Profile x Channel 6 iv Channel Width 20mHz v Advanced Settings Output Power Full iv Preamble Type Dynamic v RTS CTS
198. same encryption key is never used twice The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the PMK to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients This all happens in the background automatically The Message Integrity Check MIC is designed to prevent an attacker from capturing data packets altering them and resending them The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC If they do not match it is assumed that the data has been tampered with and the packet is dropped By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism MIC with TKIP and AES it is more difficult to decrypt data on a Wi Fi network than WEP and difficult for an intruder to break into the network The encryption mechanisms used for WPA 2 and WPA 2 PSK are the same The only difference between the two is that WPA 2 PSK uses a simple common password instead of user specific credentials The common password approach makes WPA 2 PSK susceptible to brute force password guessing attacks but it s still an improvement over WEP as it employs a consistent single alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys
199. screen Click Tools then click Options in the screen that appears Figure 83 Mozilla Firefox TOOLS gt Options IEEE Help Web Search Ctril K Downloads Ctr 3 Add ons Web Developer Error Console Adblock Plus Ctrii ShifE A Page Info FireFTP Clear Private Data Ctrl Shift Del Tab Mix Plus Options i Session Manager NWA1120 Series User s Guide Appendix B Pop up Windows JavaScript and Java Permissions Click Content to show the screen below Select the check boxes as shown in the following screen Figure 84 Mozilla Firefox Content Security Bod 4 Se vy HN a m oU Main Tabs Feeds Privacy Security Advanced w Block pop up windows Exceptions IV Load images automatically Exceptions IV Enable JavaScript Advanced IV Enable Java J r Fonts amp Colors Default Font Times New Roman Size 16 v Advanced Colors J r File Types Configure how Firefox handles certain types of files Manage NN Opera Opera 10 screens are used here Screens for other versions may vary slightly NWA1120 Series User s Guide Appendix B Pop up Windows JavaScript and Java Permissions Allowing Pop Ups From Opera click Tools then Preferences In the General tab go to Choose how you prefer to handle pop ups and select Open all pop ups Figure 85 Opera Allowing Pop Ups General Forms Search Web Pages
200. screen to configure the NWA s operation mode see Section 6 4 on page 57 Uee the SSID screen to configure up to eight SSID profiles for your NWA see Section 6 5 on page 71 Use the Security screen to choose the wireless security mode for your NWA see Section 6 6 on page 73 Use the RADI US screen if you want to authenticate wireless users using a RADIUS Server and or accounting server see Section 6 7 on page 79 Use the Layer 2 Isolation screen to configure the MAC addresses of the devices that you want to allow the associated wireless clients to have access to when layer 2 isolation is enabled see Section 6 8 on page 81 NWA1120 Series User s Guide 52 Chapter 6 Wireless LAN e Use the MAC Filter screen to specify which wireless station is allowed or denied access to the NWA see Section 6 9 on page 83 6 3 What You Need To Know BSS A Basic Service Set BSS exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point AP Intra BSS traffic is traffic between wireless clients in the BSS ESS An Extended Service Set ESS consists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution System DS Operating Mode The NWA can run in four operating modes as follows e Root AP The NWA is a wirele
201. sen radio interference with other wireless devices in your neighborhood or the wireless clients do not support channel bonding Select SSID The SSID Service Set IDentifier identifies the Service Set with which a wireless station is Profile associated Wireless stations associating to the access point AP must have the same SSID You can have up to eight SSIDs active at the same time Note If you are configuring the NWA from a computer connected to the wireless LAN and you change the NWA s SSID or security settings you will lose your wireless connection when you press Apply to confirm You must then change the wireless settings of your computer to match the NWA s new settings This is the index number of each SSID profile Activve Select the check box to enable an SSID profile Otherwise clear the check box Profile Select an SSID Profile from the drop down list box Advanced Settings Beacon Interval When a wirelessly network device sends a beacon it includes with it a beacon interval This specifies the time period before the device sends the beacon again The interval tells receiving devices on the network how long they can wait in lowpower mode before waking up to handle the beacon A high value helps save current consumption of the access point DTIM Interval Delivery Traffic Indication Message DTIM is the time period after which broadcast and multicast packets are transmitted to mobile clients in the Active
202. ss 6 Thelnternet Protocol Version 4 TCP IPv4 Properties window opens gt Internet Protocol Version 4 TCP IP v4 Properties x General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings 7 Obtain an IP address automatically IP address 192 188 Li 7 Subnet mask DO ake B Default gateway Use the following DNS server addresses Preferred DNS server Alternate DNS server F Validate settings upon exit PETS 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically Select Use the following I P Address and fill in the IP address Subnet mask and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided Click Advanced if you want to configure advanced settings for IP DNS and WINS 8 Click OK to close the Internet Protocol TCP I P Properties window 9 Click OK to close the Local Area Connection Properties window Verifying Settings 1 Click Start gt All Programs gt Accessories gt Command Prompt 2 Inthe Command Prompt window type ipconfig and then press ENTER NWA1120 Series User s Guide Appendix A Setting Up
203. ss access point that allows wireless communication to other devices in the network e Repeater The NWA acts as a wireless repeater and increase a root AP s wireless coverage area e Client The NWA acts as a wireless client to access a wireless network e MBSSID The Multiple Basic Service Set Identifier MBSSID mode allows you to use one access point to provide several BSSs simultaneously Refer to Chapter 1 on page 10 for illustrations of these wireless applications SSID The SSID Service Set IDentifier is the name that identifies the Service Set with which a wireless station is associated Wireless stations associating to the access point AP must have the same SSID In other words it is the name of the wireless network that clients use to connect to it Normally the NWA acts like a beacon and regularly broadcasts the SSID in the area You can hide the SSID instead in which case the NWA does not broadcast the SSID In addition you should change the default SSID to something that is difficult to guess This type of security is fairly weak however because there are ways for unauthorized wireless devices to get the SSID In addition unauthorized wireless devices can still see the information that is sent in the wireless network NWA1120 Series User s Guide 53 Chapter 6 Wireless LAN Channel A channel is the radio frequency ies used by wireless devices Channels available depend on your geographical area You ma
204. ssignment Enable Stateful Select this to turn on IPv6 stateful autoconfiguration to have the NWA obtain an IPv6 Address Auto global address from a DHCPv6 server in your network configuration IPv6 Address Prefix Enter your IPv6 address and prefix manually Length System DNS Servers Primary DNS Server Enter the IPv4 address of the first DNS Domain Name Service server if provided Secondary DNS Server Enter the IPv4 address of the second DNS Domain Name Service server address if provided Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh NWA1120 Series User s Guide VLAN 8 1 Overview This chapter discusses how to configure the NWA s VLAN settings Figure 43 Management VLAN Setup ms ed kcu bg ma vem aum In the figure above to access and manage the NWA from computer A the NWA and switch B s ports to which computer A and the NWA are connected should be in the same VLAN 8 1 1 What You Can Do in This Chapter The VLAN screens let you set up the NWA s mangement VLAN Section 8 3 on page 93 8 2 What You Need to Know Introduction to VLANs A Virtual Local Area Network VLAN allows a physical network to be partitioned into multiple logical networks Devices on a logical network belong to one group A device can belong to more than one group With VLAN a device cannot directly talk to or hear from devices that are not in the same group s the tr
205. stores the neighbor s link layer address in the neighbor cache When the NWA uses a router solicitation message to query for a router and receives a router advertisement message it adds the router s information to the neighbor cache prefix list and destination cache The NWA creates an entry in the default router list cache if the router can be used as a default router When the NWA needs to send a packet it first consults the destination cache to determine the next hop If there is no matching entry in the destination cache the NWA uses the prefix list to NWA1120 Series User s Guide Appendix D IPv6 determine whether the destination address is on link and can be reached directly without passing through a router If the address is onlink the address is considered as the next hop Otherwise the NWA determines the next hop from the default router list or routing table Once the next hop IP address is known the NWA looks into the neighbor cache to get the link layer address and sends the packet when the neighbor is reachable If the NWA cannot find an entry in the neighbor cache or the state for the neighbor is not reachable it starts the address resolution process This helps reduce the number of IPv6 solicitation and advertisement messages Multicast Listener Discovery The Multicast Listener Discovery MLD protocol defined in RFC 2710 is derived from IPv4 s Internet Group Management Protocol version 2 IGMPv2 MLD uses ICMPv6 mess
206. t Long if you are unsure what preamble mode the wireless adapters support and to provide more reliable communications in busy wireless networks RTS CTS Threshold Request To Send The threshold number of bytes for enabling RTS CTS handshake Data with its frame size larger than this value will perform the RTS CTS handshake Setting this attribute to be larger than the maximum MSDU MAC service data unit size turns off the RTS CTS handshake Setting this attribute to its smallest value 1 turns on the RTS CTS handshake Fragmentation The threshold number of bytes for the fragmentation boundary for directed messages It is the maximum data fragment size that can be sent Aggregation Extension You can use CTS to self or RTS CTS protection mechanism to reduce conflicts with other Channel wireless networks or hidden wireless clients The throughput of RTS CTS is much lower Protection Mode than CTS to self Using this mode may decrease your wireless performance A MPDU This field is available only when 802 11n 802 11b g n 802 11a n or 802 11a n ac is selected as the Wireless Mode Select to enable A MPDU aggregation Message Protocol Data Unit MPDU aggregation collects Ethernet frames along with their 802 11n headers and wraps them in a 802 11n MAC header This method is useful for increasing bandwidth throughput in environments that are prone to high error rates Short GI This field is available o
207. t Obtain an I P address automatically if your network administrator or ISP assigns your IP address dynamically Select Use the following I P Address and fill in the IP address Subnet mask and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP You may also have to enter a Preferred DNS server and an Alternate DNS server if that information was provided Click Advanced Click OK to close the Internet Protocol TCP I P Properties window 10 Click OK to close the Local Area Connection Properties window Verifying Settings 1 2 Click Start gt All Programs gt Accessories gt Command Prompt In the Command Prompt window type ipconfig and then press ENTER You can also go to Start gt Control Panel gt Network Connections right click a network connection click Status and then click the Support tab to view your IP address and connection information NWA1120 Series User s Guide Appendix A Setting Up Your Computer s IP Address Windows 7 This section shows screens from Windows 7 Enterprise 1 Click Start Control Panel ES Snipping Tool Cs Calculator lt a XPS Viewer ap Windows Fax and Scan Magnifier Computer Control Panel Devices and Printers Default Programs Help and Support gt All Programs 2 Inthe Control Panel click View network status and tasks under the Network and I nternet c
208. t http www zyxel com web support_warranty_info php Registration Register your product online to receive e mail notices of firmware upgrades and information at www zyxel com NWA1120 Series User s Guide Appendix G Legal Information Open Source Licenses This product contains in part some free software distributed under GPL license terms and or GPL like licenses Open source licenses are provided with the firmware package You can download the latest firmware at www zyxel com If you cannot find it there contact your vendor or ZyXEL Technical Support at support zyxel com tw To obtain the source code covered under those Licenses please contact your vendor or ZyXEL Technical Support at support zyxel com tw Regulatory Information European Union The following information applies if you use the product within the European Union Declaration of Conformity with Regard to EU Directive 1999 5 EC R amp TTE Directive Compliance Information for 2 4GHz and 5GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R amp TTE Directive Czech ZyXEL t mto prohla uje Ze tento za zen je ve shod se z kladn mi po adavky a dal mi p slu n mi ustanoven mi sm rnice 1999 5 EC Danish Undertegnede ZyXEL erkl rer herved at f lgende udstyr udstyr overholder de v sentlige krav og vrige relevante krav i direktiv 1999
209. t make sure that no other device on your network is using that IP address The subnet mask specifies the network number portion of an IP address Your NWA will compute the subnet mask automatically based on the IP address that you entered You don t need to change the subnet mask computed by the NWA unless you are instructed to do otherwise Private IP Addresses Every machine on the Internet must have a unique address If your networks are isolated from the Internet running only between two branch offices for example you can assign any IP addresses to the hosts without problems However the Internet Assigned Numbers Authority IANA has reserved the following three blocks of IP addresses specifically for private networks e 10 0 0 0 10 255 255 255 e 172 16 0 0 172 31 255 255 e 192 168 0 0 192 168 255 255 You can obtain your IP address from the IANA from an ISP or it can be assigned from a private network If you belong to a small organization and your Internet access is through an ISP the ISP can provide you with the Internet addresses for your local networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Regardless of your particular situation do not create an arbitrary IP address always follow the guidelines above For more information on address assignment please refer to RFC 1597 Address Allocation for Private Internets
210. tended service sets ESS This is the index number of the channel currently used by the associated AP in an Infrastructure wireless network or wireless station in an Ad Hoc wireless network Channel MAC Address This field displays the MAC address of the AP in an Infrastructure wireless network It is randomly generated so ignore it in an Ad Hoc wireless network Wireless Mode This is the IEEE 802 1x standard used by the wireless network This field displays the strength of the AP s signal If you must choose a channel that is currently in use choose one with low signal strength for minimum interference Signal Strength Security This is the wireless security method used by the wireless network to protect wireless communication between wireless stations access points and the wired network Refresh Click Refresh to reload the screen NWA1120 Series User s Guide Wireless LAN 6 1 Overview This chapter discusses the steps to configure the Wireless Settings screen on the NWA It also introduces the wireless LAN WLAN and some basic scenarios Figure 19 Wireless Mode In the figure above the NWA allows access to another bridge device A and a notebook computer B upon verifying their settings and credentials It denies access to other devices C and D with configurations that do not match those specified in your NWA 6 2 What You Can Do in this Chapter e Use the Wireless Settings
211. terface ath0 MAC 40 36 d9 cc 03 28 hostapd Stationhasassociated Interface ath0 MAC 40 a6 d9 cc 03 28 hostapd Stationhasdisassociated Interface athO MAC 40 a6 d9 cc 03 28 hostapd Stationhasassociated Interface athO MAC 40 a6 d9 cc 03 28 The following table describes the labels in this screen Table 6 Logs LABEL DESCRIPTION Display Select a category of logs to view Select All Log to view logs from all of the log categories that you selected in the Configuration gt Log Settings screen E Mail Log Now Click E Mail Log Now to send the log screen to the e mail address specified in the Log Settings page make sure that you have first filled in the E mail Log Settings fields in Configuration gt Log Settings Refresh Click Refresh to renew the log screen Clear Log Click Clear Log to delete all the logs This field is a sequential value and is not associated with a specific entry Time This field displays the time the log was recorded Message This field states the reason for the log Source This field lists the source IP address and the port number of the incoming packet 5 4 Statistics Use this screen to view read only information including 802 11 Mode Channel ID Retry Count and FCS Error Count Also provided is the poll interval The Poll Interval field is configurable and is used for refreshing the screen NWA1120 Series User s Guide Chapter 5 Monitor Click M
212. tering Disabled v QoS WMM ivl BSSID VLAN ID 1 1 4094 Number of Wireless Stations Allowed to 64 1 64 Associate Hidden SSID Enabled Intra BSS Traffic Blocking C Enabled Enable Layer 2 Isolation Enabled The following table describes the labels in this screen Table 16 SSID Edit LABEL DESCRIPTION Profile Name This is the name that identifying this profile SSID When a wireless client scans for an AP to associate with this is the name that is broadcast and seen in the wireless client utility Security Select a security profile to use with this SSID profile See Section 6 6 on page 73 for more information If you do not want this profile to use wireless security select Disabled RADIUS Select a RADIUS profile from the drop down list box if you have a RADIUS server configured If you do not need to use RADIUS authentication ignore this field See Section 6 7 on page 79 for more information MAC Filtering Select a MAC filter profile from the drop down list box If you do not want to use MAC filtering on this profile select Disabled 72 NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 16 SSID Edit continued LABEL DESCRIPTION QoS Select the Quality of Service priority for this BSS s traffic e If you select WMM from the QoS list the priority of a data packet depends on the packet s IEEE 802 1q or DSCP header If a packet has no WMM value assigned to it it
213. this screen to configure up to eight SSID profiles for your NWA Security Use this screen to configure wireless security profiles on the NWA RADIUS Use this screen to configure up to four RADIUS profiles Layer 2 Isolation Use this screen to configure the MAC addresses of the devices that you want to allow the associated wireless clients to have access to when layer 2 isolation is enabled MAC Filter Use this screen to configure MAC filtering profiles LAN IP Use this screen to configure the NWA s LAN IP address VLAN Use this screen to configure the NWA s VLAN settings System WWW Use this screen to configure through which interface s and from which IP address es users can use HTTP to manage the NWA Certificates Use this screen to import or remove a certificate from the NWA Telent Use this screen to configure through which interface s and from which IP address es users can use Telnet to manage the NWA SNMP Use this screen to configure the NWA for SNMP management FTP Use this screen to configure through which interface s and from which IP address es users can use FTP to access the NWA Log Settings Use this screen to change your log settings Maintenance General Use this screen to configure your device s name Password Use this screen to configure your device s password Time Use this screen to change your NWA s time and date Firmware Upgrade Use this screen to upload firmware to your devic
214. tication enter the username here Password Enter the password associated with the above username Syslog Logging Syslog logging sends a log to an external syslog server used to store logs Syslog Logging Select the check box to enable syslog logging Syslog Server IP Address Enter the IP address of the syslog server that will log the selected categories of logs Send Log Syslog Port Number Enter the port number of the syslog server that will log the selected categories of logs Log Schedule This drop down menu is used to configure the frequency of log messages being sent as E mail e When Log is Full e Hourly e Daily e Weekly e None If the Weekly or the Daily option is selected specify a time of day when the E mail should be sent If the Weekly option is selected then also specify which day of the week the E mail should be sent If the When Log is Full option is selected an alert is sent when the log fills up If you select None no log messages are sent Log Day for Sending This field is only available when you select Weekly in the Log Schedule field Use the drop down list box to select which day of the week to send the logs Log Time for Sending Enter the time of the day in 24 hour format for example 23 00 equals 11 00 pm to send the logs Clear log after sending mail Select the check box to clear all logs after logs and alert messages are sent via e m
215. tifying this profile Security Mode Choose WPA WPA2 or WPA MIX in this field Rekey Options NWA1120 Series User s Guide Chapter 6 Wireless LAN Table 18 Security WPA WPA2 for Access Point continued LABEL DESCRIPTION Reauthentication Specify how often wireless stations have to resend user names and passwords in order to Time stay connected Enter a time interval between 100 and 3600 seconds Alternatively enter 0 to turn reauthentication off Note If wireless station authentication is done using a RADIUS server the reauthentication timer on the RADIUS server has priority Enable Group Key Select this option to have the NWA automatically disconnect a wireless station from the Update wired network after a period of inactivity The wireless station needs to enter the user name and password again before access to the wired network is allowed Enter a time interval between 100 and 3600 seconds Back Click Back to return to the previous screen Apply Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh 6 6 2 2 Wireless Client Use this screen to employ WPA or WPA2 as the security mode for your NWA that is in wireless client operating mode Select WPA or WPA2 in the Security Mode field to display the following screen Figure 32 Security WPA for Wireless Client Security Security Settings Profile Name SecProfile1 Secu
216. to the correct ports Place connecting cables carefully so that no one will step on them or stumble over them Always disconnect all cables from this device before servicing or disassembling Use ONLY an appropriate power adaptor or cord for your device Connect it to the right supply voltage for example 110V AC in North America or 230V AC in Europe Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution If the power adaptor or cord is damaged remove it from the device and the power source Do NOT attempt to repair the power adaptor or cord Contact your local vendor to order a new one Do not use the device outside and make sure all the connections are indoors There is a remote risk of electric shock from lightning Do NOT obstruct the device ventilation slots as insufficient airflow may harm your device Antenna Warning This device meets ETSI and FCC certification requirements when using the included antenna s Only use the included antenna s If you wall mount your device make sure that no electrical lines gas or water pipes will be damaged The PoE Power over Ethernet devices that supply or receive power and their connected Ethernet cables must all be completely indoors This product is for indoor use only utilisation int rieure exclusivement FOR
217. tting A ih i EK t I UN i Internet a I J a m IM 192 168 1 0 25 4 8192 168 1 128 HT amumumumumum um um 9 e oum um um um um um m Ls In a 25 bit subnet the host ID has 7 bits so each sub network has a maximum of 27 2 or 126 possible hosts a host ID of all zeroes is the subnet s address itself all ones is the subnet s broadcast address 192 168 1 0 with mask 255 255 255 128 is subnet A itself and 192 168 1 127 with mask 255 255 255 128 is its broadcast address Therefore the lowest IP address that can be assigned to an actual host for subnet A is 192 168 1 1 and the highest is 192 168 1 126 Similarly the host ID range for subnet B is 192 168 1 129 to 192 168 1 254 Four Subnets The previous example illustrated using a 25 bit subnet mask to divide a 24 bit address into two subnets Similarly to divide a 24 bit address into four subnets you need to borrow two host ID bits to give four possible combinations 00 01 10 and 11 The subnet mask is 26 bits 11111111 11111111 11111111 11000000 or 255 255 255 192 Each subnet contains 6 host ID bits giving 29 2 or 62 hosts for each subnet a host ID of all zeroes is the subnet itself all ones is the subnet s broadcast address Table 43 Subnet 1 IP SUBNET MASK NETWORK NUMBER Tite aaa IP Address Decimal 192 168 1 0 IP Address Binary 11000000 10101000 00000001 00000000 Subnet Mask Binary 1111
218. twork status and tasks L Change keyboards or other input methods Set up file sharing Change display language Click the Network and Sharing Center icon G gt Control Panel Network and Internet p v 41 Search p File Edit View Tools Help Control Panel Home 7 p Aa Network and Sharing Center nnect to a network System and Maintenance View network computers and devices Add a device to the network Set up file sharing Security Network and Internet pelea ies 7M Internet Options Hardware and Sound Connecttothelnternet Changeyourhomepage Manage browser add ons Programs Delete browsing history and cookies NWA1120 Series User s Guide 127 Appendix A Setting Up Your Computer s IP Address 4 Click Manage network connections CION Network and Internet p Network and Sharing Center v gt File Edit View Tools Help Tasks 4 a Network and Sharing Center View computers and devices Connect to a network Set up a cannertian ar network A 7 d 9t Manage network connections TWPC99111 Internet Diagnose ana repair This computer aj Not connected 5 Right click Local Area Connection and then select Properties LAN or High Seesd Internet MI Loca Collapse group Left Arrow vH POM Expand all groups Inte Collapse all groups Disable Status Diagnose Bridge Connections Create Shortcut Delete Rename Note During this
219. uced Channel Select the operating frequency channel depending on your particular region from the drop down list box Channel Width This field displays only when you select 802 11n 802 11a n 802 11b g n or 802 11a n ac in the Wireless Mode field A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a 40MHz channel uses two standard channels and offers speeds of up to 300Mbps However not all devices support 40MHz channels Select the channel bandwidth you want to use for your wireless network It is recommended that you select 20 40MHz This allows the NWA to adjust the channel bandwidth depending on network conditions Select 20MHz if you want to lessen radio interference with other wireless devices in your neighborhood or the wireless clients do not support channel bonding Repeater Settings The repeater function allows the NWA in root AP or repeater mode to set up a wireless connection between it and another NWA in root AP or repeater mode Note Repeater security is independent of the security settings between the NWA and any wireless clients Local MAC Local MAC Address is the MAC address of your NWA Address Repeater SSID Select the SSID profile you want to use for repeater connections with an AP or repeater or Profile regular wireless connections with wireless clients Note You can only configure None WPA PSK or WPA2 PSK security mode for the SSID used by a repeater connectio
220. uniquely identifies a device on the local network the LAN It is similar to a private IP address in IPv4 You can have the same link local address on multiple interfaces on a device A link local unicast address has a predefined prefix of fe80 10 The link local unicast address format is as follows Table 50 Link local Unicast Address Format 1111 1110 10 0 Interface ID 10 bits 54 bits 64 bits NWA1120 Series User s Guide 170 Appendix D IPv6 Global Address A global address uniquely identifies a device on the Internet It is similar to a public IP address in IPv4 A global unicast address starts with a 2 or 3 Unspecified Address An unspecified address 0 0 0 0 0 0 0 0 or is used as the source address when a device does not have its own address It is similar to 0 0 0 0 in IPv4 Loopback Address A loopback address 0 0 0 0 0 0 0 1 or 1 allows a host to send packets to itself It is similar to 127 0 0 1 in IPv4 Multicast Address In IPv6 multicast addresses provide the same functionality as IPv4 broadcast addresses Broadcasting is not supported in IPv6 A multicast address allows a host to send packets to all hosts in a multicast group Multicast scope allows you to determine the size of the multicast group A multicast address has a predefined prefix of ff00 8 The following table describes some of the predefined multicast addresses Table 51 Predefined Multicast Address
221. urces The VoIP network VoIP SSID has access to all resources and a high QoS priority The guest network Guest SSI D has access to the Internet and the network printer only and a low QoS priority NWA1120 Series User s Guide Chapter 4 Tutorial To configure these settings you need to know the Media Access Control MAC addresses of the devices you want to allow users of the guest network to access The following table shows the addresses used in this example Table5 Tutorial Example Information Network router A MAC address 00 AA 00 AA 00 AA Network printer B MAC address AA 00 AA 00 AA 00 4 2 1 Configure the SSID Profiles 1 Log in to the NWA see Section 2 2 on page 18 Click Wireless LAN gt SSID The SSID screen appears 2 Click the Edit icon next to the Profile1 Profile Settings Profile Name SSID 1 Profile ZyXEL 2 Profile2 ZyXEL 3 Profile3 ZyXEL 4 Profile4 ZyXEL 5 Profile5 ZyXEL 6 Profile6 ZyXEL 7 Profile7 ZyXEL 8 Profiles ZyXEL Security RADIUS Qos MAC Filter Modify Disabled RadProfile1 WMM Disabled Disabled RadProfile1 WMM Disabled 3 Disabled RadProfile1 WMM Disabled s Disabled RadProfile1 WMM Disabled 3 Disabled RadProfile1 WMM Disabled g Disabled RadProfile1 WMM Disabled g Disabled RadProfile1 WMM Disabled P Disabled RadProfile1 WMM Disabled 2 3 Rename the Profile Name and SSID as SSIDO1 Click Apply Profile Settings Profile Name SSID Security R
222. ure above illustrates one possible setup of your NWA The gateway IPv4 address is 192 168 1 1 and the IPv4 address of the NWA is 192 168 1 2 default The gateway and the device must belong in the same subnet mask to be able to communicate with each other 7 2 What You Can Do in this Chapter Use the LAN IP screen to configure the IP address of your NWA see Section 7 4 on page 90 7 3 What You Need to Know The Ethernet parameters of the NWA are preset in the factory with the following values 1 IP address of 192 168 1 2 2 Subnet mask of 255 255 255 0 24 bits NWA1120 Series User s Guide Chapter 7 LAN IPv6 IPv6 Internet Protocol version 6 is designed to enhance IP address size and features The increase in IPv6 address size to 128 bits from the 32 bit IPv4 address allows up to 3 4 x 1038 IP addresses IPv6 Addressing The 128 bit IPv6 address is written as eight 16 bit hexadecimal blocks separated by colons This is an example IPv6 address 2001 0db8 1a2b 0015 0000 0000 1a2 0000 IPv6 addresses can be abbreviated in two ways e Leading zeros in a block can be omitted So 2001 0db8 1a2b 0015 0000 0000 1a2 0000 can be written as 2001 db8 1a2b 15 0 0 1a2 0 e Any number of consecutive blocks of zeros can be replaced by a double colon A double colon can only appear once in an IPv6 address So 2001 0db8 0000 0000 1a2 0000 0000 0015 can be written as 2001 0db8 1a2 0000 0000 0015 2001 0db8 0000 0000 1a
223. usy networks or networks that are prone to interference NWA1120 Series User s Guide Appendix E Wireless LANs If the Fragmentation Threshold value is smaller than the RTS CTS value see previously you set then the RTS Request To Send CTS Clear to Send handshake will never occur as data frames will be fragmented before they reach RTS CTS size Preamble Type Preamble is used to signal that data is coming to the receiver Short and long refer to the length of the synchronization field in a packet Short preamble increases performance as less time sending preamble means more time for sending data All IEEE 802 11 compliant wireless adapters support long preamble but not all support short preamble Use long preamble if you are unsure what preamble mode other wireless devices on the network support and to provide more reliable communications in busy wireless networks Use short preamble if you are sure all wireless devices on the network support it and to provide more efficient communications Use the dynamic setting to automatically use short preamble when all wireless devices on the network support it otherwise the NWA uses long preamble Note The wireless devices MUST use the same preamble mode in order to communicate Wireless LAN Standards The IEEE 802 11b wireless access standard was first published in 1999 IEEE 802 11b has a maximum data rate of 11 Mbps and uses the 2 4 GHz band IEEE 802 11g also works in th
224. ver IP Address 0000 Server NAME or IP Address Syslog Port Number Send Log Log Schedule When Log is Full x Day for Sending Log Sunday vl Time for Sending Log 0 Hour Minute Clear log after sending mail Enabled Log Category v System Maintenance v 802 1x v System Error v Wireless The following table describes the labels in this screen Table 33 Log Settings LABEL DESCRIPTION E mail Log Settings Mail Server Enter the server name or the IP address of the mail server for the e mail addresses specified below If this field is left blank logs and alert messages will not be sent via e mail Mail Subject Type a title that you want to be in the subject line of the log e mail message that the NWA sends Send Log to Logs are sent to the e mail address specified in this field If this field is left blank logs will not be sent via e mail NWA1120 Series User s Guide Chapter 10 Log Settings Table 33 Log Settings continued LABEL DESCRIPTION SMTP Authentication SMTP Simple Mail Transfer Protocol is the message exchange standard for the Internet Select the check box to activate SMTP authentication If mail server authentication is needed but this feature is disabled you will not receive the e mail logs If you use SMTP authentication the mail receiver should be the owner of the SMTP account User Name If your e mail account requires SMTP authen
225. void interference due to overlap your AP should be on a channel at least five channels away from a channel that an adjacent AP is using For example if your region has 11 channels and an adjacent AP is using channel 1 then you need to select a channel between 6 or 11 RTS CTS A hidden node occurs when two stations are within range of the same access point but are not within range of each other The following figure illustrates a hidden node Both stations STA are within range of the access point AP or wireless gateway but out of range of each other so they NWA1120 Series User s Guide Appendix E Wireless LANs cannot hear each other that is they do not know if the channel is currently being used Therefore they are considered hidden from each other Figure 94 RTS CTS RTS Rang CTS Range Wireless AP CMM Station RTS cni MCN When station A sends data to the AP it might not know that the station B is already using the channel If these two stations send data at the same time collisions may occur when both sets of data arrive at the AP at the same time resulting in a loss of messages for both stations RTS CTS is designed to prevent collisions due to hidden nodes An RTS CTS defines the biggest size data frame you can send before an RTS Request To Send CTS Clear to Send handshake is invoked When a data frame exceeds the RTS CTS value you set between 0 to 2432 bytes the station that wants to trans
226. work devices Your NWA supports SNMP agent functionality which allows a manager station to manage and monitor the NWA through the network The NWA supports SNMP version one SNMPv1 version two SNMPv2c and version three SNMPv3 NWA1120 Series User s Guide Chapter 9 System The next figure illustrates an SNMP management operation Figure 47 SNMP Management Mode MANAGER e LI ie Managed Device Managed Device Managed Device An SNMP managed network consists of two main types of component agents and a manager An agent is a management software module that resides in a managed device the NWA An agent translates the local management information from the managed device into a form compatible with SNMP The manager is the console through which network administrators perform network management functions It executes applications that control and monitor managed devices SNMP allows a manager and agents to communicate for the purpose of accessing information such as packets received node port status etc SNMP v3 and Security SNMP v3 enhances security for SNMP management SNMP managers can be required to authenticate with agents before conducting SNMP management sessions Security can be further enhanced by encrypting the SNMP messages sent from the managers Encryption protects the contents of the SNMP messages When the contents of the SNMP messages are encrypted only the intended recipients can read them Remote Ma
227. workmanship for a specific period the Warranty Period from the date of purchase The Warranty Period varies by region Check with your vendor and or the authorized ZyXEL local distributor for details about the Warranty Period of this product During the warranty period and upon proof of purchase should the product have indications of failure due to faulty workmanship and or materials ZyXEL will at its discretion repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product or components to proper operating condition Any replacement will consist of a new or re manufactured functionally equivalent product of equal or higher value and will be solely at the discretion of ZyXEL This warranty shall not apply if the product has been modified misused tampered with damaged by an act of God or subjected to abnormal working conditions Note Repair or replacement as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitness for a particular use or purpose ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser To obtain the services of this warranty contact your vendor You may also refer to the warranty policy for the region in which you bought the device a
228. y Click Apply to save your changes Cancel Click Cancel to begin configuring this screen afresh 6 6 Wireless Security Screen Use this screen to choose the security mode for your NWA NWA1120 Series User s Guide 73 Chapter 6 Wireless LAN Click Wireless LAN gt Security Select the profile that you want to configure and click Edit Figure 28 Wireless Security Security RADIUS MAC Filter Wireless Settings SSID Security Profiles 3 Profile Name SecProfile1 SecProfile2 SecProfile3 SecProfile4 SecProfile5 SecProfileG SecProfile7 SecProfile8 on c t t HY Security Mode None WPA PSK None None None None None None i y ey Sy Day Gey y sy sy The Security Settings screen varies depending upon the security mode you select Figure 29 Security None Security Settings Profile Name Security Mode SecProfile1 None Note that some screens display differently depending on the operating mode selected in the Wireless LAN gt Wireless Settings Network gt Wireless LAN gt Wireless Settings 2 4G or Network Wireless LAN Wireless Settings 5G screen Note You must enable the same wireless security settings on the NWA and on all wireless clients that you want to associate with it NWA1120 Series User s Guide Chapter 6 Wireless LAN 6 6 1 Security WEP Use this screen to use WEP as the security mode for your
229. y have a choice of channels for your region so you should use a different channel than an adjacent AP access point to reduce interference Wireless Mode The IEEE 802 1x standard was designed to extend the features of IEEE 802 11 to support extended authentication as well as providing additional accounting and control features MBSSID Traditionally you needed to use different APs to configure different Basic Service Sets BSSs As well as the cost of buying extra APs there was also the possibility of channel interference The NWA s MBSSID Multiple Basic Service Set IDentifier function allows you to use one access point to provide several BSSs simultaneously You can then assign varying levels of privilege to different SSIDs Wireless stations can use different BSSIDs to associate with the same AP The following are some notes on multiple BSS e A maximum of four BSSs are allowed on one AP simultaneously e You must use different WEP keys for different BSSs If two stations have different BSSIDs they are in different BSSs but have the same WEP keys they may hear each other s communications but not communicate with each other e MBSSID should not replace but rather be used in conjunction with 802 1x security Wireless Security Wireless security is vital to your network It protects communications between wireless stations access points and the wired network Figure 20 Securing the Wireless Network feres 3 CD M
230. yxel com Thailand e ZyXEL Thailand Co Ltd e http www zyxel co th Vietnam e ZyXEL Communications Corporation Vietnam Office e http www zyxel com vn vi Austria e ZyXEL Deutschland GmbH e http www zyxel de Belarus e ZyXEL BY e http www zyxel by NWA1120 Series User s Guide Appendix F Customer Support Belgium e ZyXEL Communications B V e http www zyxel com be nl Bulgaria e ZyXEL Benrapna e http www zyxel com bg bg Czech e ZyXEL Communications Czech s r o e http www zyxel cz Denmark e ZyXEL Communications A S e http www zyxel dk Estonia e ZyXEL Estonia e http www zyxel com ee et Finland e ZyXEL Communications e http www zyxel fi France e ZyXEL France e http www zyxel fr Germany e ZyXEL Deutschland GmbH e http www zyxel de Hungary e ZyXEL Hungary amp SEE e http www zyxel hu Latvia e ZyXEL Latvia e http www zyxel com lv Iv homepage shtml NWA1120 Series User s Guide Appendix F Customer Support Lithuania e ZyXEL Lithuania e http www zyxel com It It homepage shtml Netherlands e ZyXEL Benelux e http www zyxel nl Norway e ZyXEL Communications e http www zyxel no Poland e ZyXEL Communications Poland e http www zyxel pl Romania e ZyXEL Romania e http www zyxel com ro ro Russia e ZyXEL Russia e http www zyxel ru Slovakia e ZyXEL Communications Czech s r o organizacna zlozka e http www zyxel sk Spain e
Download Pdf Manuals
Related Search
Related Contents
DVJ-X1 elinstaladorelectricista Sharp HT-SB32D soundbar speaker INSTRUCTIONS MANUAL 取扱説明書 警告 注意 Programming Manual DL105 PLC DeviceNet I/O Specifications Exhibitor Service Manual - Shepard Exposition Services Copyright © All rights reserved.
Failed to retrieve file