ZyXEL Communications NWA-3163 & NWA-3166 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL Communications NWA-3163 & NWA-3166, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL Communications NWA-3163 & NWA-3166 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of ZyXEL Communications NWA-3163 & NWA-3166. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of ZyXEL Communications NWA-3163 & NWA-3166 should contain:
- informations concerning technical data of ZyXEL Communications NWA-3163 & NWA-3166
- name of the manufacturer and a year of construction of the ZyXEL Communications NWA-3163 & NWA-3166 item
- rules of operation, control and maintenance of the ZyXEL Communications NWA-3163 & NWA-3166 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL Communications NWA-3163 & NWA-3166 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL Communications NWA-3163 & NWA-3166, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL Communications service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL Communications NWA-3163 & NWA-3166.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL Communications NWA-3163 & NWA-3166 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    www.zyxel.com www.zyxel.com NWA-3160 Series Models: NWA-3160, NWA-3163 & NWA-3166 Copyright © 2009 ZyXEL Communications Corporation Firmware Version 3.70 Edition 3, 07/2009 Default Login Details IP Address http://192.168.1.2 Password 1234[...]

  • Page 2

    [...]

  • Page 3

    About This User's Guide NWA-3160 Series User’s Guide 3 About This User's Guide Intended Audience This manual is intended for peo ple who want to configure the NWA using the web configurator. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On -Screen, keep the fo llowing i n mind: • If you don’t already[...]

  • Page 4

    About This User's Guide NWA-3160 Series User’s Guide 4 • Support Disc Refer to the included CD for sup port documents. Documentation Feedback Send your comments, questions or su ggest ions to: techwriters@zyxel.com. tw Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hs[...]

  • Page 5

    About This User's Guide NWA-3160 Series User’s Guide 5 Customer Support Should problems arise that cannot be solved by the methods listed above, you should contact your ve ndor. If you canno t contact your vendor, then contact a ZyXEL office for the region i n which you bought the device. See http://www.zyxel.com/web/contact_us.p hp for cont[...]

  • Page 6

    Document Conventions NWA-3160 Series User’s Guide 6 Document Conventions Warnings and Notes These are how warnings and notes ar e shown in this User’s Guide. Warnings tell you about things that could ha rm you or your NWA. Note: Notes tell you o ther important informat ion (for example, other things you may need to configure or helpful tips) or[...]

  • Page 7

    Document Conventions NWA-3160 Series User’s Guide 7 Icons Used in Figures Figures in this User’s Guide use t he follo wing generic icons. The NWA icon is not an exact representation of your NWA. Graphics in this book may differ slightly from the product due to differences in operating systems, operating sys tem versions, or if you installed upd[...]

  • Page 8

    Safety Warnings NWA-3160 Series User’s Guide 8 Safety Warnings • Do NOT use this product near water, for exam ple, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, du st or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There i[...]

  • Page 9

    Contents Overview New Template User’s Guide 9 Contents Overview Introduction .......................................... .......................................... .............................. .. ........ 21 Introduction ............ ............. ............. ................ ............. ............. ................ ............. ..... ...[...]

  • Page 10

    Contents Overview New Template User’s Guide 10[...]

  • Page 11

    Table of Contents NWA-3160 Series User’s Guide 11 Table of Contents About This User's Guide ..................................................... ................................................... .. 3 Document Conventions.................................................................. ......................................... .6 Safety W[...]

  • Page 12

    Table of Contents NWA-3160 Series User’s Guide 12 3.1 Overview ... ............. ............. ................ ............. ............. ................ ............. ............. . ............ 39 3.2 How to Configure the Wirele ss LAN ............. ............. ............. ................ ............. ............. ... 39 3.2.1 Choosi[...]

  • Page 13

    Table of Contents NWA-3160 Series User’s Guide 13 Part II: The Web Configurat or ............................................................... 79 Chapter 4 Status Screen ............................................................................................. ..................... ........ 81 4.1 Overview ... ............. ............. ...[...]

  • Page 14

    Table of Contents NWA-3160 Series User’s Guide 14 7.5.1 Administrator Authentic ation on RADIUS ......... ................ ................ ................ ........ 117 7.5.2 Pre-defined NTP Time Servers List ....................... ............. ................ ................ ..... 117 Chapter 8 Wireless Screen ..............................[...]

  • Page 15

    Table of Contents NWA-3160 Series User’s Guide 15 10.1 Overview .............. ............. ............. ................ ............. ............. ................ ............. .. ......... 159 10.1.1 What You Can Do in the Wireless Securi ty Screen ............. ................. ............ ..... 159 10.1.2 What You Need To Know About Wi[...]

  • Page 16

    Table of Contents NWA-3160 Series User’s Guide 16 14.3.1 WAN IP Address Assign ment .............. ............. ............. ................ ............. ........... 189 Chapter 15 Rogue AP Detection ........................ .......................................... ...................................... 191 15.1 Overview .............. ....[...]

  • Page 17

    Table of Contents NWA-3160 Series User’s Guide 17 18.2.2 My Certificates Create Screen ... ................. ............. ............ ................. ............ ..... 226 18.2.3 My Certificates Details Screen ....... ................ ............. ............. ................ ............. . 229 18.3 Trusted CAs Screen ...... ...... .....[...]

  • Page 18

    Table of Contents NWA-3160 Series User’s Guide 18 21.1.1 What You Need to Kn ow About Load Balancing ......... ................ ............. .............. 269 21.2 The Load Bala nc ing Screen ................ ............. ............. ................ ............. ................ ..... 271 21.2.1 Disassociating and Delaying Connection s ...[...]

  • Page 19

    Table of Contents NWA-3160 Series User’s Guide 19 Appendix C IP Addresses and Subnetting .......................................................... ................. 327 Appendix D Text File Based Auto Configuration .................................................................. 349 Appendix E How to Access and Use the CLI ....................[...]

  • Page 20

    Table of Contents NWA-3160 Series User’s Guide 20[...]

  • Page 21

    21 P ART I Introduction Introduction (23) The Web Configurator (35) Tutorials (39)[...]

  • Page 22

    22[...]

  • Page 23

    NWA-3160 Series User’s Guide 23 C HAPTER 1 Introduction Note: This User’s Guide includes the NW A-3160, NWA-3163 and the NWA-3166. Illustrations used throughout this book are based on the NWA-3160 (unless otherwise stated). The Web Configuration scree ns are based on the NWA-3166 (unless otherwise stated). 1.1 Overview Your NWA extends the rang[...]

  • Page 24

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 24 1.2 Applications for the NWA The NWA can be configured to use the following WLAN operating modes • Access Point •B r i d g e / R e p e a t e r •A P + B r i d g e •M B S S I D Applications for each operati ng mode are shown below. 1.2.1 Access Point The NWA is an ideal access solution[...]

  • Page 25

    Chapter 1 Introduction NWA-3160 Series User’s Guide 25 1.2.2 Bridge / Repeater The NWA can act as a wirele ss network bridge and establish wireless links with other APs. In the fig ure below, the tw o NWAs ( A and B ) are connected to independent wired net works and have a bridge connect ion ( A can communic ate with B ) at the same time. A NWA i[...]

  • Page 26

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 26 Figure 3 Repeater Application 1.2.2.1 Bridge / Re peater Mode Example In the example below, when both NWAs are in Bridge / Repeate r mode, th ey form a WDS (Wireless Distribution Syst em) allowing the computers in LAN 1 to connect to the computers in LAN 2 . Figure 4 Bridging Example Be care[...]

  • Page 27

    Chapter 1 Introduction NWA-3160 Series User’s Guide 27 • If two or more NWAs (in bridge mo de) are connected to the same hub. Figure 5 Bridge Loo p: Two Bridges Connected to Hub • If your NWA (in bridge mod e ) is connected to a wired LAN while communicating with another wireless bridge that is also connected to the same wired LAN. Figure 6 B[...]

  • Page 28

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 28 1.2.3 AP + Bridge In AP + Bridge mode, the NWA supports bo th AP and b ridge connection at the same time. In the figure below, A and B use X as an AP to access the wired network , while X and Y communicate in bridge mode. When the NWA is in AP + Bridge mo de, security between APs (WDS) is in[...]

  • Page 29

    Chapter 1 Introduction NWA-3160 Series User’s Guide 29 provides multiple virtual APs, each forming its own BSS and using its own individual SSID profile. You can configure up to sixt een SSID profil es, and hav e up to eight active at any one time. You can assign different wireless and secu rity settings to each SSID prof ile. This allows you to [...]

  • Page 30

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 30 1.2.5 Pre-Configured SSID Profiles The NWA has two pre-configured SSID profiles. • VoIP_SSID . This profile is intended for use by wireless clients requiring the highest QoS level for VoIP telephony and other applications requiring low latency. The QoS level of this profile is not user-con[...]

  • Page 31

    Chapter 1 Introduction NWA-3160 Series User’s Guide 31 The following figure ill ustrates a CA PWAP wireless network. The user ( U ) configures the controller AP ( C ), which then automatically updates the configura tions of the ma naged APs ( M1 ~ M4 ). Figure 9 CAPWAP Network Example 1.4 Ways to Manage the NWA Use any of the following methods to[...]

  • Page 32

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 32 • Back up the configuration (and mak e sure you know how to restore it). Restorin g an ea rlier wo rking conf igurat io n may be useful if the device becomes unstable or even crashes. If you forget your password, yo u will have to reset the NWA to its factory default settings. If you backe[...]

  • Page 33

    Chapter 1 Introduction NWA-3160 Series User’s Guide 33 1.7 LEDs Note: The figures shown in this section are from the NWA-31 60. Your device may differ in minor ways. Figure 11 LEDs Table 1 LEDs LABEL COLOR STATUS DESCRIPTION WDS Off Either • The NWA is in Acce ss Point or MBSSID mode and is functioning normally. or • The NWA is in AP + Bridge[...]

  • Page 34

    Chapter 1 Intro duction NWA-3160 Series User’s Guide 34 WLAN Green On The wireless LAN is active. Blinking The wireless LAN is active, and transmitting or receiving data. Off The wireless LAN is not active. ETHERNET Green On The NWA has a 10 Mbps Ethernet connection. Blinking The NWA has a 10 Mbps Ethernet con nection and is sending or receiving [...]

  • Page 35

    NWA-3160 Series User’s Guide 35 C HAPTER 2 The Web Configurator 2.1 Overview This chapter describes how t o access the NWA’s web configurator and provides an overview of its screens. 2.2 Accessing the Web Configurator 1 Make sure your hardware is properly connected and prepare your c omputer or computer network to connect to the NW A (refer to [...]

  • Page 36

    Chapter 2 The Web Configurator NWA-3160 Series User’s Guide 36 6 Click Apply in the Replace Certificate screen to create a certificate using your NWA’s MAC address that will be specific to this device. You should now see the Status screen. Se e Chapter 2 on page 35 for details about the Status screen. Note: The management session automatically [...]

  • Page 37

    Chapter 2 The Web Configurator NWA-3160 Series User’s Guide 37 2.4 Navigating the Web Configurator The following summarizes how to navigate the web configurator from the Status screen. Click LOGOU T at any time to exit the web configurator. Check the status bar at the bottom of the screen when you click Apply or OK to verify that th e configur at[...]

  • Page 38

    Chapter 2 The Web Configurator NWA-3160 Series User’s Guide 38[...]

  • Page 39

    NWA-3160 Series User’s Guide 39 C HAPTER 3 Tutorials 3.1 Overview This chapter first provides a basic overvi ew of how to configure the wireless LAN on your NWA, and then gives step-by-st ep guidelines showing how to configure your NWA for some example scenarios. 3.2 How to Configure the Wireless LAN This section shows how to choose which wireles[...]

  • Page 40

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 40 3.2.2 Wireless LAN Configuration Overview The following figure shows the steps you should take to configure the wireless settings according to the operating mode you select. Use the Web Configurator to set up your NWA’s wireless net work (see your Quick Start Guide for information on setting u[...]

  • Page 41

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 41 3.2.3 Further Reading Use these links to find more information on the steps: • Choosing 802.11 Mode : see Section 8.2.1 on page 123 . • Choosing a wireless Channel ID : see Section 8.2.1 on page 123 . • Selecting and configuring SSID profile (s): see Section 8.2.1 on page 123 and Section 9[...]

  • Page 42

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 42 The following figure shows the multip le networks you want to set up. Your NWA is marked Z , the main network router is marked A , and your network pri nter is marked B . Figure 14 Tutorial: Example MBSSID Setup The standard network ( SSID04 ) has access to all resources. The VoIP network ( VoIP[...]

  • Page 43

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 43 3.3.1 Change the Operating Mode Log in to the NWA (see Section 2.2 on pag e 35 ). Click Wireless > Wireless . The Wireless screen appears. 3.3.1.1 Access Point Set the NWA is in Access Point operating mode, and is currently set to use the SSID03 profile. Figure 15 Tutorial: Wireless LAN: Befo[...]

  • Page 44

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 44 3.3.1.2 MBSSID Select MBSSID from the Operat ing Mode drop-down list box. The screen displays as foll ows. Figure 16 Tutorial: Wireless LAN: Change Mode This Select SSID Profile table allows you to activate or deactivate SSID pr ofiles. Your wireless network was previously using the SSID03 profi[...]

  • Page 45

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 45 3.3.2 Configure the VoIP Network Next, click Wireless > SSID . The following screen displays . Note that the SSID03 SSID profile (the standard network) is using t he security01 security profile. You cannot change this security profile without changing the standard network’s parameters, so w[...]

  • Page 46

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 46 1 Choose a new SSID for the VoIP netw ork. In this example, enter VOIP_SSID_Example . Note that although the SSID changes, the SSID profile name ( VoIP_SSID ) remains the same as before. 2 Select Enable from the Hide Name (SSID) list box. You want only authorized company employees to use this ne[...]

  • Page 47

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 47 You already chose to us e the security02 profile for thi s network, so select the radio button for security02 and click Edit . The following screen appears. Figure 20 Tutorial: VoIP Security Profile Edit 1 Change the Name field to “VoIP_Security” to ma ke it easi er to remember and ident ify[...]

  • Page 48

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 48 3.3.2.2 Activate the VoIP Profile You need to activate the VoIP_SSID profile before it can be used. Click the Wireless tab. In the Select SSID Profile table, select th e VoIP_SSID profile and click Apply . Figure 22 Tutorial: Activate VoIP Profile Your VoIP wireless network is now re ady to use.[...]

  • Page 49

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 49 Click Wireless > SSID . Select Guest_SSID ’s entry in the list an d click Edit . The following screen appears. Figure 23 Tutorial: Guest Edit 1 Choose a new SSID for the guest ne tw ork. In this example, enter Guest_SSID_Example . Note that although the SSID changes, the SSID profile name ([...]

  • Page 50

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 50 3.3.3.1 Set Up Security for the Guest Profile Now you need to configure the security settings t o use on the guest wireless network. Click the Security tab. You already chose to us e the security03 profile for thi s network, so select security03 ’s entry in the list and cli ck Edit . The follo[...]

  • Page 51

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 51 3.3.3.2 Set up Layer 2 Isolation Configure layer 2 isolation to control the specific devices you want the users on your guest network to access. Click Wireless > Layer-2 Isolation . The following screen appears. Figure 26 Tutorial: Layer 2 I solation The Guest_SSID network uses the l2isolatio[...]

  • Page 52

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 52 3.3.3.3 Activate the Guest Profile You need to activate the Guest_SSID profile before it can be used. Cl ick the Wireless tab. In the Select SSID Profile table, select th e check box for the Guest_SSID profile and click Apply . Figure 28 Tutorial: Activate Guest Profile Your Guest wireless netwo[...]

  • Page 53

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 53 3.4 How to Set Up and Use Rogue AP Detection This example shows you how to configure the rogue AP detecti on feature on the NWA. A rogue AP is a wireless access point oper ati ng in a network’s coverage area that is not a sanctioned part of that networ k. The example also shows how to set the [...]

  • Page 54

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 54 marked E , and a computer, marked F , connected to the wi re d network. The coffee shop’s access point is marked 1 . Figure 29 Tutorial: Wireless Network Example In the figure, the solid ci rcle represents the range of your wireless network, and the dashed circle represents the extent of the c[...]

  • Page 55

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 55 Note: The NWA can detect the MAC addresses o f APs automatically. However, it is more secure to obtain the correct MAC addresse s from another source and add them to the friendly AP list manually. For example, an attacker’s AP mimicking the correct SSID could be placed on the friendly AP list [...]

  • Page 56

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 56 Note: You can add APs t hat are not part of yo ur network to the friendly AP list, as lo ng as you know that they do not pose a threat to your network’s security. The Friendly AP screen now appears as follows. Figure 31 Tutorial: Friendly AP (After Data Entry) 3 Next, you will save the list of[...]

  • Page 57

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 57 4 Click Export . If a window si milar to the following appears, click Save . Figure 33 Tutorial: Warn ing 5 Save the friendly AP list somewhere it can be accessed by all the other access points on the network. In this example, save it on the network fi le server ( E in Figure 29 on page 54 ). Th[...]

  • Page 58

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 58 3.4.2 Activate Periodic Rogue AP Detection Take the following steps to activate rogue AP detection on the first of your NWAs. 1 In the ROGUE AP > Configuration screen, sele ct Enable from the Rogue AP Period Detection field. Figure 35 Tutorial: Periodic Rogue AP Detectio n 2 In the Period fie[...]

  • Page 59

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 59 3.4.3 Set Up E-mail Logs In this section, you will configure the firs t of your four APs to send a log m essage t o y o u r e - m a i l i n b o x w h e n e v e r a r o g u e A P i s d i s c o v e r e d i n y o u r w i r e l e s s n e t w o r k ’ s coverage area. 1 Click LOGS > Log Settings [...]

  • Page 60

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 60 5 In the Send Immediate Alert section, select the events you want to trigger immediate e-mails. Ensure that Rogue AP is selected. 6 Click Apply . 3.4.4 Configure Your Other Access Points Access point A is now configured to do the foll owing. • Scan for access points in its coverage area every [...]

  • Page 61

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 61 3.4.5 Test the Setup Next, test your setup to ensure it is correctly configured. • Log into each AP’s Web configurator and clic k ROGUE AP > Rogue AP . Click Refresh . If any of the MAC addresses from Section 3.4.1 on page 55 appear in the list, th e friendly AP funct ion may be incorrect[...]

  • Page 62

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 62 NWA is marked Z . C is a workstation on your wired network, D is your main network switch, and E is the securi ty gateway you use to co nnect to the Internet . Figure 37 Tutorial: Example Network 3.5.2 Your Requirements 1 You want to set up a wireless network to allow only Al ice to access Serve[...]

  • Page 63

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 63 Each SSID profile already uses a different pre-share d key. In this example, you will configure access limitations for each SSID profile. To do this, you will take the following steps. 1 Configure th e SERVER_1 network’s SSID profile to use s p ecific MAC filter and layer-2 is olation pr ofile[...]

  • Page 64

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 64 Take the following steps to configure the SERVER_1 network. 1 Log into the NWA’s Web Configurator and click Wireless > SSID . The following screen displays, s howing the SSID profiles you already configured. Figure 38 Tutorial: SSID Profile[...]

  • Page 65

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 65 2 Select SERVER_1 ’s entry and click Edit . The following screen displa ys. Figure 39 Tutorial: SSID Edit Select l2Isolation03 in the L2 Isolation field, and select macfilter03 in the MAC Filtering field. Click Apply . 3 Click the Layer-2 Iso lation tab. When the Layer-2 Isola tion screen appe[...]

  • Page 66

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 66 8 Enter the MAC address of the devic e Alice uses to connect to the network in Index 1 ’s MAC Address field and enter her name i n the Description field, as shown in the following figure. Change the Profile Name to “MacFilter_SERVER_1”. Select Allow Association fro m the Filter Action fiel[...]

  • Page 67

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 67 3.5.6 Checking your Settings and Testing the Configuration Use the following sections to ensure th at your wireless networks are set up correctly. 3.5.6.1 Checking Settings Take the following steps to check that the NWA is using the correct SS IDs, MAC filters and layer-2 isolation profiles. 1 C[...]

  • Page 68

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 68 If the settings are not as s hown, follow the steps in t he relevant section of this tutorial again. 3.5.6.2 Testing the Configuration Before you allow employees to use the ne twork, you need to thoroughly test whether the setup behaves as it shoul d. Take the following steps to do this. 1 Test [...]

  • Page 69

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 69 3.6 How to Configure Management Modes This example shows you how to configur e the NWA’s controller AP and managed AP modes. 3.6.1 Scenario In this example, you are the administra tor of a company network wherein a group of users need stable wireless connecti on. These users are employees who [...]

  • Page 70

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 70 2 You want to have a backup of the NWA control ler AP configuration. 3.6.3 Setup In this example, each of yo ur NWA standalone AP mirror each other. They all have the same SSID profiles stored. First you need to download t he configuration file from one of your NWAs for backup purposes. Refer to[...]

  • Page 71

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 71 3.6.4 Configure Your NWA in Controller AP Mode The NWA is set to Standalone AP mode by default. After you have made sure you have the correct configuration in the NWAs ( A and E ) of the 1st floor, you need to set both of them to cont roller AP mode, one will serve as your main controller while [...]

  • Page 72

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 72 1 To set your NWA in secondary controll er AP mode, ope n the Controller > Redundacy screen (this screen only appears when the NWA is in Controller AP mode) in the Web Configurator of the NW A that you want to serve as backup. Figure 46 Tutorial: Secondary Controller AP 2 Enable Redundancy . [...]

  • Page 73

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 73 3.6.5 Setting Your NW A in Managed AP Mode After setting the NWAs ( A and E ) to control ler AP modes, you can now transform the NWAs ( B , C and D ) in the 2nd, 3rd and 4th floors of your company b u ilding to manage d APs. It is very importan t to note that once an NWA is in managed AP mode, i[...]

  • Page 74

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 74 3.6.6 Configuring the Managed Access Points List At this point, you have 3 NWA managed APs ( B , C and D ) that can now be managed by the primary controller AP. First in the Web Configurator of your primary controller AP ( A ), go t o Controller > Configuration . Figure 49 Tutorial: Registrat[...]

  • Page 75

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 75 2 Select the NWA managed APs from the Un-Managed Access Points List as shown in the screen above. Yo u can a lso identify these managed APs by filling in the Description field. Click Add . 3 The 2nd, 3rd and 4th floor NWA managed APs ( B , C and D ) should now be in the Manged Access Points List[...]

  • Page 76

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 76 4 In the screen that opens, choose the radi o profile for each WLAN radio and click Apply . Figure 52 Tutorial: Ma naged AP WLAN Radio Prof ile In this example, the 1st floor NWA managed AP uses radio06 for its WLAN1 Radio Profile . 3.6.7 Checking your Settings and Testing the Configuration The [...]

  • Page 77

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 77 Open the wireless client’s screen that list the available networks within range. In the image above, we can see Mktg Grp 6 which is the SSID in the WLAN1 radio profile enabled for the 1s t floor NWA managed AP. Do the same for the other WLAN rad io profiles of the remaining NWA APs (both contr[...]

  • Page 78

    Chapter 3 Tutorials NWA-3160 Series User’s Guide 78[...]

  • Page 79

    79 P ART II The Web Configurator Status Screen (81) Management Mode (87) System Screens (109) Wireless Screen (119) SSID Screen (149) Wireless Security Screen (159) RADIUS Screen (173) Layer-2 Isolation Screen (177) MAC Filter Screen (183) IP Screen (187) Rogue AP Detection (191) Remote Management Screens (199) Internal RADIUS Server (213) Certific[...]

  • Page 80

    80[...]

  • Page 81

    NWA-3160 Series User’s Guide 81 C HAPTER 4 Status Screen 4.1 Overview The Status screen displays when you log i nto the NWA or click Status in the navigation me nu. Use this screen to look at the cu rrent status of the device, system resources, and interfaces . The Status screen al so provides detailed information about sys tem statistics, associ[...]

  • Page 82

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 82 The following table describes t h e labels in this screen. Table 8 The Status Screen LABEL DESCRIPTION Automatic Refresh Interval Enter how often you want the NWA to update this screen. Refresh Click this to update this screen immediately. System Information System Name This field displays t[...]

  • Page 83

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 83 Status This field indicates whether or not the NWA is using the interfac e. For each interface, this field displays Up when the NWA is using the interface and Down when the NWA is not using the interface. Channel This field displays the wireless channel the AP is currently using. Rate For th[...]

  • Page 84

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 84 4.2.1 System Statistics Screen Use this screen to view di agnostic information about the NWA. Click Show Statistics in the Status screen. The following screen pops up. Note: The Poll Interval field is configurable. The fields in this screen vary according to the current wireless mode of ea c[...]

  • Page 85

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 85 Remote Bridge MAC This is the MAC address of the peer device in bridge mode. Status This shows the current status of the bridge connection, which can be Up or Down . TxPkts This is the number of transmitte d packets on the wireless bridge. RxPkts This is the number of received packets on the[...]

  • Page 86

    Chapter 4 Status Screen NWA-3160 Series User’s Guide 86[...]

  • Page 87

    NWA-3160 Series User’s Guide 87 C HAPTER 5 Management Mode 5.1 Overview This chapter discusses using the NWA in manag ement mode. This screen determines whether the NWA is used in its default st andalone mode, or as part of a Control And Provisioning of Wirele ss Access Points (CAPWAP) network. 5.2 About CAPWAP The NWA supports CAPWAP. This is Zy[...]

  • Page 88

    Chapter 5 Manage ment Mode NWA-3160 Series User’s Guide 88 Note: The NWA can be a controller AP, standalo ne AP (default) or a CAPWAP managed AP. 5.2.1 CAPWAP Discovery and Management The link between CAPWAP-enabled a ccess points proceeds as follows: 1 An AP in managed AP mode joins a wi red network (receives a dynamic IP address). 2 The AP send[...]

  • Page 89

    Chapter 5 Manag ement Mode NWA-3160 Series User’s Guide 89 DHCP Option 43 allows the CAPWAP ma nagement request (from the AP in managed AP mode) to reach th e AP cont roller in a diff erent subnet, as shown in the following figure . Figure 57 CAPWAP and DHCP Option 43 5.2.4 Notes on CAPWAP This section lists some additional features of ZyXEL’s [...]

  • Page 90

    Chapter 5 Manage ment Mode NWA-3160 Series User’s Guide 90 5.3 The Management Mode Screen Use this screen to configure the NWA as a CAPWAP controller AP, a CAPWAP managed A P, or to use it in it s default st andalon e mode. Click MGNT MODE in the NWA’s navigation menu . The following screen displays. Figure 58 Managemen t Mode The following tab[...]

  • Page 91

    Chapter 5 Manag ement Mode NWA-3160 Series User’s Guide 91 Apply Click this to save your changes. If you change the mode in this screen, the NWA restarts. Wait a short while before you attempt to log in again. If you changed the mode to Managed AP , you cannot log in as the web configurator is disabled; you must manage the NWA through the managem[...]

  • Page 92

    Chapter 5 Manage ment Mode NWA-3160 Series User’s Guide 92[...]

  • Page 93

    NWA-3160 Series User’s Guide 93 C HAPTER 6 AP Controller Mode 6.1 Overview This chapter discusses the Controller AP management mode. When the NWA is used as a CAPWAP (Control And Provisioni ng of Wireless Access Points) controller AP, the Web Configurator changes to reflect this by including the Controller and Profile Edit screens. Refer to Secti[...]

  • Page 94

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 94 In the figure below, an administrator is able to manage the security settings of 5 APs (1 controller AP and 4 managed APs ). He changes the s ecurity mode to WPA- PSK just by accessing the Web Conf igurator of the cont roller AP ( C ). Figure 59 CAPWAP Controller Note: Be careful when c[...]

  • Page 95

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 95 After logging in again, the navigation menu changes to include links for the Controller and Profile Edit screens. The items marked below are screens that can be configured for all APs managed by t he NWA. Figure 61 Controller AP Na vigation Links In the figure above, changes made in the[...]

  • Page 96

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 96 Click Status . The following screen displays. Figure 62 Status Screen The following table describes t he new labels in this screen. Table 11 Status Screen LABEL DESCRIPTION System Information Registration Type This field displays how the managed APs are registered with the NWA. Manual d[...]

  • Page 97

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 97 6.4 AP Lists Screen Use this screen to view and add managed APs. By default, the controller NWA is always included in this table. Although you cannot remove it, you can edit its settings. 2.4GHz This field displays the number of wireless clients associated with APs managed by the NWA (i[...]

  • Page 98

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 98 Click Controller > AP Lists . The following screen displays. Figure 63 AP Lists Screen The following table describes t h e labels in this screen. Table 12 AP List s Screen LABEL DESCRIPTION Managed Access Points List This section lists the access point s currently controlled by the N[...]

  • Page 99

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 99 Status This displays whether the managed AP is activ e, not active or upgrading its firmware. • Red : the AP is not active. • Green : the AP is active. • Yellow : the AP is upgrading its firmware. Note: You can still edit a managed AP’s settings e ven if it is offline. However, [...]

  • Page 100

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 100 6.4.1 The AP Lists Edit Screen Use this screen to change the description or radio profile of an AP managed by the NWA. Click Edit in the CONTROLL ER > AP Lists scre en. The following screen displays. Figure 64 AP Configuration Screen The following table describes t h e labels in thi[...]

  • Page 101

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 101 6.5 Configuration Screen Use this screen to control the way in wh ich the NWA accepts new APs to manage. You can also configure t he pre-shared key (PSK) that is us ed to secure the data transmitted between the NWA and the APs it manages. When the NWA is in AP controller mode, click CO[...]

  • Page 102

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 102 6.6 Redundancy Screen Use this screen to set t he controller AP as a primary or secondary controller. If you set your NWA as a primary controller AP, you can have a secondary controller AP to serve as a backup . All configurations are sy nchronized between the NWA and the secondary con[...]

  • Page 103

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 103 6.7 The Profile Edit Screens This section describes the Profile Edit screens, which are available only in AP controller mode. The following Profile Edit screens are ide ntical to those in standalone mode: •T h e Profile Edit > SSID screen (see Section 9.2 on page 151 ). •T h e P[...]

  • Page 104

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 104 The following table describes t h e labels in this screen. 6.7.2 The Radio Profile Edit Screen Use this screen to conf igure a specific radio profile. In the Profile Edit > Radio screen, select a profile and click Ed it . The following screen displays. Figure 68 Radio Edit Screen Ta[...]

  • Page 105

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 105 The following table describes t h e labels in this screen. Table 17 Radio Edit Screen LABEL DESCRIPTION Profile Name Enter a name identifying this profile. Radio Mode This makes sure that only compliant WLAN devices can associate with the NWA. Select 802.11 b Only to allow only IEEE 80[...]

  • Page 106

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 106 Disable channel switching for DFS This field displays only when you select 802.11a or 802.11n/a in the 802.11 Radio Mode field. Select this if you do not want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same ch[...]

  • Page 107

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 107 RTS/CTS Threshold Use RTS/CTS to reduce data collis ions on the wireless net work if you have wireless clients that are associated with the same AP but out of range of one another . When enabled, a wireless client sends an RTS (Request To Send) and then waits for a CTS (Clear To Send) [...]

  • Page 108

    Chapter 6 AP Controller Mode NWA-3160 Series User’s Guide 108 MCS Table The MCS Rate table is available only when 802.11n/g or 802.11n/a is selected as the 802.11 Radio Mode . IEEE 802.11n supports many different data rates which are c alled MCS rates. MCS stands for Modulation and Coding Sch eme. This is an 802.11n feature that increases the wir[...]

  • Page 109

    NWA-3160 Series User’s Guide 109 C HAPTER 7 System Screens 7.1 Overview This chapter provides information and inst ructions on how to identify and manage your NWA over the network. Figure 69 NWA Setup In the figure above, the NWA ( ZyXEL Device ) connects to a Domain Name Server (DNS) server to avail of a domain name . It also connects to an Netw[...]

  • Page 110

    Chapter 7 System Screens NWA-3160 Series User’s Guide 110 7.1.2 What You Need To Know About the System Screens The following terms and conc epts may help as you read through the chapter. IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet, for insta nce , only between[...]

  • Page 111

    Chapter 7 S ystem Scre ens NWA-3160 Series User’s Guide 111 Once you have decided on the network number , pick an IP address that is easy to remember, for instance, 192.16 8.1.2, for your device, but make sure that no other device on your networ k is using that IP address. The subnet mask specifies the network number portion of an IP address. You[...]

  • Page 112

    Chapter 7 System Screens NWA-3160 Series User’s Guide 112 Administrator Inactivity Timer Type how many minutes a management session can be left idle before the session times out. The default is 5 minutes. After it times out you have to log in with your password again. Very long id le timeouts may have security risks. A value of "0" mean[...]

  • Page 113

    Chapter 7 S ystem Scre ens NWA-3160 Series User’s Guide 113 7.3 Password Screen Use this screen to control access to your NWA by assigni n g a password to it. Click System > Password . The following screen displays. Figure 71 System > Password. Note: Even if you uncheck Enable Admin at L ocal, you still use the password set here to log in v[...]

  • Page 114

    Chapter 7 System Screens NWA-3160 Series User’s Guide 114 Use new setting Select this if you want to change the RADIUS username and password the NWA uses to authenticate management logon . User Name Enter the username for this user accoun t. This name can be up to 31 ASCII characters long, including spaces. Password Type a password (up to 31 ASCI[...]

  • Page 115

    Chapter 7 S ystem Scre ens NWA-3160 Series User’s Guide 115 7.4 Time Setting Screen Use this screen to change your NWA’s time and date, click Sy stem > Time Setting . The following screen displays. Figure 72 System > Time Setting The following table describes t h e labels in this screen. Table 21 System > Time Setting LABEL DESCRIPTION[...]

  • Page 116

    Chapter 7 System Screens NWA-3160 Series User’s Guide 116 New Date (yyyy:mm:dd) This field displays the last updated date from the time server or the last date configured manually. When you set Time and Date Setup to Manual , enter the new date in this field and then click Apply . Get from Time Server Select this radio button to have the NWA get [...]

  • Page 117

    Chapter 7 S ystem Scre ens NWA-3160 Series User’s Guide 117 7.5 Technical Reference This section provides some technical info rmation about th e topics co vered in th is chapter. 7.5.1 Administrator Authentication on RADIUS The administrator authentication on RADIUS feature lets a (external or internal) RADIUS server authenticate management logi [...]

  • Page 118

    Chapter 7 System Screens NWA-3160 Series User’s Guide 118 The NWA continues to use the following pre-defined lis t of NTP time servers if you do not specify a time server or it cann ot synchronize with the time server you specified . When the NWA uses the pre-defined list of NTP time servers, it randomly s elects one server and tries to sync hron[...]

  • Page 119

    NWA-3160 Series User’s Guide 119 C HAPTER 8 Wireless Screen 8.1 Overview This chapter discusses the steps to confi g ure the Wireless Settings screen on the NWA. It also int roduces the wirel ess LAN (WLAN) and some basic scenarios. Figure 73 Wirele ss Mode In the figure above, the NWA ( ZyXEL Device ) allows access to anot her bridge device ( A [...]

  • Page 120

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 120 8.1.2 What You Need To Know About the Wireless Screen The following terms and conc epts may help as you read through this chapter. BSS A Basic Service Set (BSS) exists when all communications between wireless stations or between a wireless station an d a wired network client go through o[...]

  • Page 121

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 121 An ESSID (ESS IDentification ) uniquely identifies each ESS. All ac cess points and their associated wireless stations within the same ESS must have the same ESSID in order to comm unicate. Figure 75 Extended Service Set Operating Mode The NWA can run in four operating modes as follows: [...]

  • Page 122

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 122 SSID The SSID (Service Set IDenti fier) identifies the Service Set with which a wireless station is associated. Wireless stations a ssoci ating to the access point (AP) must have the same SSID. Normally, the NWA acts like a beacon an d regularly broadcasts the SSID in the area. You can h[...]

  • Page 123

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 123 • You must us e different WE P keys for different BSSs. If two stations have different BSSIDs (they are in differen t BSSs), but have the same WEP keys, they may hear each other’s communicati ons (but not communicate with each other). • MBSSID should not replace but rather be used [...]

  • Page 124

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 124 The following table describes t he genera l wireless LAN labels in this screen. Table 23 Wireless: Acc ess Point LABEL DESCRIPTION Operating Mode Select Access Point from the drop-down list. 802.11 Mode This makes sure that only compliant WLAN devices can associate with the NWA. Select 8[...]

  • Page 125

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 125 Disable channel switching for DFS This field displays only when you select 802.11a or 802.11 n/a in the 802.11 Radio Mode field. Select this if you do not want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same cha[...]

  • Page 126

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 126 Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interval. This specifies the time period before the device sends the beacon again. The interval tells receiving devices on the network how long they can wait in low-power mode before waking up[...]

  • Page 127

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 127 8.2.2 Bridge / Repeater Mode Use this screen to have the NWA act as a wireless network bridge / repeater and establish wireless links with ot her APs. You need to know the MAC address of t he peer device, which also must be in bridge / repeater mode. MCS Table The MCS Rate table is avail[...]

  • Page 128

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 128 Note: You can view an example of this se tup in Section 8.3.3 on page 146 . Figure 77 Wireless: Bridge / Repeater[...]

  • Page 129

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 129 The following table describes t he bridge labels in this s creen. Table 24 Wireless: Bridge / Repeater LABEL DESCRIPTIONS Operating Mode Select Bridge / Repeater in this field. 802.11 mode This makes sure that only compliant WLAN devices can associate with the NWA. Select 802.11b Only to[...]

  • Page 130

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 130 Disable channel switching for DFS This field displays only when you select 802.11a or 80 2.11n/a in the 802.11 Radi o Mode field. Sel ect this if you do not want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same c[...]

  • Page 131

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 131 Output Po wer Set the output power of the NWA in this field. If there is a high density of APs in an area, decrease the output power of the NWA to reduce interference with other APs. Select from 100% (Full Power) , 50% , 25% , 12 .5% and Minimum . See the product specifications for more [...]

  • Page 132

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 132 TKIP Select this to enable Temporal Key Integrity Protocol (TKIP) s ecurity on your WDS. This option is compatible with other ZyXEL access points that support WDS security. Use this if the other access points on your network support WDS security but do not have an AES option. Note: Check[...]

  • Page 133

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 133 8.2.3 AP + Bridge Mode Use this screen to have the NWA function as a bridge and access point simultaneously. Select AP + Bridge as the Operating Mode . The following screen diplays. Figure 78 AP + Bridge[...]

  • Page 134

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 134 The following table describes t he bridge labels in this s creen. Table 25 Wireless: AP + Bridge LABEL DESCRIPTIONS Operating Mode Select AP + Repeater in this field. 802.11 mode This makes sure that only compliant WLAN devices can associate with the NWA. Select 802.11b Only to allow onl[...]

  • Page 135

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 135 Disable channel switching for DFS This field displays only when you select 802.11a or 80 2.11n/a in the 802.11 Radi o Mode field. Sel ect this if you do not want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same c[...]

  • Page 136

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 136 Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interval. This specifies the time period before the device sends the beacon again. The interval tells receiving devices on the network how long they can w ait in low-power mode before waking u[...]

  • Page 137

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 137 MCS Table The MCS Rate table is available only when 802. 11n/g or 802.11n/a is selected as the 802.11 Radio Mode . IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands for Modulation and Coding Scheme. T his is an 802.11n feature that increases the wirel[...]

  • Page 138

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 138 Enable Antenna Diversity (For NWA-3160 and NWA-3163 only) Select this to use antenna diversity. Antenna diversity uses multiple antennas to reduce signal interference. Enable Spanning Tree Control (STP) (R)STP ( Section 8.3.1 on page 144 ) detects and breaks network loops and provides ba[...]

  • Page 139

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 139 8.2.4 MBSSID Mode Use this screen to have the NWA function in MBSSID mode. Select MBSSID as the Operating Mode . The following screen diplays. Figure 79 Wireless: MBSSID[...]

  • Page 140

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 140 The following table describes t h e labels in this screen. Table 26 Wireless: MBSSID LABEL DESCRIPTION Operating Mode Select MBSSID in this field to display the screen as shown 802.11 Mode This makes sure that only compliant WLAN devices can associate with the NWA. Select 802.11b Only to[...]

  • Page 141

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 141 Disable channel switching for DFS This field displays only when you select 802.11a or 802.11n/a in the 802.11 Radio Mode field. Select this if you do not want to use DFS (Dynamic Frequency Selection). DFS (dynamic frequency selection) allows an AP to detect other devices in the same chan[...]

  • Page 142

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 142 Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interval. This sp ecifies the time period before the device sends the beacon again. Th e interval tells receiving devices on the network how long they can wait in low-power mode before waking [...]

  • Page 143

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 143 8.3 Technical Reference This section provides technical backg round information about the topics covered in this chapter. Select SSID Profile An SSID profile is the set of parameters relating to one of the NWA’s BSSs. The SSID (Servi ce Set IDentifier) identifies the Service Set with w[...]

  • Page 144

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 144 8.3.1 Spanning Tree Protocol (STP) Spanning Tree Protocol (STP) detects an d breaks network loops and provides backup links between switches, bridg es or ro uters. It allows a bridge to interact with other STP-compliant bridg es in your network to ensure that only one route exists betwee[...]

  • Page 145

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 145 8.3.1.3 How STP Works After a bridge determines the lowest cost - spanning tree with STP, it enables the root port and the ports that are the designated ports for connected LANs, and disables all other ports that participate in STP. Network packets are therefore only forwarded between en[...]

  • Page 146

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 146 radar activity on the channel you select, it automatically instructs the wireless clients to move to another channel , th en resumes communications on the new channel. 8.3.3 Roaming A wireless station is a device with an IEEE 802.11a/b/g compliant wireless interface. An access point (AP)[...]

  • Page 147

    Chapter 8 Wireless Scre en NWA-3160 Series User’s Guide 147 with other APs (Non-ZyXEL APs may no t be able to perform this). 802.1x authentication information is not ex changed (a t the time of writing). Figure 80 Roaming Example The steps below des cribe the roaming process. 1 Wireless station Y moves from the coverage area of access point AP 1 [...]

  • Page 148

    Chapter 8 Wireles s Screen NWA-3160 Series User’s Guide 148 • The adjacent access points should us e different radio channels when thei r coverage areas overlap. • All access points must use the same po rt number to relay roaming information. • The access points must b e connected to the Ethernet and be able to get IP addresses from a DHCP [...]

  • Page 149

    NWA-3160 Series User’s Guide 149 C HAPTER 9 SSID Screen 9.1 Overview This chapter describes how you can conf igure Service Set Identifier (SSID) profiles in your NWA. Figure 82 Sample SSID Profiles In the figure above, the NWA has thr ee SSID profiles configured: a standard profile ( SSID04 ), a p r ofile with high QoS sett ings for Voice over IP[...]

  • Page 150

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 150 9.1.2 What You Need To Know About SSID The following terms and conc epts may help as you read through this chapter. When the NWA is set to Access Point, AP + Bridge or MBSSID mode, you need to choose the SSID profile(s) you want to use in your wireless network (see Section on page 119 for mor[...]

  • Page 151

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 151 9.2 The SSID Screen Use this screen to select the SSID pr ofile you want to configure. Click Wireless > SSID to display the screen as shown. Figure 83 SSID The following table describes t h e labels in this screen. Table 29 SSID LABEL DESCRIPTION Index This field displays the in dex number[...]

  • Page 152

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 152 9.2.1 Configuring SSID Use this screen to configure an SSID profile. Select an SSID profile in Wireless > SSID and click Edit to display the following screen. Figure 84 Configuring SSID The following table describes t h e labels in this screen. Layer-2 Isolation This field displays which l[...]

  • Page 153

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 153 9.3 Technical Reference This section provides technical backg round information about the topics covered in this chapter. 9.3.1 WMM QoS WMM (Wi-Fi MultiMedia) QoS (Quality of Servi ce) ensures quality of service in wireless networks. It controls WLAN tran smission priority on packet s to be t[...]

  • Page 154

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 154 On APs without WMM QoS, all traffic stream s are gi ven the same access priori ty to the wireless network. If the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity, then the new traffic stream reduces the throughput of the othe[...]

  • Page 155

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 155 typical data packet sizes. Note that the figures given are mere ly exa mples - sizes may differ according to app lication and ci rcumstances. When ATC is activated, the devi ce sends tr af fic with smaller packets before t raffic with larger packets if t he network is congested. ATC assigns p[...]

  • Page 156

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 156 9.3.3.1 ATC+WMM from LAN to WLAN ATC +W MM fro m LA N ( th e wi re d Lo ca l A rea Ne two rk ) to WL AN ( th e Wi re les s Lo ca l Area Network) allow s WMM prioritizati on of packets that do not already have WMM QoS priorities assi gned. The NWA automati cally clas sifies data packets using [...]

  • Page 157

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 157 based on the application types and traffi c flow. Packets are marked with DiffServ Code Points (DSCPs) indicating the leve l of service desire d. This allow s the intermediary DiffServ-compliant network de vices to handle the packets dif ferently depending on the code points without th e need[...]

  • Page 158

    Chapter 9 SSID Screen NWA-3160 Series User’s Guide 158 The followin g table lis ts which WM M QoS pr iority level the NWA uses for specific DSCP values. Table 36 ToS and IEEE 802.1d t o WMM QoS Priority Level Mapping DSCP VALUE WMM QOS PRIORITY LEVEL 224, 192 voice 160, 128 video 96, 0 A A. The N WA also uses best effort for any DSCP value for wh[...]

  • Page 159

    NWA-3160 Series User’s Guide 159 C HAPTER 10 Wireless Security Screen 10.1 Overview This chapter describes how to use t h e Wireless Securit y screen. This screen allows you to configure the security mode for your NWA. Wireless security is vital t o your net w ork. It protects communications between wireless stations, access poi nts and the wired[...]

  • Page 160

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 160 10.1.2 What You Need To Know About Wireless Security The following terms and conc epts may help as you read through this chapter. User Authentication Authentication is the process of verifyin g whether a wireless device is allowed to use the w ireless net work. You can make ev [...]

  • Page 161

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 161 • 802.1x-Static64. This provides 802.1x-Only authentication with a static 64bit WEP key and an au thentic ation server. • 802.1x-Static128 . This provides 802.1x-Only authentication with a static 128bit WEP key and an au thenti cation server. • WPA. Wi-Fi Protected Acces[...]

  • Page 162

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 162 Use this screen to choose and edi t a security profil e. Click Wirele ss > Security . The following screen displays. Figure 87 Wirele ss Security The following table describes t h e labels in this screen. Table 38 Wireless Secu rity LABEL DESCRIPTION Index This is the index [...]

  • Page 163

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 163 After sele cting t he securi ty profile y ou wa nt to edit, the following screen appears. Enter the name you want to call this security profile in the Profile Name field. Figure 88 Security Profile The next screen varies according to the Security Mode you select. 10.2.1 Securi[...]

  • Page 164

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 164 Authentication Method There are two types of WEP authentication namely, O pen System and Shared Key. Open system is implemented for ease-of-use and when security is not an issue. The wireless station and the AP or peer computer do not share a secret key. Thus the wireless stati[...]

  • Page 165

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 165 10.2.2 Security: 802.1x Only Use this screen to set t he selected profile to 802.1x Only securi ty mode. Select 802.1x-Only in the Security Mode field to dis p lay the following screen. Figure 90 Security: 802.1x Only The following table describes t h e labels in this screen. [...]

  • Page 166

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 166 10.2.3 Security: 802.1x Static 64-bit, 802.1x Static 128-bit Use this screen to set the selected prof ile to 802.1x Static 64 or 802.1x Stati c 128 security mode. Select 802. 1x Static 64 or 802.1x St atic 128 in the Security Mode field to di splay the following screen. Figure [...]

  • Page 167

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 167 10.2.4 Security: WPA Use this screen to set the selected profil e t o Wi-Fi Protected Access (WPA) security mode. Select WPA in the Security Mode field to display the followi ng screen. Figure 92 Security: WPA The following table describes t h e labels in this screen. ReAuthen[...]

  • Page 168

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 168 10.2.5 Security: WPA2 or WPA2-MIX Use this screen to set the selected prof ile to WPA2 or WPA2-MIX security mode. Select WPA2 or WPA2-MIX in the Security Mode field to display the following screen. Figure 93 Security:WPA2 or WPA2-MIX ReAuthentication Timer Specify how often wir[...]

  • Page 169

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 169 The following table descri bes the labels not previously discussed Table 43 Security: WPA2 or WPA2-MI X LABEL DESCRIPTIONS Profile Name Type a name to identify this security profile. Security Mode Choose WPA2 or WPA2-MIX in this field. ReAuthentication Timer Specify how often [...]

  • Page 170

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 170 10.2.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX Use this screen to set the selected prof ile to WP A-PSK, WPA2 -PSK or WPA2-PSK- MIX security mode. Select WPA-PSK , WP A2-PSK or WPA2-PSK-MIX in the Security Mode field to display the following screen. Figure 94 Security: WPA-PS[...]

  • Page 171

    Chapter 10 Wire less Security Sc reen NWA-3160 Series User’s Guide 171 10.3 Technical Reference This section provides technical background information on the topics discuss e d in this chapter. The following is a general guideline in ch oosing the security mode for your NWA. • Use WPA or WPA2 security if you have WPA/WPA2-aware wireless clients[...]

  • Page 172

    Chapter 10 Wire less Security Screen NWA-3160 Series User’s Guide 172[...]

  • Page 173

    NWA-3160 Series User’s Guide 173 C HAPTER 11 RADIUS Screen 11.1 Overview This chapter describes how you can use the Wireless > RADIUS scr een. Remote Authentication Dial In User Serv ice (RADIUS) is a protocol that can be used to manage user access to large ne tworks. It is based on a client-server model that supports authentica tion, auth ori[...]

  • Page 174

    Chapter 11 RADIUS Screen NWA-3160 Series User’s Guide 174 11.1.1 What You Can Do in the RADIUS Screen Use the Security > RADIUS screen (see Section 11.2 on page 175 ) if you want to authen ticate w ireless users usi ng a RADIUS Server and/or Accounting Server. 11.1.2 What You Need To Know About RADIUS The RADIUS server handles the following ta[...]

  • Page 175

    Chapter 11 RADIUS Screen NWA-3160 Series User’s Guide 175 11.2 The RADIUS Screen Use this screen to set up your NWA’s RADIUS server settings. Click Wireless > RADIUS . The screen appears as shown. Figure 96 RADIUS The following table describes t h e labels in this screen. Table 45 RADIUS LABEL DESCRIPTION Index Select the RADIUS profile you [...]

  • Page 176

    Chapter 11 RADIUS Screen NWA-3160 Series User’s Guide 176 Internal Select this check box to use the NWA’s internal authentication server. The Active , RADIUS Server IP Address , RADIUS S erver Port and Share Secret fields are not available when you use the internal authentication server. External Select this check box to use an external authent[...]

  • Page 177

    NWA-3160 Series User’s Guide 177 C HAPTER 12 Layer-2 Isolation Screen 12.1 Overview Layer-2 isolation is used t o prevent wireless clients associat ed with your NWA from communicating with other wireless c lients, APs, computers or routers in a network. In the following figure, layer-2 is olation is enabl ed on the NWA ( Z ) to allow a guest wire[...]

  • Page 178

    Chapter 12 Layer-2 Iso lation Screen NWA-3160 Series User’s Guide 178 communicating with the NWA’s wireless clients except for broadcast packets . Layer-2 isolation does not check the traffic between wireless clients that are associated with the same AP. Intra-BSS Tr affic allows wireless clients associated with the same AP to communicate with [...]

  • Page 179

    Chapter 12 Layer-2 Isolation Screen NWA-3160 Series User’s Guide 179 12.2 The Layer-2 Isolation Screen Use this screen to select and configure a layer-2 isolation profile. Click Wire less > Layer-2 Isolation . The screen appears as shown next. Figure 98 Layer 2 Isolati on The following table describes t h e labels in this screen. Table 46 Laye[...]

  • Page 180

    Chapter 12 Layer-2 Iso lation Screen NWA-3160 Series User’s Guide 180 12.2.1 Configuring Layer-2 Isolation Use this scre en to specify th e configura tion for your lay er-2 isolat ion profile. Select a layer-2 isolation profile in Wireless > Layer-2 Isolation and click Edit to display the following screen. Note: When configuring this screen, r[...]

  • Page 181

    Chapter 12 Layer-2 Isolation Screen NWA-3160 Series User’s Guide 181 12.3 Technical Reference This section provides technical background information on the topics discuss e d in this chapter. The figure that follows i llustrates two ex ample layer-2 isol ation configurations on your NWA ( A ). Figure 100 Layer-2 Isolation Exa m ple Configuration [...]

  • Page 182

    Chapter 12 Layer-2 Iso lation Screen NWA-3160 Series User’s Guide 182 Example 1: Restricti ng Access to Server In the following example wireless clients 1 and 2 can communicate with file server C , but not access point B or wireless client 3 . •E n t e r C ’s MAC address i n the MAC Address field, and enter “F ile Server C” in the Descrip[...]

  • Page 183

    NWA-3160 Series User’s Guide 183 C HAPTER 13 MAC Filter Screen 13.1 Overview This chapter discusses how you can use the Wireless > MAC Filter sc reen. The MAC filter function allows you to co nfigure the NWA t o grant access to devices (Allow Association) or excl ude devices from acc essing the NWA (Deny Association). Figure 103 MAC Filtering [...]

  • Page 184

    Chapter 13 MAC Filt er Screen NWA-3160 Series User’s Guide 184 characters, for example, 00:A0:C5:00:00: 02. You need to know the MAC address of each device to configure MAC fi ltering on the NWA. 13.2 The MAC Filter Screen The MAC filter profile is a user-configured list of MAC addresse s. Each SSID profile can reference one MAC filter profile. T[...]

  • Page 185

    Chapter 13 MAC Filter Scr een NWA-3160 Series User’s Guide 185 13.2.1 Configuring the MAC Filter To change your NWA’s MAC filter setti ngs, click WIRELESS > MAC Filter > Edit . The screen appears as shown. Note: To activate MAC filtering on an SSID profile, select the correct filter from the Enable MAC Filtering drop-down list box in the [...]

  • Page 186

    Chapter 13 MAC Filt er Screen NWA-3160 Series User’s Guide 186 Note: If you configure both the MAC Address Filter table and Group Settings table and a client matches a MAC address specified in both table s, the settings in the Group Settings is applied by the NWA first. Filter Action Define the filter action for the list of MAC addresses in the M[...]

  • Page 187

    NWA-3160 Series User’s Guide 187 C HAPTER 14 IP Screen 14.1 Overview The Internet Protocol (IP) address iden tifies a devi ce on a network. Every networking device (including comput ers, se rvers, routers, printers, etc.) needs an IP address to communicate across the netw ork. These networking devi ces are also known as hosts. Figure 106 IP Setup[...]

  • Page 188

    Chapter 14 IP Screen NWA-3160 Series User’s Guide 188 These parameters should work fo r the majority of installations. 14.2 The IP Screen Use this screen to configure the IP address for y our NWA . Click IP to display the following screen. Figure 107 IP Setup The following table describes t h e labels in this screen. Table 50 IP Setup LABEL DESCR[...]

  • Page 189

    Chapter 14 IP Scree n NWA-3160 Series User’s Guide 189 14.3 Technical Reference This section provides technical backg round information about the topics covered in this chapter. 14.3.1 WAN IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet (only betwee n your two bra[...]

  • Page 190

    Chapter 14 IP Screen NWA-3160 Series User’s Guide 190[...]

  • Page 191

    NWA-3160 Series User’s Guide 191 C HAPTER 15 Rogue AP Detection 15.1 Overview Rogue APs are wireless access points operat ing in a network’s co verage area t hat are not under the control of the network’s administrators, and can open up holes in a network’s security. Atta ckers can take advantage of a rogue AP’s weaker (or non-existent) s[...]

  • Page 192

    Chapter 15 Rogue AP Detection NWA-3160 Series User’s Guide 192 In the example above, a corporate networ k’ s security is compromised by a rogue AP ( R ) set up by an employee at his workst ation in order to allow him to connect his notebook computer wirelessly ( A ). The company’s legitimate wireless net work (the dashed el lipse B ) is well [...]

  • Page 193

    Chapter 15 Rogue AP Detectio n NWA-3160 Series User’s Guide 193 The friend ly AP list d isplays d etails of a ll the acce ss point s in your area t hat you k n o w a r e n o t a t h r e a t . I f y o u h a v e m o r e t h a n o n e A P i n y o u r n e t w o r k , y o u n e e d t o configure this list to include your ot her AP s. If your wireless [...]

  • Page 194

    Chapter 15 Rogue AP Detection NWA-3160 Series User’s Guide 194 This scenario can also be part of a wirele ss deni al of service (DoS) at tack, in which associated wireless clients are deprived of network access. Other opportunities for the attacker include the in troduction of malware (malicious software) into t he network. 15.2 Configuration Scr[...]

  • Page 195

    Chapter 15 Rogue AP Detectio n NWA-3160 Series User’s Guide 195 15.2.1 Friendly AP Screen Use this screen to specif y APs as trusted. Click Ro gue AP > Friendly AP . Th e following screen appears: Figure 111 Rogue AP Friendly AP The following table describes t h e labels in this screen. Import Click this button to upload the previously-saved l[...]

  • Page 196

    Chapter 15 Rogue AP Detection NWA-3160 Series User’s Guide 196 15.2.2 Rogue AP Screen Use this scren to dis play details of all wireless access p oints within the NWA’s coverage area. Click Rogue AP > Rogue AP . The following screen displays. Figure 112 Rogue AP The following table describes t h e labels in this screen. Radio Mode The field [...]

  • Page 197

    Chapter 15 Rogue AP Detectio n NWA-3160 Series User’s Guide 197 MAC Address This field displays the Medi a Access Control (MAC) address of the AP. All wireless devices have a MAC address that uniquely identifies them. SSID This field displays the Service Set IDentifier (also known as the networ k name) of the AP. Channel This field displays the w[...]

  • Page 198

    Chapter 15 Rogue AP Detection NWA-3160 Series User’s Guide 198[...]

  • Page 199

    NWA-3160 Series User’s Guide 199 C HAPTER 16 Remote Management Screens 16.1 Overview This chapter shows you how to enable remote management of your NWA. It provides information on dete rmining which services or protocols can access which of the NWA’s interfac es. Remote Management allows a user to ad m i nistrate the device ov er the network. Y[...]

  • Page 200

    Chapter 16 Remo te Management Screens NWA-3160 Series User’s Guide 200 16.1.1 What You Can Do in th e Remote Management Screens •U s e t h e Telnet screen (see Section 16.2 on page 202 ) to con figure through which interface(s) and from which IP a ddress(es) you can use Telnet to manage the NWA. A Telnet connection is prio ritized by the NWA ov[...]

  • Page 201

    Chapter 16 Remot e Manageme nt Screens NWA-3160 Series User’s Guide 201 Note: SNMP is only available if TCP/IP is con figured. Figure 114 SNMP Manageme nt Mode An SNMP managed network consists of tw o main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the NWA). An agent transl[...]

  • Page 202

    Chapter 16 Remo te Management Screens NWA-3160 Series User’s Guide 202 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The NWA automatically logs you out if the management session remains idle for longer t han this timeout period. The management se ssion does not time out when a statistics[...]

  • Page 203

    Chapter 16 Remot e Manageme nt Screens NWA-3160 Series User’s Guide 203 16.3 The FTP Screen You can uplo ad and download t he NWA’s firmware and conf iguration files usi ng FTP. To use this feature, your computer must have an FTP client. Secured Client IP Address A secured client is a “trusted” computer that is allowed to communicate with t[...]

  • Page 204

    Chapter 16 Remo te Management Screens NWA-3160 Series User’s Guide 204 To change your NWA’s FTP settings, cl ick REMOTE MGMT > FTP . The following screen displays. Figure 116 Remote Manageme nt: FTP The following table describes t h e labels in this screen. 16.4 The WWW Screen You can choose to configure your NWA via t he World Wide Web ( WW[...]

  • Page 205

    Chapter 16 Remot e Manageme nt Screens NWA-3160 Series User’s Guide 205 To change your NWA’s WWW settings, click REMOTE MGNT > WWW . The following screen shows. Figure 117 Remote Manageme nt: WWW The following table describes t h e labels in this screen. Table 57 Remote Mana gement: WWW LABEL DESCRIPTION WWW Server Port This is set to port 8[...]

  • Page 206

    Chapter 16 Remo te Management Screens NWA-3160 Series User’s Guide 206 Server Port The HTTPS proxy server listens on port 443 by default. If you change the HTTPS proxy serv er port to a different n umber on the NWA, for example 8443, then you must notify people who need to access the NWA web configurator to use "https://NWA IP Address: 8443 [...]

  • Page 207

    Chapter 16 Remot e Manageme nt Screens NWA-3160 Series User’s Guide 207 16.5 The SNMP Screen Use this screen to have a manager st ation administrate your NWA over the network. To change your NWA’s SNMP settings, click REMOTE MGMT > SNMP . The following screen displays. Figure 118 Remote Manageme nt: SNMP The following table describes t h e l[...]

  • Page 208

    Chapter 16 Remo te Management Screens NWA-3160 Series User’s Guide 208 SNMP Version Select the SNMP version for the NW A. The SNMP version on the NWA must match the version on the SNMP manager. Choose SNMP version 1 ( SNMPv1 ), SNMP version 2 ( SNMPv2 ) or SNMP version 3 ( SNMPv3 ). Trap Community Type the trap community, which is the password se[...]

  • Page 209

    Chapter 16 Remot e Manageme nt Screens NWA-3160 Series User’s Guide 209 16.5.1 SNMPv3 User Profile Use this screen to configure the SNMPv3 profile. Click Conf igure SNMPv3 User Profile in the REMOTE MGMT > SNMP screen, the following screen displays. Figure 119 Remote Mana gement: SNMPv3 User Profile The following table describes t h e labels i[...]

  • Page 210

    Chapter 16 Remo te Management Screens NWA-3160 Series User’s Guide 210 16.6 Technical Reference This section provides some technical ba ckground information about the topic s covered in this chapter. 16.6.1 MIB Managed devices in an SMNP managed network contain ob ject variables or managed objects that define each piece of information to be colle[...]

  • Page 211

    Chapter 16 Remot e Manageme nt Screens NWA-3160 Series User’s Guide 211 device. Examples of variables incl ude such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects. SNMP itself is a si mple reques t/response protocol based on the manager/ agent model. The manager issues a[...]

  • Page 212

    Chapter 16 Remo te Management Screens NWA-3160 Series User’s Guide 212 Some traps include an SNMP interface index. The following table maps the SNMP interface indexes to the NWA’s physical and virtual ports. authenticationFailure (defined in RFC-1215 ) 1.3.6.1.6.3 .1.1.5.5 The device sends this trap when it receives any SNMP get or set requirem[...]

  • Page 213

    NWA-3160 Series User’s Guide 213 C HAPTER 17 Internal RADIUS Server 17.1 Overview This chapter describes how the NWA can use its internal RADIUS s e rver to authenticate wireless clients. Remote Authentication Dial In User Serv ice (RADIUS) is a protocol that enables you to control acce ss to a network b y authentica ting user creden tials. The f[...]

  • Page 214

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 214 17.1.1 What You Can Do in this Chapter •U s e t h e Setting screen (see Section 17.2 on page 214 ) to turn the NWA’s internal RADIUS server of f or on an d to view informa tion about the NW A’s certificates. •U s e t h e Trusted AP screen (see Section 17.3 on page 216 ) to[...]

  • Page 215

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 215 The following table describes t h e labels in this screen. Table 62 Internal RADIUS Server Setting LABEL DESCRIPTION Active Select this to have the NWA use its internal RADIUS server to authenticate wireless clients or other APs. Index This field displays the certificate index num[...]

  • Page 216

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 216 17.3 The Trusted AP Screen Use this screen to specif y APs as trusted. Click AUTH. SERVER > Trusted AP. The following screen displays. Figure 122 Trusted AP Screen The following table describes t h e labels in this screen. Table 63 Trusted AP Screen LABEL DESCRIPTION Index This[...]

  • Page 217

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 217 17.4 The Trusted Users Screen Use this screen to conf igure trusted user entries. Clic k AUTH. SERVER > Trusted Users . The following screen displays. Figure 123 Trusted Users The following table describes t h e labels in this screen. Table 64 Trusted Users LABEL DESCRIPTION In[...]

  • Page 218

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 218 17.5 Technical Reference This section provides some technical ba ckground information about the topic s covered in this chapter. A trusted AP is an AP that uses the NWA’ s internal RADIUS server to authenti cate its wireless client s. Each wireless clie nt must have a user name [...]

  • Page 219

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 219 PEAP (Protected EAP) and MD5 authentica ti on is implemented on the internal RADIUS server using simple us ername and password methods over a secure TLS connection. See Appendix A on page 303 for more information on the types of EAP authentication and the internal RADIUS au thenti[...]

  • Page 220

    Chapter 17 Internal RADIUS Server NWA-3160 Series User’s Guide 220[...]

  • Page 221

    NWA-3160 Series User’s Guide 221 C HAPTER 18 Certificates 18.1 Overview This chapter describes how your NWA can use certificates as a means of authenticating wireless cl ients. It gi ve s background information about p ublic-key certificates and explains how to use them. A certificate contains the certificate owner’ s id entity and public key. [...]

  • Page 222

    Chapter 18 Certificates NWA-3160 Series User’s Guide 222 18.1.2 What You Need To Know About Certificates The following terms and conc epts may help as you read through this chapter. The NWA also trusts any valid certifi cate si gned by any of the imported trusted CA certificates . The certif ication au thority cert ificate that you want to import[...]

  • Page 223

    Chapter 18 Certificates NWA-3160 Series User’s Guide 223 The following table describes t h e labels in this screen. Table 65 Certificates > My Certificates LABEL DESCRIPTION PKI Storage Space in Use This bar displays the percentage of the NWA’s PKI storage space that is currently in use. When you are usi ng 80% or less of the storage s pace,[...]

  • Page 224

    Chapter 18 Certificates NWA-3160 Series User’s Guide 224 18.2.1 My Certificates Import Screen Use this screen to import a certificate from your loc al computer to the NWA. Note: You can import only a certificate that matches a corresponding certification request that was generated by the NWA. Click Certificates > My Certificates and then Impor[...]

  • Page 225

    Chapter 18 Certificates NWA-3160 Series User’s Guide 225 Note: You must remove any spaces from the certificate ’s filename before you can import it. Figure 127 Certificates > My Certif icates Import The following table describes t h e labels in this screen. Table 66 Certificates > My Certificate Import LABEL DESCRIPTION File Path Type in [...]

  • Page 226

    Chapter 18 Certificates NWA-3160 Series User’s Guide 226 18.2.2 My Certificates Create Screen Use this screen to have the NWA create a self-signed certificate, enroll a certificate with a certification authorit y or generate a certification request. Click Certificates > My Certificates and then Create to open the My Certificate Create screen. [...]

  • Page 227

    Chapter 18 Certificates NWA-3160 Series User’s Guide 227 Common Name Select a radio button to id entify the certificate’s owner by IP address, domain name or e-mail address. Type the IP address (in dotted decimal notation), domain name or e-mail address in the field provided. The domain name or e-mail address can be up to 31 ASCII characters. T[...]

  • Page 228

    Chapter 18 Certificates NWA-3160 Series User’s Guide 228 After you click Apply in the My Certificate Create screen, you see a screen that tells you the NWA is generating the self-sig ned certific ate or certification request. After the NWA succes sfully enrolls a certif icate or generates a certification request or a self-signed certificate, you [...]

  • Page 229

    Chapter 18 Certificates NWA-3160 Series User’s Guide 229 18.2.3 My Certificates Details Screen Use this screen to view in-depth ce rtificate information and change the certificate’s name. In the case of a self-si g ned certif icate, you can set it to be the one that the NWA uses to sign the trusted remote hos t certificates that you import to t[...]

  • Page 230

    Chapter 18 Certificates NWA-3160 Series User’s Guide 230 The following table describes t h e labels in this screen. Table 68 Certificates > My Certificate Details LABEL DESCRIPTION Name This field displays the identifying na me of this certificate . If you want to change the name, type up to 31 characters to identify this certificate. You may [...]

  • Page 231

    Chapter 18 Certificates NWA-3160 Series User’s Guide 231 Valid From This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable. Valid To This field displays the date th at the certificate expires. The text displays in red and[...]

  • Page 232

    Chapter 18 Certificates NWA-3160 Series User’s Guide 232 18.3 Trusted CAs Screen Use this screen to view the list of trus t ed certificates. The NWA accepts any valid certificate signed by a certif ication aut hority on this list as being trustworthy. You do not need to import any certi ficate that is signed. Click Certificates > Trusted CAs t[...]

  • Page 233

    Chapter 18 Certificates NWA-3160 Series User’s Guide 233 18.3.1 Trusted CAs Import Screen Use this screen to save a t rusted certification authorit y’s certificate to the NWA. Click Certificates > Trusted CAs to op en the Trusted CAs screen and then click Import to open the Trusted CAs Import screen. The following figure displays. Note: You [...]

  • Page 234

    Chapter 18 Certificates NWA-3160 Series User’s Guide 234 The following table describes t h e labels in this screen. 18.3.2 Trusted CAs Details Screen Use this screen to view in-depth inform ation about the certification authority’s certificate, change the certificate’s na me and set whether or not you want the NWA to check a certifi cation au[...]

  • Page 235

    Chapter 18 Certificates NWA-3160 Series User’s Guide 235 The following table describes t h e labels in this screen. Table 71 Certificates > Trusted CAs Details LABEL DESCRIPTION Name This field displays the identifying na me of this certificate. If you want to change the name, type up to 31 characters to identify this key certificate. You may [...]

  • Page 236

    Chapter 18 Certificates NWA-3160 Series User’s Guide 236 Valid To This field displays the date that the certificate expires. The text displays in red and includes an Expiring! or Expired! message if the certificate is about to expire or has already expired. Key Algorithm This field displays the type of algorithm that was used to generate the cert[...]

  • Page 237

    Chapter 18 Certificates NWA-3160 Series User’s Guide 237 18.4 Technical Reference This section provides technical backg round information about the topics covered in this chapter. 18.4.1 Private-Public Certificates When using public-key cryptology for auth enticat ion, each host has two keys. One key is public and can be made openly available. Th[...]

  • Page 238

    Chapter 18 Certificates NWA-3160 Series User’s Guide 238 18.4.3 Checking the Finger print of a Certificate A certificate’s fingerprints are message di gests calculated using the MD5 or SHA1 algorithms. The following procedure describes how to check a certificate’s fingerprint to verify that you have the actual certifi cate. 1 Browse to where [...]

  • Page 239

    NWA-3160 Series User’s Guide 239 C HAPTER 19 Log Screens 19.1 Overview This chapter provides information on vi ewing and ge nerating logs on your NWA. Logs are files that contain recorded netw ork activity over a set period. They are used by administrators to monitor t he he alth of the computer system(s) they are managing. Logs enable administra[...]

  • Page 240

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 240 •U s e t h e Log Settings screen ( Section 19.3 on page 242 ) to configure where and when the NWA will send the logs, and which logs and/ or immediate alerts it will send. 19.1.2 What You Need To Know About Logs The following terms and conc epts may help as you read through this chapter. [...]

  • Page 241

    Chapter 19 Log Screens NWA-3160 Series User’s Guide 241 Click Logs > V iew Log . The following screen displays. Figure 136 Logs > View Log The following table describes t h e labels in this screen. Table 72 Logs > View Log LABEL DESCRIPTION Display Select a log category from the drop down list box to display logs within the selected cate[...]

  • Page 242

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 242 19.3 The Log Settings Screen Use this screen to configure w here an d when the NWA will send the logs, and which logs and/or immediat e alerts to send. Click Logs > Log Settings . The following screen di splays. Figure 137 Logs > Log Settings[...]

  • Page 243

    Chapter 19 Log Screens NWA-3160 Series User’s Guide 243 The following table describes t h e labels in this screen. Table 73 Logs > Log Setting s LABEL DESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e- mail addresses specified below. If th is field is left bl ank, logs and alert messages [...]

  • Page 244

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 244 19.4 Technical Reference This section provides some technical ba ckground information about the topic s covered in this chapter. 19.4.1 Example Log Messages This section provides description s of some example log messag es. Clear log after sending mail S elect the check box to clear all log[...]

  • Page 245

    Chapter 19 Log Screens NWA-3160 Series User’s Guide 245 Table 75 ICMP Notes TYPE CODE DESCRIPTION 0 Echo Reply 0 Echo reply message 3 Destination Unreachable 0 Net unreachable 1 Host un reac hable 2 Protocol unreachable 3 Port unreachable 4 A packet that needed fragmentation was dropped because it was set to Don't Fragment (DF) 5 Source rout[...]

  • Page 246

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 246 19.4.2 Log Commands Go to the command interpre ter interface (ref er to Appendix E on page 357 for a discussion on how to access and use the command s). 19.4.3 Configuring What You Want the NWA to Log Use the sys logs load command to load the log s etting buffer that allows you to configure[...]

  • Page 247

    Chapter 19 Log Screens NWA-3160 Series User’s Guide 247 19.4.5 Log Command Example This example shows how to set the NWA to record the error logs and alerts and then view the results. ras> sys logs load ras> sys logs category error 3 ras> sys logs save ras> sys logs display access #. time source destination notes message 0 | 11/11/200[...]

  • Page 248

    Chapter 19 Log Scre ens NWA-3160 Series User’s Guide 248[...]

  • Page 249

    NWA-3160 Series User’s Guide 249 C HAPTER 20 VLAN 20.1 Overview This chapter discusses how to conf igure VLAN on the NWA. A VLAN (Virtual Local Area Network) allo ws a physical network to be partitioned into multiple logi cal networks. Stations on a logical network can belong to one or more groups. Only stations within th e same group can talk to[...]

  • Page 250

    Chapter 20 VLAN NWA-3160 Series User’s Guide 250 20.1.2 What You Need To Know About VLAN The following terms and conc epts may help as you read through this chapter. When you use wirel ess VLAN and RADIUS VLAN together, the NWA first tries to assign VLAN IDs based on RADIUS VLAN co nfiguration. If a client’s user name does not match an entry in[...]

  • Page 251

    Chapter 20 VLAN NWA-3160 Series User’s Guide 251 20.2 Wireless VLAN Screen Use this screen to enable and c onfigure your Wireless Virtual LAN setup. Click VLAN > Wireless VLAN . The following screen appears. Figure 139 VLAN > W ireless VLAN The following table describes t h e labels in this screen Table 78 VLAN > Wireless VLAN FIELD DESC[...]

  • Page 252

    Chapter 20 VLAN NWA-3160 Series User’s Guide 252 20.2.1 RADIUS VLAN Screen Use this screen to configure your RADIUS Virtual LAN setup. Your RADIUS server assigns VLAN IDs to a user or user group’ s traffic based on what you set in this screen. Native VLAN Check this to assign the Management VLAN ID as a Native VLAN. Leave this blank if you do n[...]

  • Page 253

    Chapter 20 VLAN NWA-3160 Series User’s Guide 253 Click VLAN > RADIUS VLAN . The following screen appears. Figure 140 VLAN > RADIUS VLAN The following table describes t h e labels in this screen. Table 79 VLAN > RADIUS VLAN LABEL DESCRIPTION Block station if RADIUS server assign VLAN name error Select this to have the NWA forbid access to[...]

  • Page 254

    Chapter 20 VLAN NWA-3160 Series User’s Guide 254 20.3 Technical Reference This section provides some technical ba ckground information and configuration examples abou t the topic s covered in th is chapte r. 20.3.1 VLAN Tagging The NWA supports IEEE 802.1q VLAN taggi ng. Tagged VLAN uses an explicit tag (VLAN ID) in the MAC header of a frame to i[...]

  • Page 255

    Chapter 20 VLAN NWA-3160 Series User’s Guide 255 On an Ethernet switch, create a VLAN th at has the same management VLAN ID as the NWA. The followi ng figure has the NWA connected to port 2 and your computer connected to port 1. The management VLAN ID i s 10. Figure 141 Manageme nt VLAN Configuration Example Perform the following steps in the swi[...]

  • Page 256

    Chapter 20 VLAN NWA-3160 Series User’s Guide 256 8 Click Apply . The foll owing screen displays. Figure 143 VLAN-A ware Switch 9 Click VLAN S tatus to display the following screen. Figure 144 VLAN-Aware Switch - VLAN Status Follow the instructions in the Quick Start Guide to set up your NWA for configura tion. The NWA should be con nec ted to the[...]

  • Page 257

    Chapter 20 VLAN NWA-3160 Series User’s Guide 257 3 Click Apply . Figure 145 VLAN Setup 4 The NWA attempts to connect with a VL AN-aware device. You can now access and mange the NWA though the Ethernet switch. Note: If you do not connect the NWA to a correctly configured VLAN-aware device, you will lock yourself out of the NWA. If this happens, yo[...]

  • Page 258

    Chapter 20 VLAN NWA-3160 Series User’s Guide 258 ZyXEL uses the following standard RADIUS attributes returned from Microso ft’s IAS RADIUS service to place the wire less station into the correct VLAN: The following occurs under Dynamic VLAN Assignment: 1 When you configure your wireless credenti als, the NWA sends the information to the IAS ser[...]

  • Page 259

    Chapter 20 VLAN NWA-3160 Series User’s Guide 259 1c Select the Security Group type parameter check box. 1d Click OK . Figure 146 New Global Security Group 2 In VLAN Group ID Properties , click th e Members tab. Note: The IAS uses group memberships to dete rmine which user accounts belong to which VLAN groups. Click the Add button and configure th[...]

  • Page 260

    Chapter 20 VLAN NWA-3160 Series User’s Guide 260 1 Using the Remote Access Policy option on the Internet Authentication Service management interface, create a new VLAN Policy for each VLAN Group defined in the previous section. The or der of the remote access policies is important. The most specific policies should be placed at the top of the pol[...]

  • Page 261

    Chapter 20 VLAN NWA-3160 Series User’s Guide 261 3 In the Select Attribute screen, click Wind ows-Groups and the Add button. Figure 149 Specifyin g Windows-Group Condition 4 The Select Groups window displ ays. Sele ct a remote ac cess poli cy and click the Add button. The policy is added to the fi eld below. Only one VL AN Group should be associa[...]

  • Page 262

    Chapter 20 VLAN NWA-3160 Series User’s Guide 262 6b Click the Edit Profile button. Figure 151 Granting Permissions a nd User Profile Screen s 7 The Edit Dial-in Profile screen displays. Click the Authentication tab and select the Extensible Authentication Protocol check box. 7a Select an EAP ty pe depend ing on your authentication needs from the [...]

  • Page 263

    Chapter 20 VLAN NWA-3160 Series User’s Guide 263 8 Click the Encryption tab. Select the Strongest encryption option. This step is not required for EAP-MD5, but is performed as a safeguard. Figure 153 Encryp tion Tab Settings 9 Click the IP tab and select the Client may request an IP address check box for DHCP support. 10 Click the Advanced tab. T[...]

  • Page 264

    Chapter 20 VLAN NWA-3160 Series User’s Guide 264 11 The RADIUS Attribute screen di splays. From the list, three RADIUS attributes will be added: • Tunnel-Medium-T ype • Tunnel-Pvt-Group-ID • Tunnel-Type 11a Click the Add button 11b Select Tunnel-Medium-Type 11c Click the Add button. Figure 155 RADIUS Attribute Screen 12 The Enumerable Attri[...]

  • Page 265

    Chapter 20 VLAN NWA-3160 Series User’s Guide 265 13 Return to the RADIUS Attribute Screen shown as Figure 155 on page 264 . 13a Select Tunnel-Pvt-Group-ID. 13b Click Add . 14 The Attribute Information scre en displays. 14a In the Enter the attribute value in: field select String and type a number in the range 1 to 4094 or a Name for this policy. [...]

  • Page 266

    Chapter 20 VLAN NWA-3160 Series User’s Guide 266 16b Click OK . Figure 158 VLAN Attribute Setting for Tunnel-Type 17 Return to the RADIUS Attribute Screen shown as Figure 155 on page 264 . 17a Click the Close button. 17b The completed Advanced tab config uration should re semble the fol lowing screen. Figure 159 Completed Advanced Tab Note: Repea[...]

  • Page 267

    Chapter 20 VLAN NWA-3160 Series User’s Guide 267 20.3.4 Second Rx VLAN ID Example In this example, the NWA is configured to tag packets from SSID01 with VLAN ID 1 and tag packets from SSID02 with VLAN ID 2. VLA N 1 and VLAN 2 ha ve access to a server, S , and the Internet, as show n in the follo wing fi gure. Figure 160 Second Rx VLAN ID Example [...]

  • Page 268

    Chapter 20 VLAN NWA-3160 Series User’s Guide 268 2 Click VLAN > Wireless VLAN . 3 If VLAN is not already enabled, click Ena ble Virtual LAN and set up the Management VLAN ID (see Section 20.3.2 on page 2 54 ). Note: If no devices are in the management VLAN, then no one will be able to access the NWA and you will have to restore the de fault co[...]

  • Page 269

    NWA-3160 Series User’s Guide 269 C HAPTER 21 Load Balancing 21.1 Overview Wireless load balancing is the process whereby you limit the number of connections allowed on an wireless access point (AP) or you limit the amount of wireless traffic transmitted and received on it . Because there is a hard upper limit on the AP’s wireless bandwi dth, th[...]

  • Page 270

    Chapter 21 Load Balancing NWA-3160 Series User’s Guide 270 Imagine a coffee shop in a crowded business distri ct that offers free wireless connectivity to its customers. The c off ee shop owner can’t possibly know how many connections his NWA w ill have at an y given moment. As such, he decides t o put a limit on the ba ndwidth that is av ailab[...]

  • Page 271

    Chapter 21 L oad Balancing NWA-3160 Series User’s Guide 271 The requirements for load balanc ing are fair ly straight forward an d should be met in order for a gr oup of similar NWAs to t ake advantage of the feature: • They should all be within t he same subnet. • They should all have the same SSI D, radio mode , and security mod e. • Ther[...]

  • Page 272

    Chapter 21 Load Balancing NWA-3160 Series User’s Guide 272 21.2.1 Disassociating and Delaying Connections When your AP becomes overloaded, there are two basic responses it c an take. The first one is t o “delay” a client connecti on. This means that the AP withholds the connection unt il the data transfe r throughput is lowere d or the client[...]

  • Page 273

    Chapter 21 L oad Balancing NWA-3160 Series User’s Guide 273 can afford the bandwidth for it or the red la ptop is p i cked up by a different AP that has bandwidth to spare. Figure 164 Delaying a Co nnection The second response your AP can take is to kick the connecti ons that are pushing it over its balanced bandwidth allotment. Figure 165 Kickin[...]

  • Page 274

    Chapter 21 Load Balancing NWA-3160 Series User’s Guide 274[...]

  • Page 275

    NWA-3160 Series User’s Guide 275 C HAPTER 22 Dynamic Channel Selection 22.1 Overview This chapter discusses how to configure dynamic channel selection on the NWA. Dynamic channel selection is a feature t h at allows your NWA to automatically select the radio channel upon which i t broadcasts by scanning the area around and determining what channe[...]

  • Page 276

    Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 276 In this example, if the NWA attempts to broadcast on channels 1, 6, or 11 it is met with cross-channel interf erence from the other AP that shares the channel. This can result in noticeably sl ower da ta transfer rates, the dropping of the connection altogether, or even lost da[...]

  • Page 277

    Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 277 DCS Sensitivity Level Selec t the NWA’s sensitivity level toward other channels. Options are High , Medium , and Low . Generally, as long as the area in which your NWA is located has minimal interference from other devices you can set the DCS Sensitivity Level to Low . This m[...]

  • Page 278

    Chapter 22 Dynamic Channel Selection NWA-3160 Series User’s Guide 278[...]

  • Page 279

    NWA-3160 Series User’s Guide 279 C HAPTER 23 Maintenance 23.1 Overview This chapter describes the maintenance screens. It discusses how you can view the association list and channel us age, upload new firmware, manage configuration and rest art your NW A without turning it of f and on. 23.1.1 What You Can Do in the Maintenance Screens The followi[...]

  • Page 280

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 280 23.2 Association List Screen Use this screen to know which wireless clie nts are associated with the NWA. Click Maintenance > Association List . The following screen displays. Figure 168 Association L ist The following table describes t h e labels in this screen. Table 83 Asso ciation Lis[...]

  • Page 281

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 281 23.3 Channel Usage Screen Use this screen to see what channel the wireless clients are using to associate with the NWA, as well as the signal strength and network mode. Click Maintenance > Channel Usage . The following figure displays. Wait a moment while the NWA compiles the information.[...]

  • Page 282

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 282 23.4 F/W Upload Screen Use this screen to upload firmware to your NWA. Click MAINTENANCE > F/W Up load . The following screen displa ys. Figure 170 F/W Upload The following table describes t h e labels in this screen. Do not turn off the NWA while firmware upload is in progress! After you[...]

  • Page 283

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 283 The NWA automatically restarts in th is time causing a temporary network disconnect. In some operating systems , you may see the following icon on your desktop. Figure 172 Network Tempora rily Disconnected After two minutes, log in again and ch eck your new firmware versio n in the System St[...]

  • Page 284

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 284 23.5 Configuration Screen Use this screen backup or upload your NWA’s configuration file. You can also reset the configu ration o f your device in this scre en. Click Maintenance > Configuration . The following figure d isplays. Figure 174 Configurati on 23.5.1 Backup Configuration Back[...]

  • Page 285

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 285 23.5.2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NWA. Do not turn off the NWA while co nfiguration file upload is in progress. After you see a “restore configurat ion su ccessf ul” screen, you [...]

  • Page 286

    Chapter 23 Maintenance NWA-3160 Series User’s Guide 286 If the upload was not successful , the following screen will appear. Click Return to go back to the Configuration screen. Figure 177 Configuratio n Upload E rror 23.5.3 Back to Factory Defaults Pressing the Reset button in this section c lears all user-entered configuration information and r[...]

  • Page 287

    287 P ART III Appendices and Index Troubleshooting (289) Product Specifications (297) Power Adaptor Specifications (247) Setting up Your Computer’s IP Addres s (249) Wireless LANs (303) Pop-up Windows, JavaScripts and Java Permissions (319) IP Addresses and Subnetting (327) Text File Based Auto Configuration (349) Legal Information (363) Customer[...]

  • Page 288

    288[...]

  • Page 289

    NWA-3160 Series User’s Guide 289 C HAPTER 24 Troubleshooting 24.1 Overview This chapter offers some suggestions t o solve problems you might encounter. The potential problems are divided into the following categori es. • Power, Hardware Connections, and LED s • NWA Access and Login • AP Management Modes • Internet Access • Wireless Rout[...]

  • Page 290

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 290 • Inspect your cables for damage. Contact the vendor to replace any damaged cables. • Disconnect and re-connect th e power adaptor to the NWA. • If the proble m continue s, contact the vendor. 24.3 NWA Access and Login I forgot the IP address for the NWA. • The default IP addres[...]

  • Page 291

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 291 • The default password is 1234 . • If this does not work, you have to rese t the device to its factory defaults. See Section 2.3 on page 36 . I cannot see or access the Login screen in the w eb configurator. • Make sure you are using the correct IP address. • The default IP addr[...]

  • Page 292

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 292 • Disconnect and re-connect the po wer adaptor or cord to the NWA. • If this does not work, you have to rese t the device to its factory defaults. See Section 2.3.1 on page 36 . I cannot access the NWA via the console port. • Check to see if the NW A is connected to your comp uter[...]

  • Page 293

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 293 The secondary controller AP’s wireless profiles do not appear in my wireless network. In case you have both primary and seco ndary controller APs in the network, the secondary controller AP’s WLAN radio is turned off as long as the primary controller AP is turned on. Thus, you will [...]

  • Page 294

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 294 24.5 Internet Access I cannot access the Internet. • Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 24.2 on page 289 . • Make sure you entered your I SP account infor mation correctly. These fields are case-sens[...]

  • Page 295

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 295 Check the settings for QoS. If it is disabled, you might consider activating it. If it is enabled, you might consider rais ing or lowering the priority for some applications. 24.6 Wireless Router/AP Troubleshooting I cannot access the NWA or ping any computer fr om the WLAN. • Make su[...]

  • Page 296

    Chapter 24 Trou bleshooting NWA-3160 Series User’s Guide 296[...]

  • Page 297

    NWA-3160 Series User’s Guide 297 C HAPTER 25 Product Specifications The following tables summarize the NW A’s hardware and firmware features. Table 87 Hardware Specifications Power Specification 12 V DC, 1. 5 A Reset button Returns all settings to their factory defaults. Ethernet Port • Auto-negotiating: 10 Mbps or 100 Mbps in either half-dup[...]

  • Page 298

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 298 Output Power IEEE 802.11a: 5150-5250 Using single antenna: 12dBm IEEE 802.11a: 5250 - 5850 Using single antenna:18dbm IEEE 802.11b Using single antenna: 17dBm IEEE 802.11g Using single antenna: 14dBm IEEE 802. 11gn: HT 20 Using single antenna: 12.5dBm Using three antennas: 17dBm I[...]

  • Page 299

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 299 Table 88 Firmware Specifications Default IP Address 192.168.1.2 Default Subnet Mask 255.255.255.0 (2 4 bits) Default Password 1234 Wireless LAN Standards (NWA-3160, NWA-3163) IEEE 802.11 a, IEEE 802.11b, IEEE 802.11g (NWA-3166) IEEE 802.11a, IEEE 802.11b, IEEE 80 2.11g, IEEE 802.1[...]

  • Page 300

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 300 25.1 Wall-Mounting Instructions Complete the following steps to hang your NWA on a wall. Note: See Table 25 on page 297 for the size of screws to use an d how far apart to place them. 1 Select a position free of ob structions on a sturdy wall. 2 Drill two holes for the screws. Be [...]

  • Page 301

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 301 5 Align the holes on the back of the NWA with the screws on the wall. Hang the NWA on the screws. Figure 180 Wall-mounting Examp le The following are dimensions of an M4 tap screw and masonry plug used for wall mounting. All measurements are in millimeter s (mm). Figure 181 Masonr[...]

  • Page 302

    Chapter 25 Product Specifications NWA-3160 Series User’s Guide 302[...]

  • Page 303

    NWA-3160 Series User’s Guide 303 A PPENDIX A Wireless LANs Wireless LAN Topologies This section discuss es ad-hoc and infr astructure wi reless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configurat ion is an in dependent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more [...]

  • Page 304

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 304 with each other. When Int ra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with eac h other. Figure 183 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with e[...]

  • Page 305

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 305 An ESSID (ESS IDentification ) uniquely identifies each ESS. All ac cess points and their associated wirel ess clients withi n the same ESS mus t have the same ESSID in order to comm unicate. Figure 184 Infrastructure WLAN Channel A channel is the radio frequency(ies) us ed by IEEE 802.11[...]

  • Page 306

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 306 RTS/CTS A hidden node occurs when two stations are within range of t he same access point, but are not within ra nge of each other. The foll owing figure illustrates a hidden node. Both stations (STA) are with in range of the access poin t (AP) or wireless gateway, but out-of-range of each[...]

  • Page 307

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 307 network overhead involved in the RTS (R equest To Send)/CTS (Clear to Send) handshake. If the RTS/CTS value is greater than the Fr agmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragment ed befor[...]

  • Page 308

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 308 Note: The AP and the wireless adapters MUST use the same preamble mode in order to communicate. IEEE 802.11g Wireless LAN IEEE 802.11g is fully compatible with th e IEEE 802.11b standard. This means an IEEE 802.11b adapter can interface directly with an IEEE 802. 11g access point (and vice[...]

  • Page 309

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 309 The following figure shows the relative ef fectiveness of these wireless security methods available on your NWA. Note: You must enable the same wireless security settings on the NWA and o n all wireless clients that you want to associa te with it. IEEE 802.1x In June 2001, the IEEE 802.1x[...]

  • Page 310

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 310 • Authorization Determines the network services availa bl e to authenticated users once they are connected to the network. •A c c o u n t i n g Keeps track of the client’s network activity. RADIUS is a simple package exchange i n which your AP acts as a message relay between the wire[...]

  • Page 311

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 311 EAP (Extens ible Authen tication P rotocol) is an authentica tion proto col that run s on top of the IEEE 802.1x trans port mechanism in order to support multiple types of user authentic ation. By usin g EAP to inte ract with an EAP-c ompatible RA DIUS server, an access point helps a wire[...]

  • Page 312

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 312 TTLS supports EAP methods and legacy authentication methods such as PAP, CHAP, MS-CHAP and MS-CHAP v2. PEAP (Protected EAP) Like EAP-TTLS, server-side ce rtificate authentication is used to establish a sec ure connection , then u se si mple username and password methods through the secured[...]

  • Page 313

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 313 WPA and WPA2 Wi-Fi Protected Ac cess (WPA) is a subset of the IEEE 802.11i s tandard. WPA2 (IEEE 802.11i) is a wireless se curity standard that defi nes str onger encryption, authentication and key management than WPA. Key differences between WPA or WPA2 an d WEP are improved data encrypt[...]

  • Page 314

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 314 The Message Integrity Check (MIC) is de signed to prev ent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, i t i[...]

  • Page 315

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 315 The Windows XP patch is a free download that adds WPA capability to Windows XP's built-in "Zero Configuration" wirele ss client. However, you must run Windows XP to use it. WPA(2) with RADIUS Application Example You need the IP address of the RADIUS se rver, its p ort numbe[...]

  • Page 316

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 316 1 First enter identical p a sswords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 an d 63 ASCII characters or 64 hexadeci mal characters (including spaces and symbols). 2 The AP checks each wireless client's pa sswor d and (only) all ows it t[...]

  • Page 317

    Appendix A Wir eless LANs NWA-3160 Series User’s Guide 317 Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, whic h propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly inc[...]

  • Page 318

    Appendix A Wireless LANs NWA-3160 Series User’s Guide 318 antenna is a theoretical perfect antenna that sends out radio signal s equally well in all directions. dBi represents the t r ue gain that the antenna provi des. Types of Antennas for WLAN There are two types of antennas us ed for wireless LAN applications. • Omni-directional antennas se[...]

  • Page 319

    NWA-3160 Series User’s Guide 319 A PPENDIX B Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your devi ce. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here . Screens for other[...]

  • Page 320

    Appendix B Po p-up Wind ows, JavaS cripts and Ja va Permission s NWA-3160 Series User’s Guide 320 1 In Internet Explorer, select Tools , Internet Options , Privacy . 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 189 Internet Options: Privacy 3 Cl[...]

  • Page 321

    Appendix B Pop-u p Windows, JavaScri pts and Java Permissions NWA-3160 Series User’s Guide 321 2 Select Settings… to open the Pop-up Blocker Settings screen. Figure 190 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http ://”. For example, http://192.168.16[...]

  • Page 322

    Appendix B Po p-up Wind ows, JavaS cripts and Ja va Permission s NWA-3160 Series User’s Guide 322 4 Click Add to move the IP address to the list of Allowed si tes . Figure 191 Pop-up Blo cker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setti ng. JavaScripts If pages of the web configurator d o not display pr[...]

  • Page 323

    Appendix B Pop-u p Windows, JavaScri pts and Java Permissions NWA-3160 Series User’s Guide 323 1 In Internet Explorer, click Tools , Internet Options and then the Security tab. Figure 192 Internet Options: Secu rity 2 Click the Custom Level... button . 3 Scroll down to Scriptin g . 4 Under Active scripting make sure that Enable is selected (t he [...]

  • Page 324

    Appendix B Po p-up Wind ows, JavaS cripts and Ja va Permission s NWA-3160 Series User’s Guide 324 6 Click OK to close the window. Figure 193 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools , Internet Options and then the Security tab. 2 Click the Custom Level... button . 3 Scroll down to Microsoft VM . 4 [...]

  • Page 325

    Appendix B Pop-u p Windows, JavaScri pts and Java Permissions NWA-3160 Series User’s Guide 325 5 Click OK to close the window. Figure 194 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools , Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> un der Java (Sun) is selected.[...]

  • Page 326

    Appendix B Po p-up Wind ows, JavaS cripts and Ja va Permission s NWA-3160 Series User’s Guide 326 3 Click OK to close the window. Figure 195 Java (Sun)[...]

  • Page 327

    NWA-3160 Series User’s Guide 327 A PPENDIX C IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individ u al devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the netw ork. These networking devices a[...]

  • Page 328

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 328 The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 196 Network Number and Host ID How much of the IP address is the networ k number and how much is the host ID[...]

  • Page 329

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 329 By convention, subnet masks always cons ist of a continuous sequence of ones beginning from the leftmost bit of the mask , followed by a continuou s sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the b[...]

  • Page 330

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 330 As these two IP addresses cannot be us ed for individual hosts, calculat e the maximum number of possible host s in a network as follows: Notation Since the mask is always a continuous nu mber of ones beginning from the left, followed by a c ontinuous number of ze ros for t[...]

  • Page 331

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 331 Subnetting You can use subnetting to divide one netw ork into multiple sub -networks . In the following example a network administrator creates two sub-networks to isol ate a group of servers from the rest of th e company network for security reasons. In this example, the com[...]

  • Page 332

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 332 The following figure shows the company network afte r subnetting. Th ere are now two sub-n etworks, A and B . Figure 198 Subnetting Example: After Sub netting In a 25-bit subnet the host ID has 7 bits , so each sub-network has a maximum of 2 7 – 2 or 126 possible hosts (a[...]

  • Page 333

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 333 Each subnet contains 6 host ID bit s, giving 2 6 - 2 or 62 hosts for each subnet (a host ID of all zeroes is t he subnet it self , all ones is the subnet’s broadcast address). Table 97 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.[...]

  • Page 334

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 334 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Subnet Planning The following table is a summary for subnet planning on a network[...]

  • Page 335

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 335 The following table is a summary for subnet planning on a network with a 16-bit network number. Configuring IP Addresses Where you obtain your networ k number depends on your partic ular situation. If the ISP or your network administrator assigns you a block of registered IP [...]

  • Page 336

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 336 you entered. You don't need to c hange the subnet mask co mput ed by the NWA unless you are instru cted to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running onl y betwee[...]

  • Page 337

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 337 Windows 95/98/Me Click Start , Settings , Control Panel and double-click the Network icon to open the Network window Figure 199 WIndows 95/98/Me: Netwo rk: Configuration Installing Components The Network window Configuration tab displays a list of ins talled components. You n[...]

  • Page 338

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 338 3 Select Microsoft from the list of manufacturers . 4 Select TCP/IP from the list of network protocols and then click OK . If you need Client for Mic r osoft Networks: 1 Click Add . 2 Select Client and then click Add . 3 Select Microsoft from the list of manuf acturers. 4 S[...]

  • Page 339

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 339 3 Click the DNS Configuration tab. • If you do not know your DNS information, select Disabl e DNS . • If you know your DNS inf ormation, select Ena ble DNS and type the information in the fields below (you may not need to fill them all in). Figure 201 Windows 95/9 8/Me: T[...]

  • Page 340

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 340 3 Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. Windows 2000/NT/XP 1 For Windows XP, click start , Control Panel . In Wind ows 2000/NT, click Start , Settings , Control Panel . Figure 202 Windows XP: Start Menu[...]

  • Page 341

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 341 3 Right-click Local Area Connection and then click Propertie s . Figure 204 Windows XP: Control Panel: Ne twork Connections: Properties 4 Select Internet Protocol (TCP/IP ) (under the General tab in Win XP) and click Properties . Figure 205 Windows XP: Local Area Connection P[...]

  • Page 342

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 342 • If you have a static IP address click Use the following IP Address and fill in the IP address , Subnet mask , and Default gateway fields. Click Advanced . Figure 206 Windows XP: Adva nced TCP/IP Setting s 6 If you do not know your gateway's IP ad dress, remove any [...]

  • Page 343

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 343 7 In the Internet Protocol TCP/IP Properties windo w (the General tab in Windows XP): •C l i c k Obtain DNS server address automatically if you do not know your DNS server IP addres s(es). • If you know your DNS server IP add ress(es), click Use the following DNS server a[...]

  • Page 344

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 344 Macintosh OS 8/9 1 Click the Apple menu, Control Panel and do uble-c lick TCP/IP to open the TCP/ IP Control Panel . Figure 208 Macintosh OS 8/9: Apple Menu[...]

  • Page 345

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 345 2 Select Ethernet built-in from the Connect via list. Figure 209 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Serv er from the Configure: list. 4 For statically assigned settings, do the following: •F r o m t h e Configure box, select Manu[...]

  • Page 346

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 346 Macintosh OS X 1 Click the Apple menu, and click System Preferences to open the System Preferences window. Figure 210 Macintosh OS X: Apple Menu 2 Click Netw ork in the icon bar. • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. ?[...]

  • Page 347

    Appendix C IP Addresses and Subnetting NWA-3160 Series User’s Guide 347 •F r o m t h e Configure box, select Manually . • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your NWA in the Ro uter address box. 5 Click Apply Now and close the window. 6 Turn on your NWA and r[...]

  • Page 348

    Appendix C IP Addresses a nd Subnetti ng NWA-3160 Series User’s Guide 348[...]

  • Page 349

    NWA-3160 Series User’s Guide 349 A PPENDIX D Text File Based Auto Configuration This chapter describes how administ rators can use text configurati on files to configure the wireless LAN setti ngs for multiple APs. Text File Based Auto Configuration Overview You can use plain text configuration files to configure the wireless LAN set tings on mul[...]

  • Page 350

    Appendix D Text File Ba sed Auto Configuration NWA-3160 Series User’s Guide 350 You can have a different configuration file for each AP. You can also have multiple APs use the same configuration file. Note: If adjacent APs use the same configu ration file, you should leave out t he channel setting since they could interf ere with each other’s w[...]

  • Page 351

    Appendix D Text File Based Auto Configuration NWA-3160 Series User’s Guide 351 Verifying Your Configurat ion File Upload Via SNMP You can use SNMP management software to d isplay the configuration file versi on currently on the device by using the following MIB. Troubleshooting Via SNMP If you have any difficulties with the conf iguration file up[...]

  • Page 352

    Appendix D Text File Ba sed Auto Configuration NWA-3160 Series User’s Guide 352 The AP ignores any improperly formatte d commands and cont inues to check the next line. If there are any errors while processing the configuration f ile, the AP generates a message with the line number and reason for the first error (subsequent errors during the proc[...]

  • Page 353

    Appendix D Text File Based Auto Configuration NWA-3160 Series User’s Guide 353 Figure 215 802.1X Configura tion File Example Figure 216 WPA-PSK Configuration File Example !#ZYXEL PROWLAN !#VERSION 12 wcfg security 2 name Test-8021x wcfg security 2 mode 8021x-static12 8 wcfg security 2 wep key1 abcdefghijk lm wcfg security 2 wep key2 bcdefghijkl m[...]

  • Page 354

    Appendix D Text File Ba sed Auto Configuration NWA-3160 Series User’s Guide 354 Figure 217 WPA Configura tion File Example Wlan Command Configuration File Example This example configuration file uses the wlan command to configure the AP to use the security and SSID profiles from the wcfg command configuration fi le examples and general wi reless [...]

  • Page 355

    Appendix D Text File Based Auto Configuration NWA-3160 Series User’s Guide 355 commands that create security and SSID pr ofiles before the commands that tell the AP to use thos e profiles. Figure 218 Wlan Configura tion File Example !#ZYXEL PROWLAN !#VERSION 15 wcfg ssid 1 name ssid-wep wcfg ssid 1 security Test-wep wcfg ssid 2 name ssid-8021x wc[...]

  • Page 356

    Appendix D Text File Ba sed Auto Configuration NWA-3160 Series User’s Guide 356[...]

  • Page 357

    NWA-3160 Series User’s Guide 357 A PPENDIX E How to Access and Use the CLI This chapter introduces the command line interface ( CLI). Accessing the CLI Use any of the following methods to acc e ss the CLI. Console Port You can use thi s method if your NWA h as a console port. 1 Connect your computer to the console port on the NWA using the approp[...]

  • Page 358

    Appendix E Ho w to Access a nd Use the C LI NWA-3160 Series User’s Guide 358 2 Open a Telnet session to the NWA’ s IP addre ss. If this is your first login, use the default values. Make sure your computer IP address is in the same subnet, unless you are accessing the NWA through on e or more routers. In th e latter case, make sure remote manage[...]

  • Page 359

    Appendix E How to Access and Use the CLI NWA-3160 Series User’s Guide 359 • Commands are in courier new font . • Required input values are in an gle brackets <>; for example, ping < ip- address > means that you must specif y an IP address for t his command. • Optional fields are in square br ackets []; for instance in the show l[...]

  • Page 360

    Appendix E Ho w to Access a nd Use the C LI NWA-3160 Series User’s Guide 360 Copy and Paste Commands You can copy and paste commands directly fr om this document into your terminal emulation console window (such as HyperT erminal). Use right- click (not [CTRL]- [V]) to paste your command into th e console window as shown next. Using Shortcuts and[...]

  • Page 361

    Appendix E How to Access and Use the CLI NWA-3160 Series User’s Guide 361 Saving Your Configuration In the NWA some commands are saved as yo u run them and others require you to run a save command. See the relat ed sect ion of this guide to see if a save command is required. Note: Unsaved configurat ion changes are lost once you restart the NWA L[...]

  • Page 362

    Appendix E Ho w to Access a nd Use the C LI NWA-3160 Series User’s Guide 362[...]

  • Page 363

    NWA-3160 Series User’s Guide 363 A PPENDIX F Legal Information Copyright Copyright © 2008 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval syst em, translated into any language, or transmitted in any form or by any me ans, el ectronic, mechan[...]

  • Page 364

    Appendix F L egal Informa tion NWA-3160 Series User’s Guide 364 • This device mus t accept any int erference recei ved, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provid[...]

  • Page 365

    Appendix F Legal Information NWA-3160 Series User’s Guide 365 前項合法通信,指依電信規定作 業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療 用電波輻射性電機設備之干擾。 在 5250MHz~5350M Hz 頻帶內操作之無 線資訊傳輸設 備,限於室內 使用。 本機限在不?[...]

  • Page 366

    Appendix F L egal Informa tion NWA-3160 Series User’s Guide 366 Note Repair or replacement, as provided unde r this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warrantie s, express or implied, including any implied warrant y of merchantability or fitness for a particular use or purpose. ZyXEL shall in[...]

  • Page 367

    Index NWA-3160 Series User’s Guide 367 Index A access 24 access point 24 access privileges 29 accessing the CLI 357 address 110 address assignment 110 , 189 address filtering 23 administrator authentication on RADIUS 117 Advanced Encryption Standard See AES. AES 313 alternative subnet mask notation 330 antenna 297 directional 318 gain 317 omni-di[...]

  • Page 368

    Index NWA-3160 Series User’s Guide 368 D default 286 DFS 145 Differentiated Services 157 DiffServ 156 DiffServ Code Point (DSC P) 157 DiffServ Code Points 157 DiffServ marking rule 157 dimensions 298 disclaimer 363 Distribution System 120 DS fiel d 157 DSCPs 157 DTLS 30 , 87 Dynamic Frequency Selection 145 dynamic WEP key exchange 312 E EAP authe[...]

  • Page 369

    Index NWA-3160 Series User’s Guide 369 log descriptions 244 login 358 logs 239 M MAC address 23 , 178 , 183 MAC address filter action 186 MAC filter 30 MAC filtering 299 maintenance 23 management 23 Management Information Base (MIB) 211 Management Mode 87 CAPWAP and DHCP 88 CAPWAP and IP Subnets 88 managed AP 88 standalone mode 87 management VLAN[...]

  • Page 370

    Index NWA-3160 Series User’s Guide 370 reset button 297 restore 285 roaming 146 requirements 147 rogue AP 23 , 193 , 194 , 195 root bridge 144 RTS (Request To Send) 306 threshold 306 , 307 S safety warnings 8 saving configuration 361 screws 300 security 25 security profiles 23 server 23 Service Set 122 , 126 , 136 , 143 Service Set Identifier see[...]

  • Page 371

    Index NWA-3160 Series User’s Guide 371 wireless client WPA supplicants 314 Wireless Distribution System (WDS) 28 wireless Internet connection 24 wireless LAN 295 wireless security 29 , 159 , 295 , 30 8 WLAN interference 305 security parameters 316 WMM 153 WPA 23 , 313 key caching 314 pre-authentication 314 user authentication 314 vs WPA-PSK 314 w[...]

  • Page 372

    Index NWA-3160 Series User’s Guide 372[...]