Senao Co OA35705001 Outdoor Access Point User Manual ZyBook

Senao International Co Ltd Outdoor Access Point ZyBook

Contents

Manual Pt1

Download: Senao Co OA35705001 Outdoor Access Point User Manual ZyBook
Mirror Download [FCC.gov]Senao Co OA35705001 Outdoor Access Point User Manual ZyBook
Document ID620616
Application IDvCPkR9Lu6gMadwB3kE/ZLg==
Document DescriptionManual Pt1
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize205.08kB (2563523 bits)
Date Submitted2006-01-18 00:00:00
Date Available2006-01-18 00:00:00
Creation Date2006-01-18 08:45:32
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2006-01-18 08:46:52
Document TitleZyBook.book
Document CreatorFrameMaker 7.1
Document Author: johng

NOA-3570
Outdoor Access Point
User’s Guide
Version 3.50
12/2005
Certifications
1 Select the certification you wish to view from this page.
Interference Statements and
Warnings
FCC Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
FCC Warning
This equipment has been tested and found to comply with the limits for a Class B digital device
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection
against harmful interference in a commercial environment. This equipment generates, uses, and
can radiate radio frequency energy, and if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
• Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could
void the user's authority to operate the equipment.
Note: Antenna Warning! This device meets ETSI and FCC certification requirements
when using the included antennas or antenna connector cable. Only use the
included antennas or antenna connector cable.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
FCC Caution: Any changes or modifications not expressly approved by the party
responsible for compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance
20cm between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
NOA-3570 User’s Guide
Safety Warnings
For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel can
service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or
power adaptor to the right supply voltage (110V AC in North America or 230V AC in
Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new
power supply.
• Place cables carefully so that no one will step on them or stumble over them. Do NOT
allow anything to rest on the power cord and do NOT locate the product where anyone
can walk on the power cord.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of
electric shock from lightning.
• Do NOT expose your device to corrosive liquids.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
Safety Warnings
Table of Contents
Copyright .................................................................................................................. 3
Interference Statements and Warnings.................................................................. 4
Safety Warnings ....................................................................................................... 6
Customer Support.................................................................................................... 8
Table of Contents ................................................................................................... 11
List of Figures ........................................................................................................ 19
List of Tables .......................................................................................................... 23
Preface .................................................................................................................... 27
Chapter 1
Getting to Know Your NOA-3570 .......................................................................... 29
1.1 Introducing the NOA-3570 .................................................................................29
1.2 NOA-3570 Features ...........................................................................................29
1.3 Applications for the NOA-3570 ...........................................................................33
1.3.1 Access Point .............................................................................................33
1.3.2 AP + Bridge ..............................................................................................34
1.3.3 Bridge / Repeater ......................................................................................35
Chapter 2
Introducing the Web Configurator........................................................................ 37
2.1 Web Configurator Overview ...............................................................................37
2.2 Accessing the NOA-3570 Web Configurator ......................................................37
2.3 Resetting the NOA-3570 ....................................................................................38
2.4 Navigating the NOA-3570 Web Configurator .....................................................39
Chapter 3
Wizard Setup .......................................................................................................... 43
3.1 Wizard Setup Overview ......................................................................................43
3.2 Wizard Setup: General Setup ............................................................................43
3.3 Wizard Setup: Wireless LAN ..............................................................................44
3.4 Wizard Setup: IP Address Assignment ..............................................................46
3.5 Basic Setup Complete ........................................................................................47
NOA-3570 User’s Guide
Chapter 4
System Screens ..................................................................................................... 49
4.1 System Overview ...............................................................................................49
4.2 General Screen ..................................................................................................49
4.2.1 Domain Name ...........................................................................................49
4.2.2 DNS Server Address Assignment .............................................................49
4.3 Configuring General Setup .................................................................................50
4.4 Configuring Password ........................................................................................51
4.5 Configuring Time Setting ...................................................................................52
Chapter 5
Wireless LAN ......................................................................................................... 55
5.1 Introduction ........................................................................................................55
5.2 Wireless Security Overview ...............................................................................55
5.2.1 Encryption .................................................................................................55
5.2.2 Authentication ...........................................................................................55
5.2.3 Restricted Access .....................................................................................56
5.2.4 Hide NOA-3570 Identity ............................................................................56
5.2.5 Configuring Wireless LAN on the NOA-3570 ............................................56
5.3 Spanning Tree Protocol (STP) ...........................................................................57
5.3.1 Rapid STP ................................................................................................57
5.3.2 STP Terminology ......................................................................................57
5.3.3 How STP Works .......................................................................................58
5.3.4 STP Port States ........................................................................................58
5.4 WEP Encryption .................................................................................................58
5.5 Configuring the Wireless Screen ........................................................................58
5.5.1 Access Point Mode ...................................................................................59
5.5.2 Bridge/Repeater Mode ..............................................................................62
5.5.3 AP+Bridge Mode ......................................................................................65
5.6 Configuring MAC Filters .....................................................................................67
5.7 Configuring Roaming .........................................................................................69
5.7.1 Requirements for Roaming .......................................................................70
5.8 Introduction to WPA ...........................................................................................71
5.9 WPA-PSK Application Example .........................................................................71
5.10 WPA with RADIUS Application Example ..........................................................72
5.11 Wireless Client WPA Supplicants .....................................................................73
5.12 Configuring 802.1x and WPA ...........................................................................73
5.13 Authentication Required: 802.1x ......................................................................74
5.14 Authentication Required: WPA .........................................................................78
5.15 Authentication Required: WPA-PSK ................................................................79
12
Table of Contents
NOA-3570 User’s Guide
Chapter 6
Internal RADIUS Server ......................................................................................... 81
6.1 Internal RADIUS Overview .................................................................................81
6.2 Internal RADIUS Server Setting .........................................................................82
6.3 Trusted AP Overview .........................................................................................84
6.4 Configuring Trusted AP ......................................................................................85
6.5 Trusted Users Overview .....................................................................................86
6.6 Configuring Trusted Users .................................................................................86
Chapter 7
VLAN ....................................................................................................................... 89
7.1 VLAN ..................................................................................................................89
7.1.1 Management VLAN ID ..............................................................................89
7.2 Configuring VLAN ..............................................................................................89
Chapter 8
IP Screen................................................................................................................. 91
8.1 Factory Ethernet Defaults ..................................................................................91
8.2 IP Address and Subnet Mask .............................................................................91
8.2.1 IP Address Assignment ............................................................................92
8.3 Configuring IP ....................................................................................................92
Chapter 9
Certificates.............................................................................................................. 95
9.1 Certificates Overview .........................................................................................95
9.1.1 Advantages of Certificates ........................................................................96
9.2 Self-signed Certificates ......................................................................................96
9.3 Configuration Summary .....................................................................................96
9.4 My Certificates ...................................................................................................96
9.5 Certificate File Formats ......................................................................................98
9.6 Importing a Certificate ........................................................................................99
9.7 Creating a Certificate .......................................................................................100
9.8 My Certificate Details .......................................................................................103
9.9 Trusted CAs .....................................................................................................106
9.10 Importing a Trusted CA’s Certificate ...............................................................108
9.11 Trusted CA Certificate Details ........................................................................109
Chapter 10
Log Screens.......................................................................................................... 113
10.1 Configuring View Log .....................................................................................113
10.2 Configuring Log Settings ................................................................................115
Table of Contents
13
NOA-3570 User’s Guide
Chapter 11
Maintenance ......................................................................................................... 119
11.1 Maintenance Overview ...................................................................................119
11.2 System Status Screen ....................................................................................119
11.2.1 System Statistics ...................................................................................120
11.3 Association List ..............................................................................................121
11.4 Channel Usage ...............................................................................................122
11.5 F/W Upload Screen ........................................................................................123
11.6 Configuration Screen ......................................................................................126
11.6.1 Backup Configuration ............................................................................127
11.6.2 Restore Configuration ..........................................................................128
11.6.3 Back to Factory Defaults .......................................................................129
11.7 Restart Screen ................................................................................................129
Chapter 12
Introducing the SMT ............................................................................................ 131
12.1 Introduction to the SMT ..................................................................................131
12.2 Accessing the SMT via the Console Port .......................................................131
12.2.1 Initial Screen .........................................................................................131
12.2.2 Entering the Password ..........................................................................132
12.3 Accessing the SMT via Telnet ........................................................................133
12.4 Navigating the SMT Interface .........................................................................133
12.4.1 System Management Terminal Interface Summary ..............................134
12.4.2 SMT Menus Overview ..........................................................................135
12.5 Changing the System Password ....................................................................136
Chapter 13
General Setup ....................................................................................................... 137
13.1 General Setup ................................................................................................137
13.1.1 Procedure To Configure Menu 1 ...........................................................137
Chapter 14
LAN Setup............................................................................................................. 139
14.1 LAN Setup ......................................................................................................139
14.2 TCP/IP Ethernet Setup ...................................................................................139
14.3 Wireless LAN Setup .......................................................................................140
14.3.1 Configuring MAC Address Filter ...........................................................143
14.3.2 Configuring Roaming ............................................................................144
14.3.3 Configuring Bridge Link ........................................................................146
Chapter 15
Dial-in User Setup ................................................................................................ 149
15.1 Dial-in User Setup ..........................................................................................149
14
Table of Contents
NOA-3570 User’s Guide
Chapter 16
VLAN Setup .......................................................................................................... 151
16.1 VLAN Setup ...................................................................................................151
Chapter 17
SNMP Configuration ............................................................................................ 153
17.1 About SNMP ..................................................................................................153
17.2 Supported MIBs ............................................................................................154
17.3 SNMP Configuration ......................................................................................154
17.4 SNMP Traps ...................................................................................................155
Chapter 18
System Security ................................................................................................... 157
18.1 System Security .............................................................................................157
18.1.1 System Password .................................................................................157
18.1.2 Configuring External RADIUS Server ...................................................157
18.1.3 802.1x ...................................................................................................159
Chapter 19
System Information and Diagnosis .................................................................... 163
19.1 System Status ................................................................................................163
19.2 System Information ........................................................................................165
19.2.1 System Information ...............................................................................165
19.2.2 Console Port Speed ..............................................................................166
19.3 Log and Trace ................................................................................................166
19.3.1 Viewing Error Log .................................................................................167
19.4 Diagnostic ......................................................................................................167
Chapter 20
Firmware and Configuration File Maintenance ................................................. 169
20.1 Filename Conventions ...................................................................................169
20.2 Backup Configuration .....................................................................................170
20.2.1 Backup Configuration Using FTP .........................................................170
20.2.2 Using the FTP command from the DOS Prompt ..................................171
20.2.3 Backup Configuration Using TFTP .......................................................172
20.2.4 Example: TFTP Command ...................................................................172
20.2.5 Backup Via Console Port ......................................................................173
20.3 Restore Configuration ...................................................................................174
20.3.1 Restore Using FTP ...............................................................................174
20.4 Uploading Firmware and Configuration Files .................................................174
20.4.1 Firmware Upload ..................................................................................175
20.4.2 Configuration File Upload .....................................................................175
20.4.3 Using the FTP command from the DOS Prompt Example ...................176
Table of Contents
15
NOA-3570 User’s Guide
20.4.4 TFTP File Upload ..................................................................................177
20.4.5 Example: TFTP Command ...................................................................177
20.4.6 Uploading Via Console Port ..................................................................178
20.4.7 Uploading Firmware File Via Console Port ...........................................178
20.4.8 Example Xmodem Firmware Upload Using HyperTerminal ..................178
20.4.9 Uploading Configuration File Via Console Port ....................................179
20.4.10 Example Xmodem Configuration Upload Using HyperTerminal .........180
Chapter 21
System Maintenance and Information ............................................................... 181
21.1 Command Interpreter Mode ...........................................................................181
21.2 Time and Date Setting ....................................................................................182
21.2.1 Resetting the Time ................................................................................183
Chapter 22
Troubleshooting ................................................................................................... 185
22.1 Problems Starting Up the NOA-3570 .............................................................185
22.2 Problems with Console Port Access ..............................................................185
22.3 Problems with the Ethernet Interface .............................................................186
22.4 Problems with the Password ..........................................................................187
22.5 Problems with Telnet ......................................................................................187
22.6 Problems with the WLAN Interface ................................................................187
Appendix A
Specifications...................................................................................................... 189
Appendix B
Packaging Specifications .................................................................................... 197
Appendix C
Power over Ethernet Specifications ................................................................... 199
Appendix D
Setting up Your Computer’s IP Address............................................................ 201
Appendix E
IP Subnetting ........................................................................................................ 213
Appendix F
Wireless LAN ........................................................................................................ 221
Appendix G
Outdoor Site Planning ......................................................................................... 235
Appendix H
Outdoor Installation Recommendations ............................................................ 241
16
Table of Contents
NOA-3570 User’s Guide
Appendix I
Command Interpreter........................................................................................... 245
Appendix J
Brute-Force Password Guessing Protection..................................................... 247
Appendix K
Log Descriptions.................................................................................................. 249
Index...................................................................................................................... 253
Table of Contents
17
NOA-3570 User’s Guide
18
Table of Contents
NOA-3570 User’s Guide
List of Figures
Figure 1 PoE Installation Example ......................................................................... 30
Figure 2 WDS Functionality Example .................................................................... 30
Figure 3 Access Point Application .......................................................................... 34
Figure 4 AP+Bridge Application ........................................................................... 34
Figure 5 Bridge Application .................................................................................... 35
Figure 6 Repeater Application ................................................................................ 36
Figure 7 Change Password Screen ....................................................................... 38
Figure 8 Replace Certificate Screen. ..................................................................... 38
Figure 9 Example Xmodem Upload ....................................................................... 39
Figure 10 The MAIN MENU Screen of the Web Configurator ................................ 40
Figure 11 Wizard: General Setup ........................................................................... 43
Figure 12 Wizard: Wireless LAN Setup .................................................................. 45
Figure 13 Wizard: IP Address Assignment ............................................................ 46
Figure 14 TCP/IP Warning Screen ......................................................................... 47
Figure 15 Close Browser Screen ........................................................................... 47
Figure 16 Wizard: Setup Complete ........................................................................ 48
Figure 17 System General ..................................................................................... 50
Figure 18 Password. .............................................................................................. 51
Figure 19 Time Setting ........................................................................................... 52
Figure 20 Wireless: Access Point .......................................................................... 59
Figure 21 Bridging Example ................................................................................... 62
Figure 22 Bridge Loop: Two Bridges Connected to Hub ........................................ 63
Figure 23 Bridge Loop: Bridge Connected to Wired LAN ...................................... 63
Figure 24 Wireless: Bridge/Repeater ..................................................................... 64
Figure 25 Wireless: AP+Bridge .............................................................................. 66
Figure 26 MAC Address Filter ................................................................................ 68
Figure 27 Roaming Example .................................................................................. 70
Figure 28 Roaming ................................................................................................. 71
Figure 29 WPA - PSK Authentication ..................................................................... 72
Figure 30 WPA with RADIUS Application Example ................................................ 73
Figure 31 Wireless LAN: 802.1x/WPA ................................................................... 74
Figure 32 Wireless LAN: 802.1x/WPA for 802.1x Protocol .................................... 75
Figure 33 Wireless LAN: 802.1x/WPA for WPA Protocol ....................................... 78
Figure 34 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol ............................... 79
Figure 35 NOA-3570 Authenticates Wireless Stations ........................................... 81
Figure 36 NOA-3570 Authenticates Trusted APs ................................................... 82
Figure 37 Internal RADIUS Server Setting Screen ............................................... 83
Figure 38 Trusted AP Overview ............................................................................. 84
List of Figures
19
NOA-3570 User’s Guide
Figure 39 Trusted AP Screen ................................................................................. 85
Figure 40 Trusted Users Screen ............................................................................ 87
Figure 41 VLAN ...................................................................................................... 90
Figure 42 IP Setup ................................................................................................ 93
Figure 43 Certificate Configuration Overview ........................................................ 96
Figure 44 My Certificates ....................................................................................... 97
Figure 45 My Certificate Import .............................................................................. 99
Figure 46 My Certificate Create ............................................................................. 101
Figure 47 My Certificate Details ............................................................................. 104
Figure 48 Trusted CAs ........................................................................................... 107
Figure 49 Trusted CA Import .................................................................................. 109
Figure 50 Trusted CA Details ................................................................................. 110
Figure 51 View Log ................................................................................................ 114
Figure 52 Log Settings ........................................................................................... 116
Figure 53 System Status ........................................................................................ 119
Figure 54 System Status: Show Statistics .............................................................. 120
Figure 55 Association List ...................................................................................... 121
Figure 56 Channel Usage ...................................................................................... 122
Figure 57 Firmware Upload .................................................................................... 124
Figure 58 Firmware Upload In Process .................................................................. 125
Figure 59 Network Temporarily Disconnected ....................................................... 125
Figure 60 Firmware Upload Error ........................................................................... 126
Figure 61 Configuration .......................................................................................... 127
Figure 62 Configuration Upload Successful ........................................................... 128
Figure 63 Network Temporarily Disconnected ....................................................... 128
Figure 64 Configuration Upload Error .................................................................... 129
Figure 65 Reset Warning Message ........................................................................ 129
Figure 66 Restart Screen ....................................................................................... 130
Figure 67 Initial Screen .......................................................................................... 132
Figure 68 Password Screen .................................................................................. 132
Figure 69 Login Screen .......................................................................................... 133
Figure 70 SMT Main Menu .................................................................................... 134
Figure 71 Menu 23.1 System Security: Change Password .................................... 136
Figure 72 Menu 1 General Setup ........................................................................... 137
Figure 73 Menu 3 LAN Setup ................................................................................ 139
Figure 74 Menu 3.2 TCP/IP Setup ......................................................................... 140
Figure 75 Menu 3.5 Wireless LAN Setup ............................................................... 141
Figure 76 Menu 3.5 Wireless LAN Setup ............................................................... 143
Figure 77 Menu 3.5.1 WLAN MAC Address Filter ................................................. 144
Figure 78 Menu 3.5 Wireless LAN Setup ............................................................... 145
Figure 79 Menu 3.5.2 - Roaming Configuration ..................................................... 145
Figure 80 Menu 3.5 Wireless LAN Setup ............................................................... 146
Figure 81 Menu 3.5.4 - Bridge Link Configuration ................................................. 147
20
List of Figures
NOA-3570 User’s Guide
Figure 82 Menu 14- Dial-in User Setup .................................................................. 149
Figure 83 Menu 14.1- Edit Dial-in User .................................................................. 149
Figure 84 Menu 16 VLAN Setup ............................................................................ 151
Figure 85 SNMP Management Model .................................................................... 153
Figure 86 Menu 22 SNMP Configuration .............................................................. 154
Figure 87 Menu 23 System Security ...................................................................... 157
Figure 88 Menu 23 System Security ...................................................................... 157
Figure 89 Menu 23.2 System Security: RADIUS Server ........................................ 158
Figure 90 Menu 23 System Security ...................................................................... 159
Figure 91 Menu 23.4 System Security: IEEE802.1x .............................................. 160
Figure 92 Menu 24 System Maintenance .............................................................. 163
Figure 93 Menu 24.1 System Maintenance: Status ............................................... 164
Figure 94 Menu 24.2 System Information and Console Port Speed ...................... 165
Figure 95 Menu 24.2.1 System Information: Information ....................................... 165
Figure 96 Menu 24.2.2 System Maintenance: Change Console Port Speed ......... 166
Figure 97 Menu 24.3 System Maintenance: Log and Trace .................................. 167
Figure 98 Sample Error and Information Messages .............................................. 167
Figure 99 Menu 24.4 System Maintenance: Diagnostic ......................................... 168
Figure 100 Menu 24.5 Backup Configuration ......................................................... 170
Figure 101 FTP Session Example ......................................................................... 171
Figure 102 System Maintenance: Backup Configuration ....................................... 173
Figure 103 System Maintenance: Starting Xmodem Download Screen ................ 173
Figure 104 Backup Configuration Example ............................................................ 173
Figure 105 Successful Backup Confirmation Screen ............................................. 174
Figure 106 Menu 24.6 Restore Configuration ........................................................ 174
Figure 107 Menu 24.7 System Maintenance: Upload Firmware ............................ 175
Figure 108 Menu 24.7.1 System Maintenance: Upload System Firmware ............ 175
Figure 109 Menu 24.7.2 System Maintenance: Upload System Configuration File 176
Figure 110 FTP Session Example .......................................................................... 177
Figure 111 Menu 24.7.1 as Seen Using the Console Port ..................................... 178
Figure 112 Example Xmodem Upload ................................................................... 179
Figure 113 Menu 24.7.2 as Seen Using the Console Port .................................... 179
Figure 114 Example Xmodem Upload ................................................................... 180
Figure 115 Menu 24 System Maintenance ............................................................. 181
Figure 116 Valid CI Commands .............................................................................. 182
Figure 117 Menu 24.10 System Maintenance: Time and Date Setting .................. 182
Figure 118 Inspection Cosmetic and Function ....................................................... 194
Figure 119 WIndows 95/98/Me: Network: Configuration ........................................ 202
Figure 120 Windows 95/98/Me: TCP/IP Properties: IP Address ............................ 203
Figure 121 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............... 204
Figure 122 Windows XP: Start Menu ..................................................................... 205
Figure 123 Windows XP: Control Panel ................................................................. 205
Figure 124 Windows XP: Control Panel: Network Connections: Properties .......... 206
List of Figures
21
NOA-3570 User’s Guide
Figure 125 Windows XP: Local Area Connection Properties ................................. 206
Figure 126 Windows XP: Internet Protocol (TCP/IP) Properties ............................ 207
Figure 127 Windows XP: Advanced TCP/IP Properties ......................................... 208
Figure 128 Windows XP: Internet Protocol (TCP/IP) Properties ............................ 209
Figure 129 Macintosh OS 8/9: Apple Menu ........................................................... 210
Figure 130 Macintosh OS 8/9: TCP/IP ................................................................... 210
Figure 131 Macintosh OS X: Apple Menu .............................................................. 211
Figure 132 Macintosh OS X: Network .................................................................... 212
Figure 133 Peer-to-Peer Communication in an Ad-hoc Network ........................... 221
Figure 134 Basic Service Set ................................................................................. 222
Figure 135 Infrastructure WLAN ............................................................................ 223
Figure 136 RTS/CTS ............................................................................................ 224
Figure 137 EAP Authentication .............................................................................. 227
Figure 138 WEP Authentication Steps ................................................................... 230
Figure 139 Roaming Example ................................................................................ 233
22
List of Figures
NOA-3570 User’s Guide
List of Tables
Table 1 IEEE 802.11g ............................................................................................ 31
Table 2 IEEE 802.11b ............................................................................................ 31
Table 3 Screens Summary .................................................................................... 40
Table 4 Wizard: General Setup ............................................................................. 44
Table 5 Wizard: Wireless LAN Setup .................................................................... 45
Table 6 Wizard: IP Address Assignment ............................................................... 46
Table 7 System General Setup ............................................................................. 50
Table 8 Password .................................................................................................. 52
Table 9 Time Setting .............................................................................................. 53
Table 10 NOA-3570 Wireless Security Levels ...................................................... 56
Table 11 STP Path Costs ...................................................................................... 57
Table 12 STP Port States ...................................................................................... 58
Table 13 Wireless: Access Point ........................................................................... 60
Table 14 Wireless: Bridge/Repeater ...................................................................... 64
Table 15 MAC Address Filter ................................................................................ 68
Table 16 Roaming ................................................................................................. 71
Table 17 Wireless LAN: 802.1x/WPA .................................................................... 74
Table 18 Wireless LAN: 802.1x/WPA for 802.1x Protocol ..................................... 76
Table 19 Wireless LAN: 802.1x/WPA for WPA Protocol ........................................ 79
Table 20 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol ............................... 80
Table 21 Internal RADIUS Server Screens Overview ........................................... 82
Table 22 My Certificates ........................................................................................ 83
Table 23 Trusted AP .............................................................................................. 85
Table 24 Trusted Users ......................................................................................... 87
Table 25 VLAN ...................................................................................................... 90
Table 26 Private IP Address Ranges .................................................................... 92
Table 27 IP Setup .................................................................................................. 93
Table 28 My Certificates ........................................................................................ 97
Table 29 My Certificate Import .............................................................................. 100
Table 30 My Certificate Create .............................................................................. 101
Table 31 My Certificate Details .............................................................................. 105
Table 32 Trusted CAs ............................................................................................ 107
Table 33 Trusted CA Import .................................................................................. 109
Table 34 Trusted CA Details .................................................................................. 111
Table 35 View Log ................................................................................................. 114
Table 36 Log Settings ............................................................................................ 116
Table 37 System Status ......................................................................................... 119
Table 38 System Status: Show Statistics .............................................................. 120
List of Tables
23
NOA-3570 User’s Guide
Table 39 Association List ....................................................................................... 122
Table 40 Channel Usage ....................................................................................... 123
Table 41 Firmware Upload .................................................................................... 124
Table 42 Restore Configuration ............................................................................. 128
Table 43 Main Menu Commands .......................................................................... 133
Table 44 Main Menu Summary ............................................................................. 134
Table 45 SMT Menus Overview ............................................................................ 135
Table 46 Menu 1 General Setup ........................................................................... 138
Table 47 Menu 3.2 TCP/IP Setup .......................................................................... 140
Table 48 Menu 3.5 Wireless LAN Setup ............................................................... 141
Table 49 Menu 3.5.1 WLAN MAC Address Filter .................................................. 144
Table 50 Menu 3.5.2 - Roaming Configuration ..................................................... 146
Table 51 Menu 3.5.4 Bridge Link Configuration .................................................... 147
Table 52 Menu 14.1- Edit Dial-in User .................................................................. 150
Table 53 Menu 16 VLAN Setup ............................................................................. 151
Table 54 Menu 22 SNMP Configuration ................................................................ 155
Table 55 SNMP Traps ........................................................................................... 155
Table 56 Ports and Interface Types ....................................................................... 155
Table 57 Menu 23.2 System Security: RADIUS Server ........................................ 158
Table 58 Menu 23.4 System Security: IEEE802.1x ............................................... 160
Table 59 Menu 24.1 System Maintenance: Status ................................................ 164
Table 60 Menu 24.2.1 System Maintenance: Information ..................................... 166
Table 61 Menu 24.4 System Maintenance Menu: Diagnostic ............................... 168
Table 62 Filename Conventions ............................................................................ 170
Table 63 General Commands for Third Party FTP Clients .................................... 171
Table 64 General Commands for Third Party TFTP Clients ................................. 172
Table 65 System Maintenance: Time and Date Setting ........................................ 183
Table 66 Troubleshooting the Start-Up of Your NOA-3570 .................................... 185
Table 67 Troubleshooting Console Port Access .................................................... 185
Table 68 Troubleshooting the Ethernet Interface .................................................. 186
Table 69 Troubleshooting the Password ............................................................... 187
Table 70 Troubleshooting Telnet ........................................................................... 187
Table 71 Troubleshooting the WLAN Interface ...................................................... 187
Table 72 Device Specifications .............................................................................. 189
Table 73 Performance ........................................................................................... 189
Table 74 Firmware Features ................................................................................. 190
Table 75 Environmental Conditions ....................................................................... 191
Table 76 Inspection Channel (CH1, CH7, CH13) .................................................. 191
Table 77 Hardware Specifications ......................................................................... 191
Table 78 Radio Specifications ............................................................................... 192
Table 79 Rx Sensitivity (@ FER = 0.08) ................................................................ 192
Table 80 Transmitting System ............................................................................... 193
Table 81 Receiving System ................................................................................... 193
24
List of Tables
NOA-3570 User’s Guide
Table 82 Current Consumption ............................................................................. 193
Table 83 Approvals ................................................................................................ 194
Table 84 Packaging Specifications ........................................................................ 197
Table 85 Mounting Hardware Specifications ......................................................... 197
Table 86 Power over Ethernet Injector Specifications .......................................... 199
Table 87 Power over Ethernet Injector RJ-45 Port Pin Assignments .................... 199
Table 88 Classes of IP Addresses ........................................................................ 213
Table 89 Allowed IP Address Range By Class ...................................................... 214
Table 90 “Natural” Masks ..................................................................................... 214
Table 91 Alternative Subnet Mask Notation .......................................................... 215
Table 92 Two Subnets Example ............................................................................ 215
Table 93 Subnet 1 ................................................................................................. 216
Table 94 Subnet 2 ................................................................................................. 216
Table 95 Subnet 1 ................................................................................................. 217
Table 96 Subnet 2 ................................................................................................. 217
Table 97 Subnet 3 ................................................................................................. 217
Table 98 Subnet 4 ................................................................................................. 218
Table 99 Eight Subnets ......................................................................................... 218
Table 100 Class C Subnet Planning ...................................................................... 218
Table 101 Class B Subnet Planning ...................................................................... 219
Table 102 IEEE802.11g ......................................................................................... 225
Table 103 Comparison of EAP Authentication Types ............................................ 231
Table 104 Wireless Security Relational Matrix ...................................................... 232
Table 105 Brute-Force Password Guessing Protection Commands ..................... 247
Table 106 System Maintenance Logs ................................................................... 249
Table 107 ICMP Notes .......................................................................................... 249
Table 108 Sys log .................................................................................................. 250
Table 109 Log Categories and Available Settings ................................................. 251
List of Tables
25
NOA-3570 User’s Guide
26
List of Tables
NOA-3570 User’s Guide
CHAPTER 1
Getting to Know Your NOA-3570
This chapter introduces the main features and applications of the NOA-3570.
1.1 Introducing the NOA-3570
The NOA-3570 is an enterprise level, outdoor IEEE 802.11g compliant business access point,
bridge and repeater with excellent wireless performance. Wireless Distribution System (WDS)
support provides flexibility in building an extended wireless network with bridge and repeater
applications. IEEE 802.1x, Wi-Fi Protected Access, WEP data encryption and MAC address
filtering offer highly secured wireless connectivity.
Rugged die-cast, watertight construction, built-in lightening protection, and grounding make
the NOA-3570 perfect for outdoors applications.
It is easy to install and configure the NOA-3570. The web-based configurator allows remote
configuration and management of your NOA-3570. The Power over Ethernet (PoE) feature
means that power can be delivered to the NOA-3570 over an Ethernet line. This allows you to
mount the NOA-3570 in areas where there are no nearby power sources.
1.2 NOA-3570 Features
The following sections describe the features of the NOA-3570
10/100M Auto-negotiating Ethernet/Fast Ethernet Interface
This auto-negotiating feature allows the NOA-3570 to detect the speed of incoming
transmissions and adjust appropriately without manual intervention. It allows data transfer of
either 10 Mbps or 100 Mbps in either half-duplex or full-duplex mode depending on your
Ethernet network.
Power over Ethernet (PoE)
Power over Ethernet (PoE) is the ability to provide power to your NOA-3570 via an 8-pin
CAT 5 Ethernet cable, eliminating the need for a nearby power source. The NOA-3570
includes a special high current power injector that allows the NOA-3570 to be located farther
away. This feature allows increased flexibility in the locating of your NOA-3570.
Chapter 1 Getting to Know Your NOA-3570
29
NOA-3570 User’s Guide
Figure 1 PoE Installation Example
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. Key differences
between WPA and WEP are user authentication and improved data encryption.
WDS Functionality
A Distribution System (DS) is a wired connection between two or more APs, while a Wireless
Distribution System (WDS) is a wireless connection. Your NOA-3570 supports WDS,
providing a cost-effective solution for wireless network expansion. The NOA-3570 supports
up to five wireless links with other APs.
Figure 2 WDS Functionality Example
30
Chapter 1 Getting to Know Your NOA-3570
NOA-3570 User’s Guide
IEEE 802.11g Wireless LAN Standard
The NOA-3570 complies with the IEEE 802.11g wireless standard. IEEE 802.11g has several
intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g
data rate and modulation are as follows. The modulation technique defines how bits are
encoded onto radio waves.
Table 1 IEEE 802.11g
DATA RATE (MBPS)
MODULATION
6/9/12/18/24/36/48/54
OFDM (Orthogonal Frequency Division Multiplexing)
Note: The NOA-3570 may be prone to RF (Radio Frequency) interference from other
2.4 GHz devices such as microwave ovens, wireless phones, Bluetooth enabled
devices, and other wireless LANs.
IEEE 802.11b Wireless LAN Standard
The NOA-3570 also fully complies with the IEEE 802.11b standard. This means an IEEE
802.11b radio card can interface directly with an IEEE 802.11g device (and vice versa) at 11
Mbps or lower depending on range.
The IEEE 802.11b data rate and corresponding modulation techniques are shown in the table
below.
Table 2 IEEE 802.11b
DATA RATE (MBPS)
MODULATION
DBPSK (Differential Binary Phase Shift Keyed)
DQPSK (Differential Quadrature Phase Shift Keying)
5.5 / 11
CCK (Complementary Code Keying)
STP (Spanning Tree Protocol) / RSTP (Rapid STP)
(R)STP detects and breaks network loops and provides backup links between switches,
bridges or routers. It allows a bridge to interact with other (R)STP -compliant bridges in your
network to ensure that only one path exists between any two stations on the network.
SSL Passthrough
SSL (Secure Sockets Layer) uses a public key to encrypt data that's transmitted over an SSL
connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites
use the protocol to obtain confidential user information, such as credit card numbers. By
convention, URLs that require an SSL connection start with “https” instead of “http”. The
NOA-3570 allows SSL connections to take place through the NOA-3570.
Chapter 1 Getting to Know Your NOA-3570
31
NOA-3570 User’s Guide
VPN Passthrough
VPN (Virtual Private Network) connections use data encryption to provide secure
communications over unsecure networks (like the Internet). The NOA-3570 allows VPN
connections to go through it.
Wireless LAN MAC Address Filtering
Your NOA-3570 checks the MAC address of the wireless station against a list of allowed or
denied MAC addresses.
WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless
network to help keep network communications private.
IEEE 802.1x Network Security
The NOA-3570 supports the IEEE 802.1x standard to enhance user authentication. This
allows you to use a RADIUS (RFC2138, 2139 - Remote Authentication Dial In User Service)
server to authenticate users.
Embedded RADIUS Server
The NOA-3570’s embedded RADIUS server eliminates the need to purchase and maintain a
standalone external RADIUS server. Use the embedded RADIUS server to authenticate up to
32 users. You can also use an external RADIUS server to authenticate a potentially unlimited
number of users.
Backup RADIUS Server
You can configure the NOA-3570 to use backup external RADIUS servers and accounting
servers in case the primary external RADIUS or accounting server does not respond.
SNMP
SNMP (Simple Network Management Protocol) is a protocol used for exchanging
management information between network devices. SNMP is a member of the TCP/IP
protocol suite. Your NOA-3570 supports SNMP agent functionality, which allows a manger
station to manage and monitor the NOA-3570 through the network. The NOA-3570 supports
SNMP version one (SNMPv1) and version two c (SNMPv2c).
Full Network Management
The web configurator is an HTML-based management interface that allows easy setup and
management via Internet browser. Most functions of the NOA-3570 are also software
configurable via the SMT (System Management Terminal) interface. The SMT is a menudriven interface that you can access from a terminal emulator over a telnet connection.
32
Chapter 1 Getting to Know Your NOA-3570
NOA-3570 User’s Guide
Logging and Tracing
• Built-in message logging and packet tracing.
• Syslog facility support.
Embedded FTP and TFTP Servers
The NOA-3570’s embedded FTP and TFTP servers enable fast firmware upgrades as well as
configuration file backups and restoration.
Wireless Association List
With the wireless association list, you can see the list of the wireless stations that are currently
using the NOA-3570 to access your wired network.
Wireless LAN Channel Usage
The Wireless Channel Usage screen displays which radio channels are being used by other
wireless devices within the transmission range of the NOA-3570. This allows you to select the
channel with minimum interference for your NOA-3570.
1.3 Applications for the NOA-3570
The NOA-3570 can be configured using the following WLAN operating modes
1 AP
2 AP+Bridge
3 Bridge/Repeater
Applications for each operating mode are shown below.
1.3.1 Access Point
The NOA-3570 is an ideal access solution for wireless Internet connection. A typical Internet
access application for your NOA-3570 is shown as follows. Stations A, B and C can access the
wired network through the NOA-3570s.
Chapter 1 Getting to Know Your NOA-3570
33
NOA-3570 User’s Guide
Figure 3 Access Point Application
1.3.2 AP + Bridge
In AP+Bridge mode, the NOA-3570 supports both AP connections (A and B can connect to
the wired network through X) and bridge connections (X can communicate with Y) at the
same time.
Figure 4
34
AP+Bridge Application
Chapter 1 Getting to Know Your NOA-3570
NOA-3570 User’s Guide
1.3.3 Bridge / Repeater
The NOA-3570 can act as a wireless network bridge and establish wireless links with other
APs. In bridge mode, the NOA-3570s (see A and B in Figure 5 on page 35) are connected to
independent wired networks and have a bridge (A can communicate with B) connection at the
same time. A NOA-3570 without a wired connection can act as a repeater (see C in Figure 6
on page 36).
Figure 5 Bridge Application
Chapter 1 Getting to Know Your NOA-3570
35
NOA-3570 User’s Guide
Figure 6 Repeater Application
36
Chapter 1 Getting to Know Your NOA-3570
NOA-3570 User’s Guide
CHAPTER 2
Introducing the Web
Configurator
This chapter describes how to access the NOA-3570 web configurator and provides an
overview of its screens.
2.1 Web Configurator Overview
The embedded web configurator allows you to manage the NOA-3570 from anywhere through
a browser such as Microsoft Internet Explorer. Use Internet Explorer 6.0 and later versions
with JavaScript enabled.
It is recommended that you set your screen resolution to 1024 by 768 pixels.
2.2 Accessing the NOA-3570 Web Configurator
1 Make sure your NOA-3570 hardware is properly connected (refer to the Quick Start
Guide).
2 Prepare your computer/computer network to connect to the NOA-3570 (refer to
Appendix D on page 201).
3 Launch your web browser.
4 Type "192.168.1.2" (the default IP address of the NOA-3570) as the URL.
5 Type "1234" (default) as the password and click Login. In some versions, the default
password appears automatically - if this is the case, click Login.
6 You should see a screen asking you to change your password (highly recommended) as
shown next. Type a new password (and retype it to confirm) and click Apply or click
Ignore to allow access without password change.
Chapter 2 Introducing the Web Configurator
37
NOA-3570 User’s Guide
Figure 7 Change Password Screen
7 Click Apply in the Replace Certificate screen to create a certificate using your NOA3570’s MAC address that will be specific to this device.
Figure 8 Replace Certificate Screen.
8 You should now see the MAIN MENU screen (see Figure 10 on page 40).
Note: The management session automatically times out when the time period set in
the Administrator Inactivity Timer field expires (default five minutes). Simply log back
into the NOA-3570 if this happens to you.
2.3 Resetting the NOA-3570
If you forget your password or cannot access the NOA-3570, you will need to reload the
factory-default configuration file. Uploading this configuration file replaces the current
configuration file with the factory-default configuration file. This means that you will lose all
configurations that you had previously. The password will be reset to “1234” and the IP
address will be reset to 192.168.1.2.
Do the following to erase the current configuration and restore factory defaults.
38
Chapter 2 Introducing the Web Configurator
NOA-3570 User’s Guide
Obtain the default configuration file, unzip it and save it in a folder. Use a console cable to
connect a computer with terminal emulation software to the NOA-3570’s console port. Turn
the NOA-3570 off and then on to begin a session. When you turn on the NOA-3570 again, you
will see the initial screen. When you see the message “Press any key to enter Debug Mode
within 3 seconds” press a key to enter debug mode.
To upload the configuration file, do the following:
1 Type “atlc” after the Enter Debug Mode message.
2 Wait for the Starting XMODEM upload message before activating XMODEM upload on
your terminal.
3 This is an example Xmodem configuration upload using HyperTerminal. Click Transfer,
then Send File to display the following screen.
Figure 9 Example Xmodem Upload
Type the configuration
file’s location, or
click Browse to
search for it.
Choose the Xmodem
protocol.
Then click Send.
4 After a successful configuration file upload, type “atgo” to restart the NOA-3570.
The NOA-3570 is now reinitialized with a default configuration file including the default
password of “1234” and IP address of 192.168.1.2.
2.4 Navigating the NOA-3570 Web Configurator
The following summarizes how to navigate the web configurator from the MAIN MENU
screen.
Note: Follow the instructions you see in the MAIN MENU screen or click the
icon (located in the top right corner of most screens) to view online help.
The
icon does not appear in the MAIN MENU screen.
Chapter 2 Introducing the Web Configurator
39
NOA-3570 User’s Guide
Figure 10 The MAIN MENU Screen of the Web Configurator
Use submenus to configure NOA-3570 features.
Click LOGOUT at any time to exit the web configurator.
The following table describes the sub-menus.
Table 3 Screens SummaryNOA-3570
LINK
TAB
WIZARD SETUP
SYSTEM
WIRELESS
IP
40
FUNCTION
Click WIZARD SETUP for initial configuration including general
setup, wireless LAN setup and IP address assignment.
General
This screen contains administrative and system-related
information.
Password
Use this screen to change your password.
Time Setting
Use this screen to change your NOA-3570’s time and date
settings.
Wireless
Use this screen to configure the wireless LAN settings and WLAN
authentication/security settings.
MAC Filter
Use this screen to change MAC filter settings on the NOA-3570
Roaming
Use this screen to configure the NOA-3570 to allow wireless users
to roam seamlessly between APs that are within the same subnet.
802.1x/WPA
Use this screen to configure wireless LAN security.
IP
Use this screen to configure IP address settings.
Chapter 2 Introducing the Web Configurator
NOA-3570 User’s Guide
Table 3 Screens SummaryNOA-3570
LINK
TAB
FUNCTION
AUTH. SERVER
Setting
Configure this screen to use the internal server to authenticate
wireless users.
Trusted AP
Configure this screen to allow specified AP’s to communicate with
the NOA-3570.
Trusted Users
Use this screen to configure the local user account(s) on the NOA3570.
CERTIFICATES
LOGS
MAINTENANCE
My Certificates Use this screen to view a summary list of certificates and manage
certificates and certification requests.
Trusted CAs
Use this screen to view and manage the list of the trusted CAs.
View Log
Use this screen to view the logs for the categories that you
selected.
Log Settings
Use this screen to change your NOA-3570’s log settings.
Status
This screen contains administrative and system-related
information.
Association
List
Use this screen to view a list of wireless clients that are connected
to the NOA-3570.
Channel
Usage
Use this screen to see which APs are using which wireless
channels within range of your NOA-3570.
F/W Upload
Use this screen to upload firmware to your NOA-3570
Configuration
Use this screen to backup and restore the configuration or reset
the factory defaults to your NOA-3570.
Restart
This screen allows you to reboot the NOA-3570 without turning the
power off.
LOGOUT
Chapter 2 Introducing the Web Configurator
Click LOGOUT to exit the web configurator.
41
NOA-3570 User’s Guide
42
Chapter 2 Introducing the Web Configurator
NOA-3570 User’s Guide
CHAPTER 3
Wizard Setup
This chapter provides information on the WIZARD SETUP screens in the web configurator.
3.1 Wizard Setup Overview
The web configurator’s setup wizard helps you configure your NOA-3570 for wireless
stations to access your wired LAN.
Note: Click Next in each screen to continue or click Back to return to the previous
screen.
Your settings are not saved when you click Back.
3.2 Wizard Setup: General Setup
General Setup contains administrative and system-related information.
Figure 11 Wizard: General Setup
The following table describes the labels in this screen.
Chapter 3 Wizard Setup
43
NOA-3570 User’s Guide
Table 4 Wizard: General Setup
LABEL
DESCRIPTION
System Name
It is recommended you type your computer's "Computer name".
In Windows 95/98 click Start, Settings, Control Panel, Network. Click the
Identification tab, note the entry for the Computer Name field and enter it as the
System Name.
In Windows 2000, click Start, Settings, Control Panel and then double-click
System. Click the Network Identification tab and then the Properties button.
Note the entry for the Computer name field and enter it as the System Name.
In Windows XP, click Start, My Computer, View system information and then
click the Computer Name tab. Note the entry in the Full computer name field
and enter it as the NOA-3570 System Name.
This name can be up to 30 alphanumeric characters long. Spaces are not
allowed, but dashes "-" and underscores "_" are accepted.
Domain Name
This is not a required field. Leave this field blank or enter the domain name here
if you know it.
Next
Click Next to proceed to the next screen.
3.3 Wizard Setup: Wireless LAN
Use this wizard screen to configure one of the NOA-3570’s two wireless LAN (WLAN)
adapters to function as an AP (WLAN 1 is recommended). Use the ADVANCED
WIRELESS screens to configure a WLAN adapter for bridge/repeater functions.
Note: The wireless clients and NOA-3570 must use the same SSID, channel ID and
WEP encryption key (if you enable WEP) for wireless communication.
44
Chapter 3 Wizard Setup
The channel only can setup in Channel 01 ~ 11.
The following table describes the labels in this screen.
Table 5 Wizard: Wireless LAN Setup
NOA-3570 User’s Guide
Table 5 Wizard: Wireless LAN Setup
LABEL
DESCRIPTION
Key 1 to Key 4
The WEP keys are used to encrypt data. Both the NOA-3570 and the wireless
stations must use the same WEP key.
If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal
characters ("0-9", "A-F").
If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal
characters ("0-9", "A-F").
You must configure all four keys, but only one key can be activated at any one
time. The default key is key 1.
Back
Click Back to return to the previous screen.
Next
Click Next to continue.
3.4 Wizard Setup: IP Address Assignment
Use this wizard screen to configure IP address assignment for the NOA-3570.
Figure 13 Wizard: IP Address Assignment
The following table describes the labels in this screen.
Table 6 Wizard: IP Address Assignment
LABEL
DESCRIPTION
IP Address Assignment
Get automatically from
DHCP
Select this option to have the NOA-3570 use a dynamically assigned IP
address from a DHCP server.
Note: You must know the IP address assigned to the NOA3570 (by the DHCP server) to access the NOA-3570 again.
Use fixed IP address
46
Select this option if your NOA-3570 is using a static IP address. When you
select this option, fill in the fields below.
Chapter 3 Wizard Setup
NOA-3570 User’s Guide
Table 6 Wizard: IP Address Assignment
LABEL
DESCRIPTION
IP Address
Enter the IP address of your NOA-3570 in dotted decimal notation.
Note: If you changed the NOA-3570's IP address, you must
use the new IP address if you want to access the web
configurator again.
IP Subnet Mask
Type the subnet mask.
Gateway IP Address
Type the IP address of the gateway. The gateway is an immediate neighbor
of your NOA-3570 that will forward the packet to the destination. The gateway
must be a router on the same segment as your NOA-3570's LAN or WAN
port.
Back
Click Back to return to the previous screen.
Finish
Click Finish to proceed to complete the Wizard setup.
3.5 Basic Setup Complete
When you click Finish in the Wizard IP Address Assignment screen, a warning window
displays as shown. Click OK to close the window. Log into the web configurator again using
the new IP address if you change the default IP address (192.168.1.2).
Figure 14 TCP/IP Warning Screen
The following screen displays prompting you to close the web browser.
Figure 15 Close Browser Screen
Click Yes to close the web configurator. Otherwise, click No to use the ADVANCED
screens to configure other features (the congratulations screen shows next).
Chapter 3 Wizard Setup
47
NOA-3570 User’s Guide
Figure 16 Wizard: Setup Complete
Well done! You have set up your NOA-3570 to operate on your network and access the
Internet.
48
Chapter 3 Wizard Setup
NOA-3570 User’s Guide
CHAPTER 4
System Screens
This section provides information on general system setup.
4.1 System Overview
This chapter describes how to configure the NOA-3570’s general, DNS, password and time
settings.
4.2 General Screen
The General screen contains administrative and system-related information. System Name is
for identification purposes. However, because some ISPs check this name you should enter
your computer's "Computer Name".
• In Windows 95/98 click Start, Settings, Control Panel, Network. Click the
Identification tab, note the entry for the Computer Name field and enter it as the
System Name.
• In Windows 2000, click Start, Settings and Control Panel and then double-click
System. Click the Network Identification tab and then the Properties button. Note the
entry for the Computer name field and enter it as the System Name.
• In Windows XP, click Start, My Computer, View system information and then click
the Computer Name tab. Note the entry in the Full computer name field and enter it as
the NOA-3570 System Name.
4.2.1 Domain Name
You can manually enter a domain name or the NOA-3570 can get it automatically by DHCP.
4.2.2 DNS Server Address Assignment
Use DNS (Domain Name System) to map a domain name to its corresponding IP address and
vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is
extremely important because without it, you must know the IP address of a computer before
you can access it.
You can manually configure DNS server addresses if you know them or the NOA-3570 can
receive them automatically through DHCP.
Chapter 4 System Screens
49
NOA-3570 User’s Guide
4.3 Configuring General Setup
Click the SYSTEM link under ADVANCED to open the General screen.
Figure 17 System General
The following table describes the labels in this screen.
Table 7 System General Setup NOA-3570
LABEL
DESCRIPTION
General Setup
System Name
Type a descriptive name to identify the NOA-3570 in the Ethernet network.
This name can be up to 30 alphanumeric characters long. Spaces are not
allowed, but dashes "-" and underscores "_" are accepted.
Domain Name
This is not a required field. Leave this field blank or enter the domain name
here if you know it.
Administrator
Inactivity Timer
Type how many minutes a management session (either via the web
configurator or SMT) can be left idle before the session times out.
The default is 5 minutes. After it times out you have to log in with your
password again. Very long idle timeouts may have security risks.
A value of "0" means a management session never times out, no matter how
long it has been left idle (not recommended).
System DNS Servers
50
Chapter 4 System Screens
NOA-3570 User’s Guide
Table 7 System General Setup NOA-3570
LABEL
DESCRIPTION
First DNS Server
Second DNS Server
Third DNS Server
Select From DHCP if your ISP dynamically assigns DNS server information.
The field to the right displays the (read-only) DNS server IP address that the
DHCP assigns.
Select User-Defined if you have the IP address of a DNS server. Enter the
DNS server's IP address in the field to the right. If you chose User-Defined, but
leave the IP address set to 0.0.0.0, User-Defined changes to None after you
click Apply. If you set a second choice to User-Defined, and enter the same IP
address, the second User-Defined changes to None after you click Apply.
Select None if you do not want to configure DNS servers. If you do not
configure a DNS server, you must know the IP address of a machine in order to
access it.
The default setting is None.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to reload the previous configuration for this screen.
4.4 Configuring Password
To change your NOA-3570’s password (recommended), click the SYSTEM link under
ADVANCED and then the Password tab. The screen appears as shown. This screen allows
you to change the NOA-3570’s password.
If you forget your password (or the NOA-3570 IP address), you will need to reset the NOA3570. See Section 2.3 on page 38 for details.
Figure 18 Password.
The following table describes the labels in this screen.
Chapter 4 System Screens
51
NOA-3570 User’s Guide
Table 8 Password
LABEL
DESCRIPTIONS
Old Password
Type in your existing system password (1234 is the default password).
New Password
Type your new system password (up to 31 characters). Note that as you type a
password, the screen displays an asterisk (*) for each character you type.
Retype to Confirm
Retype your new system password for confirmation.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to reload the previous configuration for this screen.
4.5 Configuring Time Setting
To change your NOA-3570’s time and date, click the SYSTEM link under ADVANCED and
then the Time Setting tab. The screen appears as shown. Use this screen to configure the
NOA-3570’s time based on your local time zone.
Figure 19 Time Setting
52
Chapter 4 System Screens
NOA-3570 User’s Guide
The following table describes the labels in this screen.
Table 9 Time Setting NOA-3570
LABEL
DESCRIPTION
Time Protocol
Select the time service protocol that your time server uses. Not all time servers
support all protocols, so you may have to check with your ISP/network
administrator or use trial and error to find a protocol that works.
The main difference between them is the format.
Daytime (RFC 867) format is day/month/year/time zone of the server.
Time (RFC 868) format displays a 4-byte integer giving the total number of
seconds since 1970/1/1 at 0:0:0.
NTP (RFC 1305), is similar to Time (RFC 868).
Select Manual to enter the time and date manually.
Time Server Address
Enter the IP address or the URL of your time server. Check with your ISP/
network administrator if you are unsure of this information.
Current Time
(hh:mm:ss)
This field displays the time of your NOA-3570.
Each time you reload this page, the NOA-3570 synchronizes the time with the
time server.
New Time (hh:mm:ss)
This field displays the last updated time from the time server.
When you select None in the Time Protocol field, enter the new time in this
field and then click Apply.
Current Date (yyyy/
mm/dd)
This field displays the date of your NOA-3570.
Each time you reload this page, the NOA-3570 synchronizes the date with the
time server.
New Date (yyyy/mm/
dd)
This field displays the last updated date from the time server.
When you select None in the Time Protocol field, enter the new date in this
field and then click Apply.
Time Zone
Choose the time zone of your location. This will set the time difference
between your time zone and Greenwich Mean Time (GMT).
Daylight Savings
Select this option if you use daylight saving time. Daylight saving is a period
from late spring to early fall when many countries set their clocks ahead of
normal local time by one hour to give more daytime light in the evening.
Start Date (mm-dd) Enter the month and day that your daylight-saving time starts on if you
selected Daylight Savings.
End Date (mm-dd) Enter the month and day that your daylight-saving time ends on if you selected
Daylight Savings.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to reload the previous configuration for this screen.
Chapter 4 System Screens
53
NOA-3570 User’s Guide
54
Chapter 4 System Screens
NOA-3570 User’s Guide
CHAPTER 5
Wireless LAN
This chapter discusses how to configure wireless LAN.
5.1 Introduction
A wireless LAN can be as simple as two computers with wireless LAN adapters
communicating in a peer-to-peer network or as complex as a number of computers with
wireless LAN adapters communicating through access points which bridge network traffic to
the wired LAN.
Note: See the WLAN appendix for more detailed information on WLANs.
5.2 Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless
stations, access points and the wired network.
Wireless security methods available on the NOA-3570 are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the NOA-3570 identity.
5.2.1 Encryption
• Use WPA security if you have WPA-aware wireless clients and a RADIUS server. WPA
has user authentication and improved data encryption over WEP.
• Use WPA-PSK if you have WPA-aware wireless clients but no RADIUS server.
• If you don’t have WPA-aware wireless clients, then use WEP key encrypting. A higher
bit key offers better security at a throughput trade-off.
5.2.2 Authentication
WPA has user authentication and you can also configure IEEE 802.1x to use the built-in
database (Local User Database) or a RADIUS server to authenticate wireless clients before
joining your network.
• Use RADIUS authentication if you have a RADIUS server. See the appendices for
information on protocols used when a client authenticates with a RADIUS server via the
NOA-3570.
Chapter 5 Wireless LAN
55
NOA-3570 User’s Guide
• Use the Local User Database if you have less than 32 wireless clients in your network.
The NOA-3570 uses MD5 encryption when a client authenticates with the Local User
Database
5.2.3 Restricted Access
The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).
5.2.4 Hide NOA-3570 Identity
If you hide the SSID, then the NOA-3570 cannot be seen when a wireless client scans for local
APs. The trade-off for the extra security of “hiding” the NOA-3570 may be inconvenience for
some valid WLAN clients. If you don’t hide the ESSID, at least you should change the default
one.
5.2.5 Configuring Wireless LAN on the NOA-3570
1 Configure the ESSID and WEP in the Wireless screen.
2 Use the MAC Filter screen to restrict access to your wireless network by MAC address.
3 Configure WPA or WPA-PSK in the 802.1x/WPA screen. You can also configure
802.1x wireless client authentication in the 802.1x/WPA screen.
4 Configure the RADIUS settings in the AUTH. SERVER screens.
The following table shows the relative effectiveness of these wireless security methods
available on your NOA-3570.
Table 10 NOA-3570 Wireless Security Levels
Security Level
Security Type
Least Secure
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Most Secure
Wi-Fi Protected Access (WPA)
Note: You must enable the same wireless security settings on the NOA-3570 and on
all wireless clients that you want to associate with it.
If you do not enable any wireless security on your NOA-3570, your network is
accessible to any wireless networking device that is within range.
56
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
5.3 Spanning Tree Protocol (STP)
STP detects and breaks network loops and provides backup links between switches, bridges or
routers. It allows a bridge to interact with other STP-compliant bridges in your network to
ensure that only one route exists between any two stations on the network.
5.3.1 Rapid STP
The NOA-3570 uses IEEE 802.1w RSTP (Rapid Spanning Tree Protocol) that allow faster
convergence of the spanning tree (while also being backwards compatible with STP-only
aware bridges). Using RSTP topology change information does not have to propagate to the
root bridge and unwanted learned addresses are flushed from the filtering database. In RSTP,
the port states are Discarding, Learning, and Forwarding.
5.3.2 STP Terminology
The root bridge is the base of the spanning tree; it is the bridge with the lowest identifier value
(MAC address).
Path cost is the cost of transmitting a frame onto a LAN through that port. It is assigned
according to the speed of the link to which a port is attached. The slower the media, the higher
the cost - see the next table.
Table 11 STP Path Costs
LINK SPEED
RECOMMENDED
VALUE
RECOMMENDED
RANGE
ALLOWED
RANGE
Path Cost
4Mbps
250
100 to 1000
1 to 65535
Path Cost
10Mbps
100
50 to 600
1 to 65535
Path Cost
16Mbps
62
40 to 400
1 to 65535
Path Cost
100Mbps
19
10 to 60
1 to 65535
Path Cost
1Gbps
3 to 10
1 to 65535
Path Cost
10Gbps
1 to 5
1 to 65535
On each bridge, the root port is the port through which this bridge communicates with the root.
It is the port on this switch with the lowest path cost to the root (the root path cost). If there is
no root port, then this bridge has been accepted as the root bridge of the spanning tree network.
For each LAN segment, a designated bridge is selected. This bridge has the lowest cost to the
root among the bridges connected to the LAN.
Chapter 5 Wireless LAN
57
NOA-3570 User’s Guide
5.3.3 How STP Works
After a bridge determines the lowest cost-spanning tree with STP, it enables the root port and
the ports that are the designated ports for connected LANs, and disables all other ports that
participate in STP. Network packets are therefore only forwarded between enabled ports,
eliminating any possible network loops.
STP-aware bridges exchange Bridge Protocol Data Units (BPDUs) periodically. When the
bridged LAN topology changes, a new spanning tree is constructed.
Once a stable network topology has been established, all bridges listen for Hello BPDUs
(Bridge Protocol Data Units) transmitted from the root bridge. If a bridge does not get a Hello
BPDU after a predefined interval (Max Age), the bridge assumes that the link to the root
bridge is down. This bridge then initiates negotiations with other bridges to reconfigure the
network to re-establish a valid network topology.
5.3.4 STP Port States
STP assigns five port states (see next table) to eliminate packet looping. A bridge port is not
allowed to go directly from blocking state to forwarding state so as to eliminate transient
loops.
Table 12 STP Port States
PORT STATES
DESCRIPTIONS
Disabled
STP is disabled (default).
Blocking
Only configuration and management BPDUs are received and processed.
Listening
All BPDUs are received and processed.
Learning
All BPDUs are received and processed. Information frames are submitted to the
learning process but not forwarded.
Forwarding
All BPDUs are received and processed. All information frames are received and
forwarded.
5.4 WEP Encryption
WEP encryption scrambles the data transmitted between the wireless stations and the access
points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key.
5.5 Configuring the Wireless Screen
Click the WIRELESS link under ADVANCED to display the Wireless screen. The screen
varies depending upon the operating mode you select.
58
Chapter 5 Wireless LAN
5.5.1 Access Point Mode
Select Access Point in the Operating Mode drop-down list box to display the screen as
shown next.
Channel selection only can choose 1~11ch.
Figure 20 Wireless: Access Point
21dBm
NOA-3570 User’s Guide
Table 13 Wireless: Access Point NOA-3570
LABEL
DESCRIPTION
WLAN Adapter
Select which WLAN adapter you want to configure.
It is recommended that you configure the first WLAN adapter for AP functions and
use the second WLAN adapter for bridge functions.
Operating Mode
Select the operating mode from the drop-down list. The options are Access Point,
Bridge/Repeater and AP+Bridge.
Name (SSID)
(Service Set IDentity) The SSID identifies the Service Set with which a wireless
station is associated. Wireless stations associating to the access point (AP) must
have the same SSID. Enter a descriptive name (up to 32 printable 7-bit ASCII
characters) for the wireless LAN.
Note: If you are configuring the NOA-3570 from a computer
connected to the wireless LAN and you change the NOA-3570’s
SSID or WEP settings, you will lose your wireless connection when
you click Apply to confirm. You must then change the wireless
settings of your computer to match the NOA-3570’s new settings.
Hide Name
(SSID)
Select this check box to hide the SSID in the outgoing beacon frame so a station
cannot obtain the SSID through passive scanning using a site survey tool.
Choose Channel Set the operating frequency/channel depending on your particular region.
ID
To manually set the NOA-3570 to use a channel, select a channel from the dropdown list box. Click MAINTENANCE and then the Channel Usage tab to open the
Channel Usage screen to make sure the channel is not already used by another AP
or independent peer-to-peer wireless network.
To have the NOA-3570 automatically select a channel, click Scan instead.
Scan
Click this button to have the NOA-3570 automatically scan for and select a channel
with the least interference.
RTS/CTS
Threshold
(Request To Send) The threshold (number of bytes) for enabling RTS/CTS
handshake. Data with its frame size larger than this value will perform the RTS/CTS
handshake. Setting this attribute to be larger than the maximum MSDU (MAC
service data unit) size turns off the RTS/CTS handshake. Setting this attribute to
zero turns on the RTS/CTS handshake. Enter a value between 0 and 2432.
Fragmentation
Threshold
The threshold (number of bytes) for the fragmentation boundary for directed
messages. It is the maximum data fragment size that can be sent. Enter a value
between 800 and 2432.
WEP Encryption WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized
wireless stations from accessing data transmitted over the wireless network.
Select Disable to allow wireless stations to communicate with the access points
without any data encryption.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Authentication
Method
60
If you use WEP encryption, select Auto, Open System or Shared Key from the
drop-down list box.
Chapter 5 Wireless LAN
Table 13 Wireless: Access Point NOA-3570
LABEL
Key 1 to Key 4
Enable IntraBSS Traffic
Enable
Spanning Tree
Protocol (STP)
Output Power
Preamble
DESCRIPTION
If you chose 64-bit WEP in the WEP Encryption field, then enter any 5 characters
(ASCII string) or 10 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
If you chose 128-bit WEP in the WEP Encryption field, then enter 13 characters
(ASCII string) or 26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
There are four data encryption keys to secure your data from eavesdropping by
unauthorized wireless users. The values for the keys must be set up exactly the
same on the access points as they are on the wireless stations.
The preceding “0x” is entered automatically. You must configure all four keys, but
only one key can be activated at any one time. The default key is key 1.
Intra-BSS traffic is traffic between wireless stations in the same BSS.
Enable Intra-BSS traffic to allow wireless stations connected to the NOA-3570 to
communicate with each other.
Disable Intra-BSS traffic to only allow wireless stations to communicate with the
wired network, not with each other.
(R)STP detects and breaks network loops and provides backup links between
switches, bridges or routers. It allows a bridge to interact with other (R)STP compliant bridges in your network to ensure that only one path exists between any
two stations on the network. Select the check box to activate STP on the
NOA-3570.
Set the output power of the NOA-3570 in this field. If there is a high density of APs
within an area, decrease the output power of the NOA-3570 to reduce interference
with other APs. The options are 21dBm, 19dBm, 17dBm or 15dBm.
Preamble is used to signal that data is coming to the receiver.
Short preamble increases performance as less time sending preamble means more
time for sending data. All IEEE 802.11b compliant wireless adapters support long
preamble, but not all support short preamble.
Select Long preamble if you are unsure what preamble mode the wireless adapters
support, and to provide more reliable communications in busy wireless networks.
Select Short preamble if you are sure the wireless adapters support it, and to
provide more efficient communications.
Select Dynamic to have the NOA-3570 automatically use short preamble when all
wireless clients support it, otherwise the NOA-3570 uses long preamble.
Note: The NOA-3570 and the wireless stations MUST use the same
preamble mode in order to communicate.
802.11 Mode
Max. Frame
Burst
Select 802.11b Only to allow only IEEE 802.11b compliant WLAN devices to
associate with the NOA-3570.
Select 802.11g Only to allow only IEEE 802.11g compliant WLAN devices to
associate with the NOA-3570.
Select Mixed to allow either IEEE 802.11b or IEEE 802.11g compliant WLAN
devices to associate with the NOA-3570. The transmission rate of your NOA-3570
might be reduced.
Enable Maximum Frame Burst to help eliminate collisions in mixed-mode networks
(networks with both IEEE 802.11g and IEEE 802.11b traffic) and enhance the
performance of both pure IEEE 802.11g and mixed IEEE 802.11b/g networks.
Maximum Frame Burst sets the maximum time, in microseconds, that the NOA3570 transmits IEEE 802.11g wireless traffic only.
Type the maximum frame burst between 0 and 1800 (650, 1000 or 1800
recommended). Enter 0 to disable this feature.
NOA-3570 User’s Guide
Table 13 Wireless: Access Point NOA-3570
LABEL
DESCRIPTION
VLAN ID
The NOA-3570 supports IEEE 802.1 tagged VLAN for partioning a physical network
into multiple logical networks. Enter a number from 1 to 4094 to set the VLAN ID tag
that the NOA-3570 adds to the Ethernet frames that this WLAN adapter receives
from wireless clients or other APs.
Use the VLAN screen to enable or disable the NOA-3570’s VLAN feature.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
5.5.2 Bridge/Repeater Mode
The NOA-3570 can act as a wireless network bridge and establish wireless links with other
APs. You need to know the MAC address of the peer device, which also must be in bridge
mode.
The NOA-3570 can establish wireless links with other APs.
In the example below, when both NOA-3570s are in Bridge/Repeater mode, they form a WDS
(Wireless Distribution System) allowing the computers in LAN 1 to connect to the computers
in LAN 2.
Figure 21 Bridging Example
Be careful to avoid bridge loops when you enable bridging in the NOA-3570. Bridge loops
cause broadcast traffic to circle the network endlessly, resulting in possible throughput
degradation and disruption of communications. The following examples show two network
topologies that can lead to this problem:
If two or more NOA-3570s (in bridge mode) are connected to the same hub as shown next.
62
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
Figure 22 Bridge Loop: Two Bridges Connected to Hub
If your NOA-3570 (in bridge mode) is connected to a wired LAN while communicating with
another wireless bridge that is also connected to the same wired LAN as shown next.
Figure 23 Bridge Loop: Bridge Connected to Wired LAN
To prevent bridge loops, ensure that you enable STP in the Wireless screen or your NOA3570 is not set to bridge mode while connected to both wired and wireless segments of the
same LAN.
Click the WIRELESS link under ADVANCED. Select Bridge/Repeater in the Operating
Mode drop-down list box to have the NOA-3570 act as a wireless bridge only.
Chapter 5 Wireless LAN
63
NOA-3570 User’s Guide
Figure 24 Wireless: Bridge/Repeater
The following table describes the labels in this screen that are specific to bridge/repeater
mode.
Table 14 Wireless: Bridge/Repeater NOA-3570
LABEL
DESCRIPTIONS
WLAN Adapter
Select which WLAN adapter you want to configure.
It is recommended that you configure the first WLAN adapter for AP functions
and use the second WLAN adapter for bridge functions.
Operating Mode
Select Bridge/Repeater in this field to display the screen shown above.
Enable WDS Security A Wireless Distribution System (WDS) is a wireless connection between two or
more APs.
Select the check box to use TKIP to encrypt traffic on the WDS between APs.
When you enable WDS security, type a Pre-Shared Key (PSK) for each link.
Note: Other APs must use the same encryption method in order
to communicate with the NOA-3570 when you enable WDS
security.
64
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
Table 14 Wireless: Bridge/Repeater NOA-3570
LABEL
DESCRIPTIONS
This is the index number of the bridge connection.
Active
Select the check box to enable the bridge connection. Otherwise, clear the
check box to disable it.
Remote Bridge MAC
Address
Type the MAC address of the peer device in a valid MAC address format, that
is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc.
PSK
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including
spaces and symbols).
When the NOA-3570 is in Bridge/Repeater mode, you don’t have to enter a
pre-shared key, but the traffic between devices won’t be encrypted if you don’t.
The peer bridge must use the same pre-shared key and encryption method.
Enable Spanning
Tree Protocol (STP)
Select the check box to activate STP on the NOA-3570.
5.5.3 AP+Bridge Mode
Click the WIRELESS link under ADVANCED. Select AP+Bridge in the Operating Mode
drop-down list box to display the screen as shown next. In this screen, you can configure the
NOA-3570 to function as an AP and bridge simultaneously. See the section on NOA-3570
applications for more information.
Chapter 5 Wireless LAN
65
NOA-3570 User’s Guide
Figure 25 Wireless: AP+Bridge
See Table 13 on page 60 and Table 14 on page 64 descriptions of the fields in the Access
Point and Bridge/Repeater operating modes for descriptions of the fields in this screen.
66
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
When you enable WEP encryption, you can also specify MAC addresses and pre-shared keys
of peer bridges in order to use TKIP (see Appendix F on page 221 for more on TKIP) to
encrypt traffic between the bridges.
Note: The following screens are configurable only in Access Point and AP+Bridge
operating modes.
5.6 Configuring MAC Filters
The MAC filter screen allows you to configure the NOA-3570 to give exclusive access to up
to 32 devices (Allow Association) or exclude up to 32 devices from accessing the NOA-3570
(Deny Association). Every Ethernet device has a unique MAC (Media Access Control)
address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal
characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of the
devices to configure this screen.
To change your NOA-3570’s MAC filter settings, click the WIRELESS link under
ADVANCED and then the MAC Filter tab. The screen appears as shown.
Note: Be careful not to list your computer’s MAC address and set the Action field to
Deny Association when managing the NOA-3570 via a wireless connection.
This would lock you out.
Chapter 5 Wireless LAN
67
NOA-3570 User’s Guide
Figure 26 MAC Address Filter
The following table describes the labels in this screen.
Table 15 MAC Address Filter NOA-3570
68
LABEL
DESCRIPTION
WLAN Adapter
Select the WLAN adapter for which you want to configure MAC address filtering.
Active
Select Yes from the drop down list box to enable MAC address filtering.
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
Table 15 MAC Address Filter NOA-3570
LABEL
DESCRIPTION
Filter Action
Define the filter action for the list of MAC addresses in the MAC address filter
table.
Select Deny Association to block access to the router, MAC addresses not
listed will be allowed to access the router.
Select Allow Association to permit access to the router, MAC addresses not
listed will be denied access to the router.
MAC Address
Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless
station that are allowed or denied access to the NOA-3570 in these address
fields.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
5.7 Configuring Roaming
A wireless station is a device with an IEEE 802.11b or an IEEE 802.11g compliant wireless
interface. An access point (AP) acts as a bridge between the wireless and wired networks. An
AP creates its own wireless coverage area. A wireless station can associate with a particular
access point only if it is within the access point’s coverage area.
In a network environment with multiple access points, wireless stations are able to switch from
one access point to another as they move between the coverage areas. This is roaming. As the
wireless station moves from place to place, it is responsible for choosing the most appropriate
access point depending on the signal strength, network utilization or other factors.
The roaming feature on the access points allows the access points to relay information about
the wireless stations to each other. When a wireless station moves from a coverage area to
another, it scans and uses the channel of a new access point, which then informs the access
points on the LAN about the change. The new information is then propagated to the other
access points on the LAN. An example is shown in Figure 27 on page 70.
With roaming, a wireless LAN mobile user enjoys a continuous connection to the wired
network through an access point while moving around the wireless LAN.
Enable roaming to exchange the latest bridge information of all wireless stations between APs
when a wireless station moves between coverage areas. Wireless stations can still associate
with other APs even if you disable roaming. Enabling roaming ensures correct traffic
forwarding (bridge tables are updated) and maximum AP efficiency. The AP deletes records
of wireless stations that associate with other APs (Non-ZyXEL APs may not be able to
perform this). IEEE 802.1x authentication information is not exchanged (at the time of
writing).
Chapter 5 Wireless LAN
69
NOA-3570 User’s Guide
Figure 27 Roaming Example
The steps below describe the roaming process.
1 As wireless station Y moves from the coverage area of access point AP 1 to that of access
point
2 AP 2, it scans and uses the signal of access point AP 2.
3 Access point AP 2 acknowledges the presence of wireless station Y and relays this
information to access point AP 1 through the wired LAN.
4 Access point AP 1 updates the new position of wireless station.
5 Wireless station Y sends a request to access point AP 2 for reauthentication.
5.7.1 Requirements for Roaming
The following requirements must be met in order for wireless stations to roam between the
coverage areas.
1 All the access points must be on the same subnet and configured with the same SSID.
2 If IEEE 802.1x user authentication is enabled and to be done locally on the access point,
the new access point must have the user profile for the wireless station.
3 The adjacent access points should use different radio channels when their coverage areas
overlap.
4 All access points must use the same port number to relay roaming information.
5 The access points must be connected to the Ethernet and be able to get IP addresses from
a DHCP server if using dynamic IP address assignment.
70
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
To enable roaming on your NOA-3570, click the WIRELESS link under ADVANCED and
then the Roaming tab. The screen appears as shown.
Figure 28 Roaming
The following table describes the labels in this screen.
Table 16 Roaming
LABEL
DESCRIPTION
Active
Select Yes from the drop-down list box to enable roaming on the NOA-3570 if
you have two or more APs on the same subnet.
Note: All APs on the same subnet and the wireless stations must
have the same SSID to allow roaming.
Port
Enter the port number to communicate roaming information between access
points. The port number must be the same on all access points. The default is
3517. Make sure this port is not used by other services.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
5.8 Introduction to WPA
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. Key differences
between WPA and WEP are user authentication and improved data encryption.
5.9 WPA-PSK Application Example
A WPA-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and
symbols).
Chapter 5 Wireless LAN
71
NOA-3570 User’s Guide
2 The AP checks each client’s password and (only) allows it to join the network if it
matches its password.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP encryption process to encrypt data exchanged
between them.
Figure 29 WPA - PSK Authentication
5.10 WPA with RADIUS Application Example
This example is for using WPA with an external RADIUS server. You need the IP address of
the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA
application example with an external RADIUS server looks as follows. “A” is the RADIUS
server. “DS” is the distribution system.
1 The AP passes the wireless client’s authentication request to the RADIUS server.
2 The RADIUS server then checks the user's identification against its database and grants
or denies network access accordingly.
3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then
sets up a key hierarchy and management system, using the pair-wise key to dynamically
generate unique data encryption keys to encrypt every data packet that is wirelessly
communicated between the AP and the wireless clients.
72
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
Figure 30 WPA with RADIUS Application Example
5.11 Wireless Client WPA Supplicants
A wireless client supplicant is the software that runs on an operating system instructing the
wireless client how to use WPA. At the time of writing, the most widely available supplicant is
the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data
Communications' AEGIS client.
The Windows XP patch is a free download that adds WPA capability to Windows XP's builtin "Zero Configuration" wireless client. However, you must run Windows XP to use it.
The Funk Software's Odyssey client is bundled free (at the time of writing) with some of
ZyXEL’s client wireless adapter(s).
5.12 Configuring 802.1x and WPA
To change your NOA-3570’s authentication settings, click the WIRELESS link under
ADVANCED and then the 802.1x/WPA tab. The screen varies by the key management
protocol you select. The WPA function is not available on all NOA-3570 models.
Chapter 5 Wireless LAN
73
NOA-3570 User’s Guide
You see the next screen when you select No Access Allowed or No Authentication Required
in the Wireless Port Control field.
Figure 31 Wireless LAN: 802.1x/WPA
The following table describes the labels in this screen.
Table 17 Wireless LAN: 802.1x/WPA
LABEL
DESCRIPTION
Wireless Port
Control
To control wireless stations access to the wired network, select a control method
from the drop-down list box. Choose from No Access Allowed, No
Authentication Required and Authentication Required.
No Access Allowed blocks all wireless stations access to the wired network.
No Authentication Required allows all wireless stations access to the wired
network without entering usernames and passwords. This is the default setting.
Authentication Required means that all wireless stations have to enter
usernames and passwords before access to the wired network is allowed.
Select Authentication Required to configure Key Management Protocol and
other related fields.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
5.13 Authentication Required: 802.1x
Select Authentication Required in the Wireless Port Control field and 802.1x in the Key
Management Protocol field to display the next screen.
74
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
Figure 32 Wireless LAN: 802.1x/WPA for 802.1x Protocol
Chapter 5 Wireless LAN
75
NOA-3570 User’s Guide
The following table describes the labels in this screen.
Table 18 Wireless LAN: 802.1x/WPA for 802.1x Protocol NOA-3570
LABEL
DESCRIPTION
Wireless Port
Control
To control wireless stations access to the wired network, select a control method
from the drop-down list box. Choose from No Authentication Required,
Authentication Required and No Access Allowed.
No Authentication Required allows all wireless stations access to the wired
network without entering usernames and passwords. This is the default setting.
Authentication Required means that all wireless stations have to enter
usernames and passwords before access to the wired network is allowed.
No Access Allowed blocks all wireless stations access to the wired network.
The following fields are only available when you select Authentication Required.
ReAuthentication
Timer (In
Seconds)
Specify how often wireless stations have to reenter usernames and passwords in
order to stay connected. This field is activated only when you select
Authentication Required in the Wireless Port Control field.
Enter a time interval between 10 and 9999 seconds. The default time interval is
1800 seconds (30 minutes).
Note: If wireless station authentication is done using a RADIUS
server, the reauthentication timer on the RADIUS server has
priority.
Idle Timeout
(In Seconds)
The NOA-3570 automatically disconnects a wireless station from the wired network
after a period of inactivity. The wireless station needs to enter the username and
password again before access to the wired network is allowed.
This field is activated only when you select Authentication Required in the
Wireless Port Control field. The default time interval is 3600 seconds (or 1 hour).
Key Management
Protocol
Choose 802.1x from the drop-down list.
Dynamic WEP
Key Exchange
This field is activated only when you select Authentication Required in the
Wireless Port Control field.
Select Disable to allow wireless stations to communicate with the access points
without using dynamic WEP key exchange.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
This field is not available when you set Key Management Protocol to WPA or
WPA-PSK.
Authentication
Databases
The authentication database contains wireless station login information.
Internal RADIUS
Server
Select this radio button to use the NOA-3570’s Internal RADIUS Server.
Select the MD5 radio button to use this EAP authentication type to authenticate
other APs or wireless clients in other wireless networks.
Select the PEAP radio button to use this EAP authentication type to authenticate
other APs or wireless clients in other wireless networks. Use the drop-down list box
to select Disable, 64-bit WEP or 128-bit WEP for Dynamic WEP Exchange.
Note: MD5 cannot be used with Dynamic WEP Key Exchange.
External RADIUS
Server
76
Select the radio button to use an external radius server to authenticate the NOA3570’s wireless clients.
Configure the server(s) details in the following fields.
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
Table 18 Wireless LAN: 802.1x/WPA for 802.1x Protocol NOA-3570
LABEL
DESCRIPTION
Authentication
Server /Alternate
The NOA-3570 will make three attempts to authenticate wireless users using the
authentication server before attempting to use the alternate authentication server.
Requests can be issued from the client interface to use the alternate authentication
server. The length of time for each authentication is decided by the wireless client
or based on the configuration of the ReAuthentication Timer field.
Note: You can use the command line interface to configure the
NOA-3570 to use up to four alternate authentication servers.
Active
Select Active to enable user authentication through this external authentication
server.
Clear the Active check box to not use this to not perform user authentication
through this external authentication server.
Server IP Address Enter the IP address of the external authentication server in dotted decimal
notation.
Port Number
Enter the port number of the external authentication server. The default port
number is 1812.
You need not change this value unless your network administrator instructs you to
do so with additional information.
Shared Secret
Enter a password (up to 31 alphanumeric characters) as the key to be shared
between the external authentication server and the NOA-3570.
The key must be the same on the external authentication server and your NOA3570. The key is not sent over the network.
Accounting Server The NOA-3570 will make three attempts to communicate with the accounting
/Alternate
server before attempting to use the alternate accounting server.
Note: You can use the command line interface to configure the
NOA-3570 to use up to four alternate accounting servers.
Active
Select Active to enable user accounting through this external accounting server.
Clear the Active check box to not use this to not perform user accounting through
this external accounting server.
Server IP Address Enter the IP address of the external accounting server in dotted decimal notation.
Port Number
Enter the port number of the external accounting server. The default port number is
1813.
You need not change this value unless your network administrator instructs you to
do so with additional information.
Shared Secret
Enter a password (up to 31 alphanumeric characters) as the key to be shared
between the external accounting server and the NOA-3570.
The key must be the same on the external accounting server and your NOA-3570.
The key is not sent over the network.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
Note: If you enable the NOA-3570’s internal RADIUS server, configure trusted user
accounts in the AUTH SERVER Trusted Users screen.
Chapter 5 Wireless LAN
77
NOA-3570 User’s Guide
5.14 Authentication Required: WPA
Select Authentication Required in the Wireless Port Control field and WPA in the Key
Management Protocol field to display the next screen.
Figure 33 Wireless LAN: 802.1x/WPA for WPA Protocol
The following table describes the labels not previously discussed.
78
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
Table 19 Wireless LAN: 802.1x/WPA for WPA Protocol
LABEL
DESCRIPTIONS
Key Management
Protocol
Choose WPA in this field.
WPA Mixed Mode
The NOA-3570 can operate in WPA Mixed Mode, which supports both clients
running WPA and clients running dynamic WEP key exchange with IEEE 802.1x in
the same Wi-Fi network.
Select Enable to activate WPA mixed mode. Otherwise, select Disable.
WPA Group Key
Update Timer
The WPA Group Key Update Timer is the rate at which the AP (if using WPAPSK key management) or RADIUS server (if using WPA key management) sends
a new group key out to all clients. The re-keying process is the WPA equivalent of
automatically changing the WEP key for an AP and all stations in a WLAN on a
periodic basis. Setting of the WPA Group Key Update Timer is also supported in
WPA-PSK mode. The NOA-3570 default is 1800 seconds (30 minutes).
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
5.15 Authentication Required: WPA-PSK
Select Authentication Required in the Wireless Port Control field and WPA-PSK in the
Key Management Protocol field to display the next screen.
Figure 34 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol
Chapter 5 Wireless LAN
79
NOA-3570 User’s Guide
The following table describes the labels not previously discussed.
Table 20 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol
80
LABEL
DESCRIPTION
Key Management
Protocol
Choose WPA-PSK in this field.
Pre-Shared Key
The encryption mechanisms used for WPA and WPA-PSK are the same. The only
difference between the two is that WPA-PSK uses a simple common password,
instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including
spaces and symbols).
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
Chapter 5 Wireless LAN
NOA-3570 User’s Guide
CHAPTER 6
Internal RADIUS Server
The NOA-3570 can use its internal RADIUS server to authenticate wireless clients. It can also
serve as a RADIUS server to authenticate other APs and their wireless clients. For more
background information on RADIUS, see the Introduction to RADIUS section.
6.1 Internal RADIUS Overview
The NOA-3570 has a built-in RADIUS server that can authenticate wireless clients or other
APs (that are configured as trusted APs).
The NOA-3570 can function as an AP and as a RADIUS server at the same time.
PEAP (Protected EAP) and MD5 authentication is implemented on the internal RADIUS
server using simple username and password methods over a secure TLS connection. See the
appendices for more information on the types of EAP authentication and the internal RADIUS
authentication method used in your NOA-3570.
Figure 35 NOA-3570 Authenticates Wireless Stations
Chapter 6 Internal RADIUS Server
81
NOA-3570 User’s Guide
Figure 36 NOA-3570 Authenticates Trusted APs
NOA-3570 as a RADIUS server
Trusted AP’s
Table 21 Internal RADIUS Server Screens Overview
LABEL
DESCRIPTION
Setting
Use the Setting screen to turn the NOA-3570’s internal RADIUS server off or
on and to view information about the NOA-3570’s certificates.
Trusted AP
Use the Trusted AP screen to specify APs as trusted APs so they can use the
NOA-3570’s internal RADIUS server to authenticate wireless clients. You can
set up to 31 trusted AP’s.
Trusted Users
Use the Trusted Users screen to configure a list of wireless client user names
and passwords for the NOA-3570 to authenticate. The NOA-3570 internal
RADIUS server can authenticate up to 32 wireless clients.
6.2 Internal RADIUS Server Setting
The INTERNAL RADIUS SERVER Setting screen displays information about certificates.
The certificates are used by wireless clients to authenticate the RADIUS server. Information
matching the certificate is held on the wireless clients utility, for example, Funk Software’s
Odyssey client. A password and user name on the utility must match the Trusted Users list so
that the RADIUS server can be authenticated.
Note: The internal RADIUS server does not support domain accounts (DOMAIN/
user). When you configure your Windows XP SP2 Wireless Zero Configuration PEAP/
MS-CHAPv2 settings, deselect the Use Windows logon name and password check
box. When authentication begins, a pop-up dialog box requests you to type a Name,
Password and Domain of the RADIUS server. Specify a name and password only,
do not specify a domain.
Click the AUTH SERVER link under ADVANCED and then the Setting tab. The screen
appears as shown.
82
Chapter 6 Internal RADIUS Server
NOA-3570 User’s Guide
Figure 37
Internal RADIUS Server Setting Screen
The following table describes the labels in this screen.
Table 22 My CertificatesNOA-3570
LABEL
DESCRIPTION
Active
Select the Active check box to have the NOA-3570 use its internal RADIUS server
to authenticate wireless clients or other APs.
This field displays the certificate index number. The certificates are listed in
alphabetical order. Use the CERTIFICATES screens to manage certificates. The
internal RADIUS server uses one of the certificates listed in this screen to
authenticate each wireless client. The exact certificate used, depends on the
certificate information configured on the wireless client.
Name
This field displays the name used to identify this certificate. It is recommended that
you give each certificate a unique name.
auto_generated_self_signed_cert is the factory default certificate common to all
NOA-3570’s that use certificates.
Note: ZyXEL recommends that you replace the factory default
certificate with one that uses your NOA-3570's MAC address. Do
this when you first log in to the NOA-3570 or in the CERTIFICATES
My Certificates screen.
Type
This field displays what kind of certificate this is.
REQ represents a certification request and is not yet a valid certificate. Send a
certification request to a certification authority, which then issues a certificate. Use
the My Certificate Import screen to import the certificate and replace the request.
SELF represents a self-signed certificate.
*SELF represents the default self-signed certificate, which the NOA-3570 uses to
sign imported trusted remote host certificates.
CERT represents a certificate issued by a certification authority.
Subject
This field displays identifying information about the certificate’s owner, such as CN
(Common Name), OU (Organizational Unit or department), O (Organization or
company) and C (Country). It is recommended that each certificate have unique
subject information.
Chapter 6 Internal RADIUS Server
83
NOA-3570 User’s Guide
Table 22 My CertificatesNOA-3570
LABEL
DESCRIPTION
Issuer
This field displays identifying information about the certificate’s issuing certification
authority, such as a common name, organizational unit or department,
organization or company and country. With self-signed certificates, this is the same
information as in the Subject field.
Valid From
This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not yet
become applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and
includes an Expiring! or Expired! message if the certificate is about to expire or
has already expired.
Apply
Click Apply to have the NOA-3570 use certificates to authenticate wireless clients.
Reset
Click Reset to start configuring this screen afresh.
6.3 Trusted AP Overview
A trusted AP is an AP that uses the NOA-3570’s internal RADIUS server to authenticate its
wireless clients. Each wireless client must have a user name and password configured in the
Trusted Users screen.
The following figure shows how this is done in two phases.
Figure 38 Trusted AP Overview
NOA-3570 RADIUS Server
Trusted AP’s
Wireless clients. You can
authenticate a maximum of
32 wireless clients using the
NOA-3570’s RADIUS server,
irrespective of the amount of
trusted AP’s configured on
the NOA-3570.
1 Configure an IP address and shared secret in the Trusted AP database to authenticate an
AP as a trusted AP.
84
Chapter 6 Internal RADIUS Server
NOA-3570 User’s Guide
2 Configure wireless client user names and passwords in the Trusted Users database to use
a trusted AP as a relay between the NOA-3570’s internal RADIUS server and the
wireless clients. The wireless clients can then be authenticated by the NOA-3570’s
internal RADIUS server.
6.4 Configuring Trusted AP
To specify APs as trusted APs so they can use the NOA-3570’s internal RADIUS server to
authenticate wireless clients, click the AUTH SERVER link under ADVANCED and then
the Trusted AP tab. The screen appears as shown.
Figure 39 Trusted AP Screen
The following table describes the labels in this screen.
Table 23 Trusted AP
LABEL
DESCRIPTION
This field displays the trusted AP index number.
Active
Select this check box to have the NOA-3570 use the IP Address and Shared Secret
to authenticate a trusted AP.
Chapter 6 Internal RADIUS Server
85
NOA-3570 User’s Guide
Table 23 Trusted AP
LABEL
DESCRIPTION
IP Address
Type the IP address of the trusted AP in dotted decimal notation.
Shared Secret
Enter a password (up to 31 alphanumeric characters, no spaces) as the key for
encrypting communications between the AP and the NOA-3570. The key is not sent
over the network. This key must be the same on the AP and the NOA-3570.
Both the NOA-3570’s IP address and this shared secret must also be configured in
the “external RADIUS” server fields of the trusted AP.
Note: The first trusted AP fields are for the NOA-3570 itself. Use
SMT menu 23.2 to configure them.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
6.5 Trusted Users Overview
A trusted user entry consists of a wireless client user name and password
6.6 Configuring Trusted Users
To configure trusted user entries, click the AUTH SERVER link under ADVANCED and
then the Trusted Users tab. The screen appears as shown.
86
Chapter 6 Internal RADIUS Server
NOA-3570 User’s Guide
Figure 40 Trusted Users Screen
The following table describes the labels in this screen.
Table 24 Trusted Users
LABEL
DESCRIPTION
This field displays the trusted user index number.
Active
Select this check box to have the NOA-3570 authenticate wireless clients with the
same user name and password activated on their wireless utilities.
User Name
Enter the user name for this user account. This name can be up to 31 alphanumeric
characters long, including spaces. The wireless client’s utility must use this name as
its login name.
Password
Type a password (up to 31 ASCII characters) for this user profile. Note that as you
type a password, the screen displays a (*) for each character you type.
The password on the wireless client’s utility must be the same as this password.
Note: If you are using PEAP authentication, this password field is
limited to 14 ASCII characters in length.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
Chapter 6 Internal RADIUS Server
87
NOA-3570 User’s Guide
88
Chapter 6 Internal RADIUS Server
NOA-3570 User’s Guide
CHAPTER 7
VLAN
This chapter discusses how to configure VLAN on the NOA-3570
7.1 VLAN
A VLAN (Virtual Local Area Network) allows a physical network to be partitioned into
multiple logical networks. Stations on a logical network can belong to one or more groups.
Only stations within the same group can talk to each other.
The NOA-3570 supports IEEE 802.1q VLAN tagging. Tagged VLAN uses an explicit tag
(VLAN ID) in the MAC header of a frame to identify VLAN membership. The NOA-3570
can identify VLAN tags for incoming Ethernet frames and add VLAN tags to outgoing
Ethernet frames.
7.1.1 Management VLAN ID
The management VLAN ID identifies the “management VLAN”. A computer must be a
member of this “management VLAN” in order to access and manage the NOA-3570. A
computer that is not a member of this VLAN, then that device cannot manage the NOA-3570.
If no devices are in the management VLAN, then you will only be able to access the NOA3570 through the console port (not through the network).
7.2 Configuring VLAN
Click ADVANCED and then VLAN. The screen appears as shown next.
Chapter 7 VLAN
89
NOA-3570 User’s Guide
Figure 41 VLAN
The following table describes the labels in this screen.
Table 25 VLAN
LABEL
DESCRIPTION
Enable VLAN Tagging
Select this check box to turn on VLAN tagging.
Use the Wireless screen to set the VLAN ID tag that the NOA-3570 adds to
the Ethernet frames that a WLAN adapter receives from wireless clients or
APs.
Management VLAN ID Enter a number from 1 to 4094 to define this VLAN group. Your management
computer must belong to this VLAN group in order to manage the NOA-3570.
This can be done in the following ways:
• The management computer could be a wireless client of the NOA-3570 if
the NOA-3570’s WLAN adapter is set to add the add the management
VLAN ID tag to Ethernet frames received from wireless clients.
• The management computer could be on the wired network, behind a
VLAN-aware switch that is configured to add the management VLAN ID
tag to Ethernet frames from the computer before sending them to NOA3570.
Note: Mail and FTP servers must have the same management
VLAN ID to communicate with the NOA-3570.
90
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
Chapter 7 VLAN
NOA-3570 User’s Guide
CHAPTER 8
IP Screen
This chapter discusses how to configure IP on the NOA-3570
8.1 Factory Ethernet Defaults
The Ethernet parameters of the NOA-3570 are preset in the factory with the following values:
1 IP address of 192.168.1.2
2 Subnet mask of 255.255.255.0 (24 bits)
These parameters should work for the majority of installations.
8.2 IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a
LAN share one common network number.
Where you obtain your network number depends on your particular situation. If the ISP or
your network administrator assigns you a block of registered IP addresses, follow their
instructions in selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single
user account and the ISP will assign you a dynamic IP address when the connection is
established. The Internet Assigned Number Authority (IANA) reserved this block of addresses
specifically for private use; please do not use any other number unless you are told otherwise.
Let's say you select 192.168.1.0 as the network number; which covers 254 individual
addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other words, the
first three numbers specify the network number while the last number identifies an individual
computer on that network.
Once you have decided on the network number, pick an IP address that is easy to remember,
for instance, 192.168.1.2, for your NOA-3570, but make sure that no other device on your
network is using that IP address.
The subnet mask specifies the network number portion of an IP address. Your NOA-3570 will
compute the subnet mask automatically based on the IP address that you entered. You don't
need to change the subnet mask computed by the NOA-3570 unless you are instructed to do
otherwise.
Chapter 8 IP Screen
91
NOA-3570 User’s Guide
8.2.1 IP Address Assignment
Every computer on the Internet must have a unique IP address. If your networks are isolated
from the Internet, for instance, only between your two branch offices, you can assign any IP
addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private
networks.
Table 26 Private IP Address Ranges
10.0.0.0
10.255.255.255
172.16.0.0
172.31.255.255
192.168.0.0
192.168.255.255
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private
network. If you belong to a small organization and your Internet access is through an ISP, the
ISP can provide you with the Internet addresses for your local networks. On the other hand, if
you are part of a much larger organization, you should consult your network administrator for
the appropriate IP addresses.
Note: Regardless of your particular situation, do not create an arbitrary IP address;
always follow the guidelines above. For more information on address assignment,
please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466,
Guidelines for Management of IP Address Space.
8.3 Configuring IP
Click ADVANCED and then IP to display the screen shown next.
92
Chapter 8 IP Screen
NOA-3570 User’s Guide
Figure 42
IP Setup
The following table describes the labels in this screen.
Table 27 IP Setup NOA-3570
LABEL
DESCRIPTION
IP Address Assignment
Get automatically from
DHCP
Select this option to have the NOA-3570 use a dynamically assigned IP
address from a DHCP server.
Note: You must know the IP address assigned to the NOA3570 (by the DHCP server) to access the NOA-3570 again.
Use fixed IP address
Select this option if your NOA-3570 is using a static IP address. When you
select this option, fill in the fields below.
IP Address
Enter the IP address of your NOA-3570 in dotted decimal notation.
Note: If you change the NOA-3570's IP address, you must use
the new IP address if you want to access the web configurator
again.
IP Subnet Mask
Type the subnet mask.
Gateway IP Address
Type the IP address of the gateway. The gateway is a router or switch on the
same network segment as the NOA-3570. The gateway helps forward
packets to their destinations. Leave this field as 0.0.0.0 if you do not know it.
Apply
Click Apply to save your changes back to the NOA-3570.
Reset
Click Reset to begin configuring this screen afresh.
Chapter 8 IP Screen
93
NOA-3570 User’s Guide
94
Chapter 8 IP Screen
NOA-3570 User’s Guide
CHAPTER 9
Certificates
This chapter gives background information about public-key certificates and explains how to
use them.
9.1 Certificates Overview
The NOA-3570 can use certificates (also called digital IDs) to authenticate users. Certificates
are based on public-private key pairs. A certificate contains the certificate owner’s identity and
public key. Certificates provide a way to exchange public keys for use in authentication.
A Certification Authority (CA) issues certificates and guarantees the identity of each
certificate owner. There are commercial certification authorities like CyberTrust or VeriSign
and government certification authorities. You can use the NOA-3570 to generate certification
requests that contain identifying information and public keys and then send the certification
requests to a certification authority.
In public-key encryption and decryption, each host has two keys. One key is public and can be
made openly available; the other key is private and must be kept secure. Public-key encryption
in general works as follows.
1 Tim wants to send a private message to Jenny. Tim generates a public key pair. What is
encrypted with one key can only be decrypted using the other.
2 Tim keeps the private key and makes the public key openly available.
3 Tim uses his private key to encrypt the message and sends it to Jenny.
4 Jenny receives the message and uses Tim’s public key to decrypt it.
5 Additionally, Jenny uses her own private key to encrypt a message and Tim uses Jenny’s
public key to decrypt the message.
The NOA-3570 uses certificates based on public-key cryptology to authenticate users
attempting to establish a connection, not to encrypt the data that you send after establishing a
connection. The method used to secure the data that you send through an established
connection depends on the type of connection.
The certification authority uses its private key to sign certificates. Anyone can then use the
certification authority’s public key to verify the certificates.
A certification path is the hierarchy of certification authority certificates that validate a
certificate. The NOA-3570 does not trust a certificate if any certificate on its path has expired
or been revoked.
Chapter 9 Certificates
95
NOA-3570 User’s Guide
9.1.1 Advantages of Certificates
Certificates offer the following benefits.
• The NOA-3570 only has to store the certificates of the certification authorities that you
decide to trust, no matter how many devices you need to authenticate.
• Key distribution is simple and very secure since you can freely distribute public keys and
you never need to transmit private keys.
9.2 Self-signed Certificates
Until public-key infrastructure becomes more mature, it may not be available in some areas.
You can have the NOA-3570 act as a certification authority and sign its own certificates.
9.3 Configuration Summary
This section summarizes how to manage certificates on the NOA-3570.
Figure 43 Certificate Configuration Overview
Use the My Certificate screens to generate and export self-signed certificates or certification
requests and import the NOA-3570s’ CA-signed certificates.
Use the Trusted CA screens to save CA certificates to the NOA-3570.
9.4 My Certificates
Click CERTIFICATES, My Certificates to open the NOA-3570’s summary list of
certificates and certification requests. Certificates display in black and certification requests
display in gray. See the following figure.
96
Chapter 9 Certificates
NOA-3570 User’s Guide
Figure 44 My Certificates
The following table describes the labels in this screen.
Table 28 My CertificatesNOA-3570
LABEL
DESCRIPTION
PKI Storage
Space in Use
This bar displays the percentage of the NOA-3570’s PKI storage space that is
currently in use. The bar turns from green to red when the maximum is being
approached. When the bar is red, you should consider deleting expired or
unnecessary certificates before adding more certificates.
Replace
This button displays when the NOA-3570 has the factory default certificate. The
factory default certificate is common to all NOA-3570s that use certificates. ZyXEL
recommends that you use this button to replace the factory default certificate with
one that uses your NOA-3570's MAC address.
This field displays the certificate index number. The certificates are listed in
alphabetical order.
Name
This field displays the name used to identify this certificate. It is recommended that
you give each certificate a unique name.
Chapter 9 Certificates
97
NOA-3570 User’s Guide
Table 28 My CertificatesNOA-3570
LABEL
DESCRIPTION
Type
This field displays what kind of certificate this is.
REQ represents a certification request and is not yet a valid certificate. Send a
certification request to a certification authority, which then issues a certificate. Use
the My Certificate Import screen to import the certificate and replace the request.
SELF represents a self-signed certificate.
*SELF represents the default self-signed certificate, which the NOA-3570 uses to
sign imported trusted remote host certificates.
CERT represents a certificate issued by a certification authority.
Subject
This field displays identifying information about the certificate’s owner, such as CN
(Common Name), OU (Organizational Unit or department), O (Organization or
company) and C (Country). It is recommended that each certificate have unique
subject information.
Issuer
This field displays identifying information about the certificate’s issuing certification
authority, such as a common name, organizational unit or department,
organization or company and country. With self-signed certificates, this is the same
information as in the Subject field.
Valid From
This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not yet
become applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and
includes an Expiring! or Expired! message if the certificate is about to expire or has
already expired.
Details
Select a certificate’s radio button and click Details to open a screen with an indepth list of information about the certificate.
Create
Click Create to go to the screen where you can have the NOA-3570 generate a
certificate or a certification request.
Import
Click Import to open a screen where you can save the certificate that you have
enrolled from a certification authority from your computer to the NOA-3570.
Delete
Select a certificate’s radio button and click Delete to remove the certificate.
A window displays asking you to confirm that you want to delete the certificate.
You cannot delete a certificate that one or more features is configured to use.
Do the following to delete a certificate that shows *SELF in the Type field.
1. Make sure that no features are configured to use the *SELF certificate.
2. Select the radio button of another self-signed certificate and click Details (see
the description on the Create button if you need to create a self-signed certificate).
3. Select the Default self-signed certificate which signs the imported remote
host certificates check box.
4. Click Apply to save the changes and return to the My Certificates screen.
5. The certificate that originally showed *SELF displays SELF and you can delete
it now.
Subsequent certificates move up by one when you take this action.
Refresh
Click Refresh to display the current validity status of the certificates.
9.5 Certificate File Formats
The certification authority certificate that you want to import has to be in one of these file
formats:
98
Chapter 9 Certificates
NOA-3570 User’s Guide
• Binary X.509: This is an ITU-T recommendation that defines the formats for X.509
certificates.
• PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses 64 ASCII
characters to convert a binary X.509 certificate into a printable form.
• Binary PKCS#7: This is a standard that defines the general syntax for data (including
digital signatures) that may be encrypted. The NOA-3570 currently allows the
importation of a PKS#7 file that contains a single certificate.
• PEM (Base-64) encoded PKCS#7: This Privacy Enhanced Mail (PEM) format uses 64
ASCII characters to convert a binary PKCS#7 certificate into a printable form.
9.6 Importing a Certificate
Click CERTIFICATES, My Certificates and then Import to open the My Certificate
Import screen. Follow the instructions in this screen to save an existing certificate to the
NOA-3570, see the following figure.
Note: 1. You can only import a certificate that matches a corresponding certification
request that was generated by the NOA-3570.
Note: 2. The certificate you import replaces the corresponding request in the My
Certificates screen.
Note: 3. You must remove any spaces from the certificate’s filename before you can
import it.
Figure 45 My Certificate Import
The following table describes the labels in this screen.
Chapter 9 Certificates
99
NOA-3570 User’s Guide
Table 29 My Certificate Import
LABEL
DESCRIPTION
File Path
Type in the location of the file you want to upload in this field or click Browse to find it.
Browse
Click Browse to find the certificate file you want to upload.
Apply
Click Apply to save the certificate on the NOA-3570.
Cancel
Click Cancel to quit and return to the My Certificates screen.
9.7 Creating a Certificate
Click CERTIFICATES, My Certificates and then Create to open the My Certificate
Create screen. Use this screen to have the NOA-3570 create a self-signed certificate, enroll a
certificate with a certification authority or generate a certification request, see the following
figure.
100
Chapter 9 Certificates
NOA-3570 User’s Guide
Figure 46 My Certificate Create
The following table describes the labels in this screen.
Table 30 My Certificate CreateNOA-3570
LABEL
DESCRIPTION
Certificate Name
Type up to 31 ASCII characters (not including spaces) to identify this
certificate.
Subject Information
Use these fields to record information that identifies the owner of the
certificate. You do not have to fill in every field, although the Common Name is
mandatory. The certification authority may add fields (such as a serial number)
to the subject information when it issues a certificate. It is recommended that
each certificate have unique subject information.
Common Name
Select a radio button to identify the certificate’s owner by IP address, domain
name or e-mail address. Type the IP address (in dotted decimal notation),
domain name or e-mail address in the field provided. The domain name or email address can be up to 31 ASCII characters. The domain name or e-mail
address is for identification purposes only and can be any string.
Chapter 9 Certificates
101
NOA-3570 User’s Guide
Table 30 My Certificate CreateNOA-3570
102
LABEL
DESCRIPTION
Organizational Unit
Type up to 127 characters to identify the organizational unit or department to
which the certificate owner belongs. You may use any character, including
spaces, but the NOA-3570 drops trailing spaces.
Organization
Type up to 127 characters to identify the company or group to which the
certificate owner belongs. You may use any character, including spaces, but
the NOA-3570 drops trailing spaces.
Country
Type up to 127 characters to identify the nation where the certificate owner is
located. You may use any character, including spaces, but the NOA-3570
drops trailing spaces.
Key Length
Select a number from the drop-down list box to determine how many bits the
key should use (512 to 2048). The longer the key, the more secure it is. A
longer key also uses more PKI storage space.
Enrollment Options
These radio buttons deal with how and when the certificate is to be generated.
Create a self-signed
certificate
Select Create a self-signed certificate to have the NOA-3570 generate the
certificate and act as the Certification Authority (CA) itself. This way you do not
need to apply to a certification authority for certificates.
Create a certification
request and save it
locally for later manual
enrollment
Select Create a certification request and save it locally for later manual
enrollment to have the NOA-3570 generate and store a request for a
certificate. Use the My Certificate Details screen to view the certification
request and copy it to send to the certification authority.
Copy the certification request from the My Certificate Details screen (see
Section 9.8 on page 103) and then send it to the certification authority.
Create a certification
request and enroll for
a certificate
immediately online
Select Create a certification request and enroll for a certificate
immediately online to have the NOA-3570 generate a request for a certificate
and apply to a certification authority for a certificate.
You must have the certification authority’s certificate already imported in the
Trusted CAs screen.
When you select this option, you must select the certification authority’s
enrollment protocol and the certification authority’s certificate from the dropdown list boxes and enter the certification authority’s server address. You also
need to fill in the Reference Number and Key if the certification authority
requires them.
Enrollment Protocol
Select the certification authority’s enrollment protocol from the drop-down list
box.
Simple Certificate Enrollment Protocol (SCEP) is a TCP-based enrollment
protocol that was developed by VeriSign and Cisco.
Certificate Management Protocol (CMP) is a TCP-based enrollment protocol
that was developed by the Public Key Infrastructure X.509 working group of
the Internet Engineering Task Force (IETF) and is specified in RFC 2510.
CA Server Address
Enter the IP address (or URL) of the certification authority server.
CA Certificate
Select the certification authority’s certificate from the CA Certificate dropdown list box.
You must have the certification authority’s certificate already imported in the
Trusted CAs screen. Click Trusted CAs to go to the Trusted CAs screen
where you can view (and manage) the NOA-3570's list of certificates of trusted
certification authorities.
Request
Authentication
When you select Create a certification request and enroll for a certificate
immediately online, the certification authority may want you to include a
reference number and key to identify you when you send a certification
request. Fill in both the Reference Number and the Key fields if your
certification authority uses CMP enrollment protocol. Just fill in the Key field if
your certification authority uses the SCEP enrollment protocol.
Chapter 9 Certificates
NOA-3570 User’s Guide
Table 30 My Certificate CreateNOA-3570
LABEL
DESCRIPTION
Key
Type the key that the certification authority gave you.
Apply
Click Apply to begin certificate or certification request generation.
Cancel
Click Cancel to quit and return to the My Certificates screen.
After you click Apply in the My Certificate Create screen, you see a screen that tells you the
NOA-3570 is generating the self-signed certificate or certification request.
After the NOA-3570 successfully enrolls a certificate or generates a certification request or a
self-signed certificate, you see a screen with a Return button that takes you back to the My
Certificates screen.
If you configured the My Certificate Create screen to have the NOA-3570 enroll a certificate
and the certificate enrollment is not successful, you see a screen with a Return button that
takes you back to the My Certificate Create screen. Click Return and check your
information in the My Certificate Create screen. Make sure that the certification authority
information is correct and that your Internet connection is working properly if you want the
NOA-3570 to enroll a certificate online.
9.8 My Certificate Details
Click CERTIFICATES, and then My Certificates to open the My Certificates screen (see
Figure 44 on page 97). Click the details icon to open the My Certificate Details screen. You
can use this screen to view in-depth certificate information and change the certificate’s name.
In the case of a self-signed certificate, you can set it to be the one that the NOA-3570 uses to
sign the trusted remote host certificates that you import to the NOA-3570.
Chapter 9 Certificates
103
NOA-3570 User’s Guide
Figure 47 My Certificate Details
104
Chapter 9 Certificates
NOA-3570 User’s Guide
The following table describes the labels in this screen.
Table 31 My Certificate DetailsNOA-3570
LABEL
DESCRIPTION
Name
This field displays the identifying name of this certificate. If you want to change
the name, type up to 31 characters to identify this certificate. You may use any
character (not including spaces).
Property
Default self-signed
certificate which
signs the imported
remote host
certificates.
Select this check box to have the NOA-3570 use this certificate to sign the
trusted remote host certificates that you import to the NOA-3570. This check box
is only available with self-signed certificates.
If this check box is already selected, you cannot clear it in this screen, you must
select this check box in another self-signed certificate’s details screen. This
automatically clears the check box in the details screen of the certificate that was
previously set to sign the imported trusted remote host certificates.
Certification Path
Click the Refresh button to have this read-only text box display the hierarchy of
certification authorities that validate the certificate (and the certificate itself).
If the issuing certification authority is one that you have imported as a trusted
certification authority, it may be the only certification authority in the list (along
with the certificate itself). If the certificate is a self-signed certificate, the
certificate itself is the only one in the list. The NOA-3570 does not trust the
certificate and displays “Not trusted” in this field if any certificate on the path has
expired or been revoked.
Refresh
Click Refresh to display the certification path.
Certificate
Information
These read-only fields display detailed information about the certificate.
Type
This field displays general information about the certificate. CA-signed means
that a Certification Authority signed the certificate. Self-signed means that the
certificate’s owner signed the certificate (not a certification authority). “X.509”
means that this certificate was created and signed according to the ITU-T X.509
recommendation that defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the certification
authority or generated by the NOA-3570.
Subject
This field displays information that identifies the owner of the certificate, such as
Common Name (CN), Organizational Unit (OU), Organization (O) and Country
(C).
Issuer
This field displays identifying information about the certificate’s issuing
certification authority, such as Common Name, Organizational Unit,
Organization and Country.
With self-signed certificates, this is the same as the Subject Name field.
Signature Algorithm
This field displays the type of algorithm that was used to sign the certificate. The
NOA-3570 uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm
and the SHA1 hash algorithm). Some certification authorities may use rsapkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash
algorithm).
Valid From
This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not
yet become applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red
and includes an Expiring! or Expired! message if the certificate is about to expire
or has already expired.
Chapter 9 Certificates
105
NOA-3570 User’s Guide
Table 31 My Certificate DetailsNOA-3570
LABEL
DESCRIPTION
Key Algorithm
This field displays the type of algorithm that was used to generate the
certificate’s key pair (the NOA-3570 uses RSA encryption) and the length of the
key set in bits (1024 bits for example).
Subject Alternative
Name
This field displays the certificate owner‘s IP address (IP), domain name (DNS) or
e-mail address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For
example, “DigitalSignature” means that the key can be used to sign certificates
and “KeyEncipherment” means that the key can be used to encrypt text.
Basic Constraint
This field displays general information about the certificate. For example,
Subject Type=CA means that this is a certification authority’s certificate and
“Path Length Constraint=1” means that there can only be one certification
authority in the certificate’s path.
MD5 Fingerprint
This is the certificate’s message digest that the NOA-3570 calculated using the
MD5 algorithm.
SHA1 Fingerprint
This is the certificate’s message digest that the NOA-3570 calculated using the
SHA1 algorithm.
Certificate in PEM
(Base-64) Encoded
Format
This read-only text box displays the certificate or certification request in Privacy
Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the
binary certificate into a printable form.
You can copy and paste a certification request into a certification authority’s web
page, an e-mail that you send to the certification authority or a text editor and
save the file on a management computer for later manual enrollment.
You can copy and paste a certificate into an e-mail to send to friends or
colleagues or you can copy and paste a certificate into a text editor and save the
file on a management computer for later distribution (via floppy disk for
example).
Export
Click this button and then Save in the File Download screen. The Save As
screen opens, browse to the location that you want to use and click Save.
Note: When you are saving your certificate, use "cer" or "cert" as
the file name extension.
Apply
Click Apply to save your changes back to the NOA-3570. You can only change
the name, except in the case of a self-signed certificate, which you can also set
to be the default self-signed certificate that signs the imported trusted remote
host certificates.
Cancel
Click Cancel to quit and return to the My Certificates screen.
9.9 Trusted CAs
Click CERTIFICATES, Trusted CAs to open the Trusted CAs screen. This screen displays
a summary list of certificates of the certification authorities that you have set the NOA-3570 to
accept as trusted. The NOA-3570 accepts any valid certificate signed by a certification
authority on this list as being trustworthy; thus you do not need to import any certificate that is
signed by one of these certification authorities. See the following figure.
106
Chapter 9 Certificates
NOA-3570 User’s Guide
Figure 48 Trusted CAs
The following table describes the labels in this screen.
Table 32 Trusted CAsNOA-3570
LABEL
DESCRIPTION
PKI Storage
Space in Use
This bar displays the percentage of the NOA-3570’s PKI storage space that is
currently in use. The bar turns from green to red when the maximum is being
approached. When the bar is red, you should consider deleting expired or
unnecessary certificates before adding more certificates.
This field displays the certificate index number. The certificates are listed in
alphabetical order.
Name
This field displays the name used to identify this certificate.
Subject
This field displays identifying information about the certificate’s owner, such as CN
(Common Name), OU (Organizational Unit or department), O (Organization or
company) and C (Country). It is recommended that each certificate have unique
subject information.
Issuer
This field displays identifying information about the certificate’s issuing certification
authority, such as a common name, organizational unit or department,
organization or company and country. With self-signed certificates, this is the same
information as in the Subject field.
Valid From
This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not yet
become applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and
includes an Expiring! or Expired! message if the certificate is about to expire or has
already expired.
Chapter 9 Certificates
107
NOA-3570 User’s Guide
Table 32 Trusted CAsNOA-3570
LABEL
DESCRIPTION
CRL Issuer
This field displays Yes if the certification authority issues Certificate Revocation
Lists for the certificates that it has issued and you have selected the Issues
certificate revocation lists (CRL) check box in the certificate’s details screen to
have the NOA-3570 check the CRL before trusting any certificates issued by the
certification authority. Otherwise the field displays “No”.
Details
Select a certificate’s radio button and click Details to open a screen with an indepth list of information about the certificate where you can change the certificate’s
name and set whether or not you want the NOA-3570 to check a certification
authority’s list of revoked certificates before trusting a certificate issued by the
certification authority.
Import
Click Import to open a screen where you can save the certificate of a certification
authority that you trust, from your computer to the NOA-3570.
Delete
Select a certificate’s radio button and click Delete to remove the certificate.
A window displays asking you to confirm that you want to delete the certificate.
Subsequent certificates move up by one when you take this action.
Refresh
Click this button to display the current validity status of the certificates.
9.10 Importing a Trusted CA’s Certificate
Click CERTIFICATES, Trusted CAs to open the Trusted CAs screen and then click
Import to open the Trusted CA Import screen. Follow the instructions in this screen to save
a trusted certification authority’s certificate to the NOA-3570, see the following figure.
Note: You must remove any spaces from the certificate’s filename before you can
import the certificate.
108
Chapter 9 Certificates
NOA-3570 User’s Guide
Figure 49 Trusted CA Import
The following table describes the labels in this screen.
Table 33 Trusted CA Import
LABEL
DESCRIPTION
File Path
Type in the location of the file you want to upload in this field or click Browse to find it.
Browse
Click Browse to find the certificate file you want to upload.
Apply
Click Apply to save the certificate on the NOA-3570.
Cancel
Click Cancel to quit and return to the Trusted CAs screen.
9.11 Trusted CA Certificate Details
Click CERTIFICATES, Trusted CAs to open the Trusted CAs screen. Click the details
icon to open the Trusted CA Details screen. Use this screen to view in-depth information
about the certification authority’s certificate, change the certificate’s name and set whether or
not you want the NOA-3570 to check a certification authority’s list of revoked certificates
before trusting a certificate issued by the certification authority.
Chapter 9 Certificates
109
NOA-3570 User’s Guide
Figure 50 Trusted CA Details
110
Chapter 9 Certificates
NOA-3570 User’s Guide
The following table describes the labels in this screen.
Table 34 Trusted CA DetailsNOA-3570
LABEL
DESCRIPTION
Name
This field displays the identifying name of this certificate. If you want to change
the name, type up to 31 characters to identify this key certificate. You may use
any character (not including spaces).
Property
Check incoming
certificates issued by
this CA against a
CRL
Select this check box to have the NOA-3570 check incoming certificates that are
issued by this certification authority against a Certificate Revocation List (CRL).
Clear this check box to have the NOA-3570 not check incoming certificates that
are issued by this certification authority against a Certificate Revocation List
(CRL).
Certificate Path
Click the Refresh button to have this read-only text box display the end entity’s
certificate and a list of certification authority certificates that shows the hierarchy
of certification authorities that validate the end entity’s certificate. If the issuing
certification authority is one that you have imported as a trusted certification
authority, it may be the only certification authority in the list (along with the end
entity’s own certificate). The NOA-3570 does not trust the end entity’s certificate
and displays “Not trusted” in this field if any certificate on the path has expired or
been revoked.
Refresh
Click Refresh to display the certification path.
Certificate
Information
These read-only fields display detailed information about the certificate.
Type
This field displays general information about the certificate. CA-signed means
that a Certification Authority signed the certificate. Self-signed means that the
certificate’s owner signed the certificate (not a certification authority). X.509
means that this certificate was created and signed according to the ITU-T X.509
recommendation that defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the certification
authority.
Subject
This field displays information that identifies the owner of the certificate, such as
Common Name (CN), Organizational Unit (OU), Organization (O) and Country
(C).
Issuer
This field displays identifying information about the certificate’s issuing
certification authority, such as Common Name, Organizational Unit,
Organization and Country.
With self-signed certificates, this is the same information as in the Subject
Name field.
Signature Algorithm
This field displays the type of algorithm that was used to sign the certificate.
Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key
encryption algorithm and the SHA1 hash algorithm). Other certification
authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm
and the MD5 hash algorithm).
Valid From
This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not
yet become applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red
and includes an Expiring! or Expired! message if the certificate is about to expire
or has already expired.
Key Algorithm
This field displays the type of algorithm that was used to generate the
certificate’s key pair (the NOA-3570 uses RSA encryption) and the length of the
key set in bits (1024 bits for example).
Chapter 9 Certificates
111
NOA-3570 User’s Guide
Table 34 Trusted CA DetailsNOA-3570
112
LABEL
DESCRIPTION
Subject Alternative
Name
This field displays the certificate’s owner‘s IP address (IP), domain name (DNS)
or e-mail address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For
example, “DigitalSignature” means that the key can be used to sign certificates
and “KeyEncipherment” means that the key can be used to encrypt text.
Basic Constraint
This field displays general information about the certificate. For example,
Subject Type=CA means that this is a certification authority’s certificate and
“Path Length Constraint=1” means that there can only be one certification
authority in the certificate’s path.
CRL Distribution
Points
This field displays how many directory servers with Lists of revoked certificates
the issuing certification authority of this certificate makes available. This field
also displays the domain names or IP addresses of the servers.
MD5 Fingerprint
This is the certificate’s message digest that the NOA-3570 calculated using the
MD5 algorithm. You can use this value to verify with the certification authority
(over the phone for example) that this is actually their certificate.
SHA1 Fingerprint
This is the certificate’s message digest that the NOA-3570 calculated using the
SHA1 algorithm. You can use this value to verify with the certification authority
(over the phone for example) that this is actually their certificate.
Certificate in PEM
(Base-64) Encoded
Format
This read-only text box displays the certificate or certification request in Privacy
Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the
binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to friends or
colleagues or you can copy and paste the certificate into a text editor and save
the file on a management computer for later distribution (via floppy disk for
example).
Export
Click this button and then Save in the File Download screen. The Save As
screen opens, browse to the location that you want to use and click Save.
Apply
Click Apply to save your changes back to the NOA-3570. You can only change
the name and/or set whether or not you want the NOA-3570 to check the CRL
that the certification authority issues before trusting a certificate issued by the
certification authority.
Cancel
Click Cancel to quit and return to the Trusted CAs screen.
Chapter 9 Certificates
NOA-3570 User’s Guide
CHAPTER 10
Log Screens
This chapter contains information about configuring general log settings and viewing the
NOA-3570’s logs. Refer to Appendix K on page 249 for example log message explanations.
10.1 Configuring View Log
The web configurator allows you to look at all of the NOA-3570’s logs in one location.
Click LOGS to open the View Log screen. The View Log screen displays logs for the
categories that you selected in the Log Settings screen (see Figure 52 on page 116).
You can view logs and alert messages in this screen. Log entries in red indicate alerts. Once
the log table is full, old logs are deleted as new logs are created.
Click a column heading to sort the entries. A triangle indicates the direction of the sort order.
Chapter 10 Log Screens
113
NOA-3570 User’s Guide
Figure 51 View Log
The following table describes the labels in this screen.
Table 35 View Log NOA-3570
114
LABEL
DESCRIPTION
Display
Select a log category from the drop down list box to display logs within the
selected category. To view all logs, select All Logs.
The number of categories shown in the drop down list box depends on the
selection in the Log Settings page.
Email Log Now
Click Email Log Now to send the log screen to the e-mail address specified in
the Log Settings page.
Refresh
Click Refresh to renew the log screen.
Clear Log
Click Clear Log to clear all the logs.
Time
This field displays the time the log was recorded.
Message
This field states the reason for the log.
Source
This field lists the source IP address and the port number of the incoming
packet.
Chapter 10 Log Screens
NOA-3570 User’s Guide
Table 35 View Log NOA-3570
LABEL
DESCRIPTION
Destination
This field lists the destination IP address and the port number of the incoming
packet.
Notes
This field displays additional information about the log entry.
10.2 Configuring Log Settings
To change your NOA-3570’s log settings, click LOGS and then Log Settings. The Log
Settings screen opens.
Use the Log Settings screen to configure to where the NOA-3570 is to send the logs; the
schedule for when the NOA-3570 is to send the logs and which logs and/or immediate alerts
the NOA-3570 is to send.
An alert is a type of log that warrants more serious attention. Some categories such as System
Errors consist of both logs and alerts. You may differentiate them by their color in the View
Log screen. Alerts are displayed in red and logs are displayed in black.
Chapter 10 Log Screens
115
NOA-3570 User’s Guide
Figure 52 Log Settings
The following table describes the labels in this screen.
Table 36 Log Settings NOA-3570
LABEL
DESCRIPTION
Address Info
116
Mail Server
Enter the server name or the IP address of the mail server for the e-mail
addresses specified below. If this field is left blank, logs and alert messages
will not be sent via e-mail.
Mail Subject
Type a title that you want to be in the subject line of the log e-mail message
that the NOA-3570 sends.
Chapter 10 Log Screens
NOA-3570 User’s Guide
Table 36 Log Settings NOA-3570
LABEL
DESCRIPTION
Send Log to
Logs are sent to the e-mail address specified in this field. If this field is left
blank, logs will not be sent via e-mail.
Send Alerts to
Enter the e-mail address where the alert messages will be sent. If this field is
left blank, alert messages will not be sent via e-mail.
Syslog Logging
Syslog logging sends a log to an external syslog server used to store logs.
Active
Click Active to enable syslog logging.
Syslog IP Address
Enter the server name or IP address of the syslog server that will log the
selected categories of logs.
Log Facility
Select a location from the drop down list box. The log facility allows you to log
the messages to different files in the syslog server. Refer to the documentation
of your syslog program for more details.
Send Log
Log Schedule
This drop-down menu is used to configure the frequency of log messages
being sent as E-mail:
• Daily
• Weekly
• Hourly
• When Log is Full
• None.
If the Weekly or the Daily option is selected, specify a time of day when the Email should be sent. If the Weekly option is selected, then also specify which
day of the week the E-mail should be sent. If the When Log is Full option is
selected, an alert is sent when the log fills up. If you select None, no log
messages are sent.
Day for Sending
Log
This field is only available when you select Weekly in the Log Schedule field.
Use the drop down list box to select which day of the week to send the logs.
Time for Sending
Log
Enter the time of the day in 24-hour format (for example 23:00 equals 11:00
pm) to send the logs.
Clear log after sending Select the check box to clear all logs after logs and alert messages are sent
mail
via e-mail.
Log
Select the categories of logs that you want to record.
Send immediate alert
Select the categories of alerts for which you want the NOA-3570 to
immediately send e-mail alerts.
Apply
Click Apply to save your customized settings and exit this screen.
Reset
Click Reset to reconfigure all the fields in this screen.
Chapter 10 Log Screens
117
NOA-3570 User’s Guide
118
Chapter 10 Log Screens
NOA-3570 User’s Guide
C H A P T E R 11
Maintenance
This chapter displays system information such as ZyNOS firmware, port IP addresses and port
traffic statistics.
11.1 Maintenance Overview
The maintenance screens can help you view system information, upload new firmware,
manage configuration and restart your NOA-3570.
11.2 System Status Screen
Click MAINTENANCE to open the System Status screen, where you can use to monitor
your NOA-3570. Note that these labels are READ-ONLY and are meant to be used for
diagnostic purposes.
Figure 53 System Status
The following table describes the labels in this screen.
Table 37 System Status NOA-3570
LABEL
DESCRIPTION
System Name
This is the System Name you enter in the first Internet Access Wizard screen.
It is for identification purposes
ZyNOS Firmware
Version
This is the ZyNOS Firmware version and the date created. ZyNOS is ZyXEL's
proprietary Network Operating System design.
Chapter 11 Maintenance
119
NOA-3570 User’s Guide
Table 37 System Status NOA-3570
LABEL
DESCRIPTION
IP Address
This is the Ethernet port IP address.
IP Subnet Mask
This is the Ethernet port subnet mask.
DHCP
This is the Ethernet port DHCP role - Client or None.
Show Statistics
Click Show Statistics to see router performance statistics such as number of
packets sent and number of packets received for each port.
11.2.1 System Statistics
Read-only information here includes port status, packet specific statistics and bridge link
status. Also provided are "system up time" and "poll interval(s)". The Poll Interval field is
configurable.
Figure 54 System Status: Show Statistics
The following table describes the labels in this screen.
Table 38 System Status: Show Statistics NOA-3570
120
LABEL
DESCRIPTION
Port
This is the Ethernet port or the built-in wireless card.
Status
This shows the port speed and duplex setting if you are using Ethernet
encapsulation for the Ethernet port.
This shows the transmission speed only for wireless port.
TxPkts
This is the number of transmitted packets on this port.
RxPkts
This is the number of received packets on this port.
Chapter 11 Maintenance
NOA-3570 User’s Guide
Table 38 System Status: Show Statistics NOA-3570
LABEL
DESCRIPTION
Collisions
This is the number of collisions on this port.
Tx B/s
This shows the transmission speed in bytes per second on this port.
Rx B/s
This shows the reception speed in bytes per second on this port.
Up Time
This is total amount of time the line has been up.
Bridge Link #
This is the index number of the bridge connection.
Active
This shows whether the bridge connection is activated or not.
Remote Bridge MAC
Address
This is the MAC address of the peer device in bridge mode.
Status
This shows the current status of the bridge connection, which can be Up or
Down.
TxPkts
This is the number of transmitted packets on the wireless bridge.
RxPkts
This is the number of received packets on the wireless bridge.
System Up Time
This is the total time the NOA-3570 has been on.
Poll Interval(s)
Enter the time interval for refreshing statistics.
Set Interval
Click this button to apply the new poll interval you entered above.
Stop
Click this button to stop refreshing statistics.
11.3 Association List
View the wireless stations that are currently associated to the NOA-3570’s WLAN cards in the
Association List screen.
Click MAINTENANCE and then the Association List tab to display the screen as shown
next.
Figure 55 Association List
The following table describes the labels in this screen.
Chapter 11 Maintenance
121
NOA-3570 User’s Guide
Table 39 Association List NOA-3570
LABEL
DESCRIPTION
WLAN 1, 2
This identifies the WLAN adapter to which the list of wireless clients is
associated.
This is the index number of an associated wireless station.
MAC Address
This field displays the MAC address of an associated wireless station.
Association Time
This field displays the time a wireless station first associated with the NOA3570.
Name (SSID)
This field displays the SS identification name to which the wireless station is
associated.
Refresh
Click Refresh to reload the screen.
11.4 Channel Usage
The Channel Usage screen shows which channels are being used by other wireless networks
within the NOA-3570's transmission range. If a channel is being used, select a channel
removed from it by five channels to avoid overlap.
Click MAINTENANCE and then the Channel Usage tab to display the screen shown next.
Wait a moment while the NOA-3570 compiles the information.
Figure 56 Channel Usage
The following table describes the labels in this screen.
122
Chapter 11 Maintenance
NOA-3570 User’s Guide
Table 40 Channel Usage NOA-3570
LABEL
DESCRIPTION
SSID
This is the Service Set IDentification name of the AP in an Infrastructure
wireless network or wireless station in an Ad-Hoc wireless network. For our
purposes, we define an Infrastructure network as a wireless network that uses
an AP and an Ad-Hoc network (also known as Independent Basic Service Set
(IBSS)) as one that doesn’t. See Chapter 5 on page 55 for more information on
basic service sets (BSS) and extended service sets (ESS).
MAC Address
This field displays the MAC address of the AP in an Infrastructure wireless
network. It is randomly generated (so ignore it) in an Ad-Hoc wireless network.
Channel
This is the index number of the channel currently used by the associated AP in
an Infrastructure wireless network or wireless station in an Ad-Hoc wireless
network.
Signal
This field displays the strength of the AP’s signal. If you must choose a channel
that’s currently in use, choose one with low signal strength for minimum
interference.
Network Mode
“Network Mode” in this screen refers to your wireless LAN infrastructure and
WEP setup (refer to Chapter 5 on page 55).
Network modes are: Infra (Infrastructure which is the same as an extended
service set ESS), Infra, WEP (Infrastructure with WEP encryption enabled), AdHoc (same as an independent basic service set IBSS), or Ad-Hoc with WEP.
Refresh
Click Refresh to reload the screen.
11.5 F/W Upload Screen
Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a
.bin extension, for example, "NOA-3570.bin". The upload process uses HTTP (Hypertext
Transfer Protocol) and may take up to two minutes. After a successful upload, the system will
reboot. See Chapter 20 on page 169 for upgrading firmware using FTP/TFTP commands.
Click MAINTENANCE and then F/W Upload. Follow the instructions in this screen to
upload firmware to your NOA-3570.
Chapter 11 Maintenance
123
NOA-3570 User’s Guide
Figure 57 Firmware Upload
The following table describes the labels in this screen.
Table 41 Firmware Upload
LABEL
DESCRIPTION
File Path
Type in the location of the file you want to upload in this field or click Browse ...
to find it.
Browse...
Click Browse... to find the .bin file you want to upload. Remember that you must
decompress compressed (.zip) files before you can upload them.
Upload
Click Upload to begin the upload process. This process may take up to two
minutes.
Note: Do not turn off the NOA-3570 while firmware upload is in progress!
After you see the Firmware Upload in Process screen, wait two minutes before logging into
the NOA-3570 again.
124
Chapter 11 Maintenance
NOA-3570 User’s Guide
Figure 58 Firmware Upload In Process
The NOA-3570 automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
Figure 59 Network Temporarily Disconnected
After two minutes, log in again and check your new firmware version in the System Status
screen.
If the upload was not successful, the following screen will appear. Click Return to go back to
the F/W Upload screen.
Chapter 11 Maintenance
125
NOA-3570 User’s Guide
Figure 60 Firmware Upload Error
11.6 Configuration Screen
See Chapter 20 on page 169 for transferring configuration files using FTP/TFTP commands.
Click MAINTENANCE, and then the Configuration tab. Information related to backing up
configuration, restoring configuration and restoring factory defaults appears as shown next.
126
Chapter 11 Maintenance
NOA-3570 User’s Guide
Figure 61 Configuration
11.6.1 Backup Configuration
Backup configuration allows you to back up (save) the NOA-3570’s current configuration to a
file on your computer. Once your NOA-3570 is configured and functioning properly, it is
highly recommended that you back up your configuration file before making configuration
changes. The backup configuration file will be useful in case you need to return to your
previous settings.
Click Backup to save the NOA-3570’s current configuration to your computer.
Chapter 11 Maintenance
127
NOA-3570 User’s Guide
11.6.2 Restore Configuration
Restore configuration allows you to upload a new or previously saved configuration file from
your computer to your NOA-3570.
Table 42 Restore Configuration
LABEL
DESCRIPTION
File Path
Type in the location of the file you want to upload in this field or click Browse ...
to find it.
Browse...
Click Browse... to find the file you want to upload. Remember that you must
decompress compressed (.ZIP) files before you can upload them.
Upload
Click Upload to begin the upload process.
Note: Do not turn off the NOA-3570 while configuration file upload is in progress.
After you see a “restore configuration successful” screen, you must then wait one minute
before logging into the NOA-3570 again.
Figure 62 Configuration Upload Successful
The NOA-3570 automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
Figure 63 Network Temporarily Disconnected
If you uploaded the default configuration file you may need to change the IP address of your
computer to be in the same subnet as that of the default NOA-3570 IP address (192.168.1.2).
See Appendix D on page 201 for details on how to set up your computer’s IP address.
If the upload was not successful, the following screen will appear. Click Return to go back to
the Configuration screen.
128
Chapter 11 Maintenance
NOA-3570 User’s Guide
Figure 64 Configuration Upload Error
11.6.3 Back to Factory Defaults
Click the Reset button in this section to clear all user-entered configuration information and
returns the NOA-3570 to its factory defaults as shown on the screen. The following warning
screen will appear.
Figure 65 Reset Warning Message
11.7 Restart Screen
System restart allows you to reboot the NOA-3570 without turning the power off.
Click MAINTENANCE, and then Restart. Click Restart to have the NOA-3570 reboot. This
does not affect the NOA-3570's configuration.
Chapter 11 Maintenance
129
NOA-3570 User’s Guide
Figure 66 Restart Screen
130
Chapter 11 Maintenance

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Extract, Print high-res
XMP Toolkit                     : 3.1-702
Modify Date                     : 2006:01:18 08:46:52-08:00
Create Date                     : 2006:01:18 08:45:32-08:00
Metadata Date                   : 2006:01:18 08:46:52-08:00
Creator Tool                    : FrameMaker 7.1
Format                          : application/pdf
Title                           : ZyBook.book
Creator                         : johng
Document ID                     : uuid:04476ff5-d56e-45f3-afe8-99783074c6f3
Instance ID                     : uuid:bc31a4c6-4fdc-48ec-9a11-8d74c9fa0c80
Producer                        : Acrobat Distiller 5.0.5 (Windows)
Has XFA                         : No
Page Count                      : 123
Author                          : johng
EXIF Metadata provided by EXIF.tools
FCC ID Filing: NI3-OA35705001

Navigation menu