ZyXEL Communications NWA1121NI 802.11 b/g/n PoE Access Point, 802.11 b/g/n Managed Access Point User Manual Book
ZyXEL Communications Corporation 802.11 b/g/n PoE Access Point, 802.11 b/g/n Managed Access Point Book
Contents
- 1. User Manual
- 2. User Manual (Statements).pdf
- 3. User Manual.pdf
User Manual.pdf
Contents Overview Contents Overview User’s Guide .........................................................................................................................................9 Introducing the NWA1121-NI ................................................................................................................... 11 Introducing the Web Configurator ...........................................................................................................19 Dashboard ...............................................................................................................................................25 Tutorial ....................................................................................................................................................29 Technical Reference ..........................................................................................................................47 Monitor ....................................................................................................................................................49 Wireless LAN ..........................................................................................................................................55 LAN .........................................................................................................................................................94 VLAN .......................................................................................................................................................98 System ..................................................................................................................................................101 Log Settings .......................................................................................................................................... 115 Maintenance .......................................................................................................................................... 119 Troubleshooting ....................................................................................................................................129 NWA1121-NI User’s Guide Contents Overview NWA1121-NI User’s Guide Table of Contents Table of Contents Contents Overview ..............................................................................................................................3 Table of Contents .................................................................................................................................5 Part I: User’s Guide ........................................................................................... 9 Chapter 1 Introducing the NWA1121-NI.............................................................................................................. 11 1.1 Introducing the NWA1121-NI ............................................................................................................. 11 1.2 Wireless Modes ................................................................................................................................. 11 1.2.1 MBSSID ...................................................................................................................................12 1.2.2 Wireless Client .........................................................................................................................13 1.2.3 Root AP ...................................................................................................................................14 1.2.4 Repeater ..................................................................................................................................14 1.3 Ways to Manage the NWA1121-NI ...................................................................................................15 1.4 Configuring Your NWA1121-NI’s Security Features ..........................................................................16 1.4.1 Control Access to Your Device ................................................................................................16 1.4.2 Wireless Security .....................................................................................................................16 1.5 Good Habits for Managing the NWA1121-NI ....................................................................................16 1.6 Hardware Connections ......................................................................................................................17 1.7 LED ...................................................................................................................................................17 Chapter 2 Introducing the Web Configurator ....................................................................................................19 2.1 Accessing the Web Configurator .......................................................................................................19 2.2 Resetting the NWA1121-NI ...............................................................................................................20 2.2.1 Methods of Restoring Factory-Defaults ...................................................................................21 2.3 Navigating the Web Configurator ......................................................................................................22 2.3.1 Title Bar ...................................................................................................................................22 2.3.2 Navigation Panel .....................................................................................................................23 2.3.3 Main Window ...........................................................................................................................24 Chapter 3 Dashboard ...........................................................................................................................................25 3.1 The Dashboard Screen .....................................................................................................................25 Chapter 4 Tutorial .................................................................................................................................................29 NWA1121-NI User’s Guide Table of Contents 4.1 How to Configure the Wireless LAN ..................................................................................................29 4.1.1 Choosing the Wireless Mode ...................................................................................................29 4.1.2 Further Reading .......................................................................................................................29 4.2 How to Configure Multiple Wireless Networks ..................................................................................29 4.2.1 Configure the SSID Profiles .....................................................................................................31 4.2.2 Configure the Standard Network .............................................................................................33 4.2.3 Configure the VoIP Network ....................................................................................................34 4.2.4 Configure the Guest Network ..................................................................................................36 4.2.5 Testing the Wireless Networks ................................................................................................38 4.3 NWA1121-NI Setup in AP and Wireless Client Modes ......................................................................38 4.3.1 Scenario ..................................................................................................................................38 4.3.2 Configuring the NWA1121-NI in MBSSID or Root AP Mode ...................................................39 4.3.3 Configuring the NWA1121-NI in Wireless Client Mode ............................................................42 4.3.4 MAC Filter Setup .....................................................................................................................44 4.3.5 Testing the Connection and Troubleshooting ..........................................................................45 Part II: Technical Reference............................................................................ 47 Chapter 5 Monitor.................................................................................................................................................49 5.1 Overview ...........................................................................................................................................49 5.2 What You Can Do .............................................................................................................................49 5.3 View Logs .........................................................................................................................................49 5.4 Statistics ............................................................................................................................................50 5.5 Association List .................................................................................................................................51 5.6 Channel Usage .................................................................................................................................52 Chapter 6 Wireless LAN.......................................................................................................................................55 6.1 Overview ...........................................................................................................................................55 6.2 What You Can Do in this Chapter .....................................................................................................55 6.3 What You Need To Know ..................................................................................................................56 6.4 Wireless Settings Screen ..................................................................................................................60 6.4.1 Root AP Mode .........................................................................................................................61 6.4.2 Repeater Mode ........................................................................................................................64 6.4.3 Wireless Client Mode ...............................................................................................................67 6.4.4 MBSSID Mode .........................................................................................................................69 6.5 SSID Screen .....................................................................................................................................72 6.5.1 Configuring SSID .....................................................................................................................73 6.6 Wireless Security Screen ..................................................................................................................74 6.6.1 Security: WEP .........................................................................................................................76 NWA1121-NI User’s Guide Table of Contents 6.6.2 Security: 802.1x Only ..............................................................................................................77 6.6.3 Security: 802.1x Static WEP ....................................................................................................79 6.6.4 Security: WPA, WPA2, WPA2-MIX ..........................................................................................83 6.6.5 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX .................................................................86 6.7 RADIUS Screen ................................................................................................................................87 6.8 MAC Filter Screen .............................................................................................................................89 6.9 Technical Reference ..........................................................................................................................91 6.9.1 Additional Wireless Terms .......................................................................................................91 6.9.2 WMM QoS ...............................................................................................................................92 6.9.3 Security Mode Guideline .........................................................................................................93 Chapter 7 LAN ......................................................................................................................................................94 7.1 Overview ...........................................................................................................................................94 7.2 What You Can Do in this Chapter .....................................................................................................94 7.3 What You Need to Know ...................................................................................................................94 7.4 LAN IP Screen ..................................................................................................................................96 Chapter 8 VLAN ....................................................................................................................................................98 8.1 Overview ...........................................................................................................................................98 8.1.1 What You Can Do in This Chapter ...........................................................................................98 8.2 What You Need to Know ...................................................................................................................98 8.3 VLAN Screen ....................................................................................................................................99 Chapter 9 System ...............................................................................................................................................101 9.1 Overview .........................................................................................................................................101 9.2 What You Can Do in this Chapter ...................................................................................................101 9.3 What You Need To Know ................................................................................................................102 9.4 WWW Screen ..................................................................................................................................104 9.5 Certificates Screen ..........................................................................................................................105 9.6 Telnet Screen ..................................................................................................................................106 9.7 SNMP Screen .................................................................................................................................107 9.8 FTP Screen ..................................................................................................................................... 110 9.9 Technical Reference ........................................................................................................................ 111 9.9.1 MIB ........................................................................................................................................ 111 9.9.2 Supported MIBs ..................................................................................................................... 111 9.9.3 SNMP Traps .......................................................................................................................... 112 9.9.4 Private-Public Certificates ..................................................................................................... 113 9.9.5 Certification Authorities .......................................................................................................... 113 9.9.6 Checking the Fingerprint of a Certificate on Your Computer ................................................. 113 NWA1121-NI User’s Guide Table of Contents Chapter 10 Log Settings ...................................................................................................................................... 115 10.1 Overview ....................................................................................................................................... 115 10.2 What You Can Do in this Chapter ................................................................................................. 115 10.3 What You Need To Know .............................................................................................................. 116 10.4 Log Settings Screen ...................................................................................................................... 116 Chapter 11 Maintenance ...................................................................................................................................... 119 11.1 Overview ....................................................................................................................................... 119 11.2 What You Can Do in this Chapter .................................................................................................. 119 11.3 What You Need To Know ...............................................................................................................120 11.4 General Screen .............................................................................................................................120 11.5 Password Screen ..........................................................................................................................121 11.6 Time Screen ..................................................................................................................................122 11.7 Firmware Upgrade Screen ............................................................................................................123 11.8 Configuration File Screen ..............................................................................................................124 11.8.1 Backup Configuration ...........................................................................................................124 11.8.2 Restore Configuration ..........................................................................................................125 11.8.3 Back to Factory Defaults ......................................................................................................126 11.9 Restart Screen ..............................................................................................................................126 Chapter 12 Troubleshooting................................................................................................................................129 12.1 Power, Hardware Connections, and LEDs ....................................................................................129 12.2 NWA1121-NI Access and Login ....................................................................................................130 12.3 Internet Access .............................................................................................................................131 Appendix A Setting Up Your Computer’s IP Address ......................................................................133 Appendix B Pop-up Windows, JavaScript and Java Permissions ...................................................161 Appendix C IP Addresses and Subnetting.......................................................................................173 Appendix D Wireless LANs..............................................................................................................181 Appendix E Legal Information..........................................................................................................195 Index ..................................................................................................................................................203 NWA1121-NI User’s Guide P ART I User’s Guide 10 C HAPT ER Introducing the NWA1121-NI This chapt er int roduces t he m ain applicat ions and feat ures of t he NWA1121- NI . I t also discusses t he ways you can m anage your NWA1121- NI . 1.1 Introducing the NWA1121-NI Your NWA1121- NI is an I Pv6 wireless AP ( Access Point ) t hat can funct ion in several wireless m odes. I t ext ends t he range of your exist ing wired net work wit hout addit ional wiring, providing easy net work access t o m obile users. The NWA1121- NI cont rols net work access wit h MAC address filt ering and RADI US server aut hent icat ion. I t also provides a high level of net work t raffic securit y, support ing I EEE 802.1x, WiFi Prot ect ed Access ( WPA) , WPA2 and WEP dat a encrypt ion. I t s Qualit y of Service ( QoS) feat ures allow you t o priorit ize t im e- sensit ive or highly im port ant applicat ions such as VoI P. Your NWA1121- NI is easy t o inst all, configure and use. The em bedded Web- based configurat or enables sim ple, st raight forward m anagem ent and m aint enance. See t he Quick St art Guide for inst ruct ions on how t o m ake hardware connect ions. 1.2 Wireless Modes The NWA1121- NI can be configured t o use t he following WLAN operat ing m odes: OPERATING MODE NUMBER OF SUPPORTED SSID UNIVERSAL REPEATER FUNCTION AP FUNCTION MBSSI D No Yes Client No No Root AP Yes Yes Repeat er Yes Yes MBSSI D Client Root AP Repeat er Applicat ions for each operat ing m ode are shown below. NWA1121-NI User’s Guide 11 Chapter 1 Introducing the NWA1121-NI 1.2.1 MBSSID A Basic Service Set ( BSS) is t he set of devices form ing a single wireless net work ( usually an access point and one or m ore wireless client s) . The Service Set I Dent ifier ( SSI D) is t he nam e of a BSS. I n Mult iple BSS ( MBSSI D) m ode, t he NWA1121- NI provides m ult iple virt ual APs, each form ing it s own BSS and using it s own individual SSI D profile. You can configure up t o eight m ult iple SSI D profiles, and have all of t hem act ive at any one t im e. You can assign different wireless and securit y set t ings t o each SSI D profile. This allows you t o com part m ent alize groups of users, set varying access privileges, and priorit ize net work t raffic t o and from cert ain BSSs. To t he wireless client s in t he net work, each SSI D appears t o be a different access point . As in any wireless net work, client s can associat e only wit h t he SSI Ds for which t hey have t he correct securit y set t ings. For exam ple, you m ight want t o set up a wireless net work in your office where I nt ernet t elephony ( VoI P) users have priorit y. You also want a regular wireless net work for st andard users, as well as a ‘guest ’ wireless net work for visit ors. I n t he following figure, VoI P_ SSI D users have QoS priorit y, SSI D 0 1 is t he wireless net work for st andard users, and Gu e st _ SSI D is t he wireless net work for guest users. I n t his exam ple, t he guest user is forbidden access t o t he wired Land Area Net work ( LAN) behind t he AP and can access only t he I nt ernet . Figure 1 Mult iple BSSs 12 NWA1121-NI User’s Guide Chapter 1 Introducing the NWA1121-NI 1.2.2 Wireless Client The NWA1121- NI can be used as a wireless client t o com m unicat e wit h an exist ing net work. I n t he figure below, t he print er can receive request s from t he wired com put er client s A and B via t he NWA1121- NI in Client m ode ( Z) . Figure 2 Wireless Client Applicat ion NWA1121-NI User’s Guide 13 Chapter 1 Introducing the NWA1121-NI 1.2.3 Root AP I n Root AP m ode, t he NWA1121- NI ( Z) can act as t he root AP in a wireless net work and also allow repeat ers ( X and Y) t o ext end t he range of it s wireless net work at t he sam e t im e. I n t he figure below, bot h client s A, B and C can access t he wired net work t hrough t he root AP. Figure 3 Root AP Applicat ion On t he NWA1121- NI in Root AP m ode, you can have up t o four m ult iple SSI Ds act ive for reqular wireless connect ions and one SSI D for t he connect ion wit h a repeat er ( universal repeat er SSI D) . Wireless client s can use eit her SSI D t o associat e wit h t he NWA1121- NI in Root AP m ode. A repeat er m ust use t he universal repeat er SSI D t o connect t o t he NWA1121- NI in Root AP m ode. When t he NWA1121- NI is in Root AP m ode, universal repeat er securit y bet ween t he NWA1121- NI and ot her repeat er is independent of t he securit y bet ween t he wireless client s and t he AP or repeat er. I f you do not enable universal repeat er securit y, t raffic bet ween APs is not encrypt ed. When universal repeat er securit y is enabled, bot h APs and repeat ers m ust use t he sam e pre- shared key. See Sect ion 6.6 on page 74 for m ore det ails. Unless specified, t he t erm “ securit y set t ings” refers t o t he t raffic bet ween t he wireless client s and t he AP. At t he t im e of writ ing, universal repeat er securit y is com pat ible wit h t he NWA1121- NI only. 1.2.4 Repeater The NWA can act as a wireless net work repeat er t o ext end a root AP’s wireless net work range, and also est ablish wireless connect ions wit h wireless client s. Using Repeat er m ode, your NWA1121- NI can ext end t he range of t he WLAN. I n t he figure below, t he NWA1121- NI in Repeat er m ode ( Z) has a wireless connect ion t o t he NWA1121- NI in Root AP m ode ( X) which is connect ed t o a wired net work and also has a wireless connect ion t o anot her NWA1121- NI in Repeat er m ode ( Y) at t he sam e t im e. Z and Y act as repeat ers t hat forward t raffic 14 NWA1121-NI User’s Guide Chapter 1 Introducing the NWA1121-NI bet ween associat ed wireless client s and t he wired LAN. Client s A, B and C access t he AP and t he wired net work behind t he AP t hrought repeat ers Z and Y. Figure 4 Repeat er Applicat ion When t he NWA1121- NI is in Repeat er m ode, universal repeat er securit y bet ween t he NWA1121- NI and ot her repeat er is independent of t he securit y bet ween t he wireless client s and t he AP or repeat er. I f you do not enable universal repeat er securit y, t raffic bet ween APs is not encrypt ed. When universal repeat er securit y is enabled, bot h APs and repeat ers m ust use t he sam e pre- shared key. See Sect ion 6.6 on page 74 for m ore det ails. Once t he securit y set t ings of peer sides m at ch one anot her, t he connect ion bet ween devices is m ade. At t he t im e of writ ing, universal repeat er securit y is com pat ible wit h t he NWA1121- NI only. 1.3 Ways to Manage the NWA1121-NI Use any of t he following m et hods t o m anage t he NWA1121- NI . • Web Configurat or. This is recom m ended for everyday m anagem ent of t he NWA1121- NI using a ( support ed) web browser. • Com m and Line I nt erface. Line com m ands are m ost ly used for t roubleshoot ing by service engineers. • FTP ( File Transfer Prot ocol) for firm ware upgrades. • SNMP ( Sim ple Net work Managem ent Prot ocol) . The device can be m onit ored by an SNMP m anager. NWA1121-NI User’s Guide 15 Chapter 1 Introducing the NWA1121-NI 1.4 Configuring Your NWA1121-NI’s Security Features Your NWA1121- NI com es wit h a variet y of securit y feat ures. This sect ion sum m arizes t hese feat ures and provides links t o sect ions in t he User ’s Guide t o configure securit y set t ings on your NWA1121- NI . Follow t he suggest ions below t o im prove securit y on your NWA1121- NI and net work. 1.4.1 Control Access to Your Device Ensure only people wit h perm ission can access your NWA1121- NI . • Cont rol physical access by locat ing devices in secure areas, such as locked room s. Most NWA1121- NI s have a reset but t on. I f an unaut horized person has access t o t he reset but t on, t hey can t hen reset t he device’s password t o it s default password, log in and reconfigure it s set t ings. • Change any default passwords on t he NWA1121- NI , such as t he password used for accessing t he NWA1121- NI ’s web configurat or ( if it has a web configurat or) . Use a password wit h a com binat ion of let t ers and num bers and change your password regularly. Writ e down t he password and put it in a safe place. • Avoid set t ing a long t im eout period before t he NWA1121- NI ’s web configurat or aut om at ically t im es out . A short t im eout reduces t he risk of unaut horized person accessing t he web configurat or while it is left idle. • See Sect ion 11.5 on page 121 for inst ruct ions on changing your password and set t ing t he t im eout period. • Configure rem ot e m anagem ent t o cont rol who can m anage your NWA1121- NI . See Chapt er 9 on page 101 for m ore inform at ion. I f you enable rem ot e m anagem ent , ensure you have enabled rem ot e m anagem ent only on t he I P addresses, services or int erfaces you int ended and t hat ot her rem ot e m anagem ent set t ings are disabled. 1.4.2 Wireless Security Wireless devices are especially vulnerable t o at t ack. I f your NWA1121- NI has a wireless funct ion, t ake t he following m easures t o im prove wireless securit y. • Enable wireless securit y on your NWA1121- NI . Choose t he m ost secure encrypt ion m et hod t hat all devices on your net work support . See Sect ion 6.6 on page 74 for direct ions on configuring encrypt ion. I f you have a RADI US server, enable I EEE 802.1x or WPA( 2) user ident ificat ion on your net work so users m ust log in. This m et hod is m ore com m on in business environm ent s. • Hide your wireless net work nam e ( SSI D) . The SSI D can be regularly broadcast and unaut horized users m ay use t his inform at ion t o access your net work. See Sect ion 6.5 on page 72 for direct ions on using t he web configurat or t o hide t he SSI D. • Enable t he MAC filt er t o allow only t rust ed users t o access your wireless net work or deny unwant ed users access based on t heir MAC address. See Sect ion 6.8 on page 89 for direct ions on configuring t he MAC filt er. 1.5 Good Habits for Managing the NWA1121-NI Do t he following t hings regularly t o m ake t he NWA1121- NI m ore secure and t o m anage it m ore effect ively. 16 NWA1121-NI User’s Guide Chapter 1 Introducing the NWA1121-NI 1.6 Hardware Connections See your Quick St art Guide for inform at ion on m aking hardware connect ions. 1.7 LED Figure 5 LED Table 1 LED COLOR STATUS DESCRIPTION Am ber On There is syst em error and t he NWA1121- NI cannot boot up, or t he NWA1121- NI doesn’t have an Et hernet connect ion wit h t he LAN. Flashing The NWA1121- NI is st art ing up. Off The NWA1121- NI is receiving power and ready for use. Blinking The WLAN is act ive, and t ransm it t ing or receiving dat a. Off The WLAN is not act ive. Green NWA1121-NI User’s Guide 17 Chapter 1 Introducing the NWA1121-NI 18 NWA1121-NI User’s Guide C HAPT ER Introducing the Web Configurator This chapt er describes how t o access t he NWA1121- NI ’s web configurat or and provides an overview of it s screens. 2.1 Accessing the Web Configurator Make sure your hardware is properly connect ed and prepare your com put er or com put er net work t o connect t o t he NWA1121- NI ( refer t o t he Quick St art Guide) . Launch your web browser. Type " 192.168.1.2" as t he URL ( default ) . The login screen appears. Figure 6 The Login Screen Type “ adm in” as t he ( default ) usernam e and “ 1234” as t he ( default ) password. Click Login. You should see a screen asking you t o change your password ( highly recom m ended) as shown next . Type a new password ( and ret ype it t o confirm ) t hen click Apply. Alt ernat ively, click I gnor e . NWA1121-NI User’s Guide 19 Chapter 2 Introducing the Web Configurator Not e: I f you do not change t he password, t he following screen appears every t im e you login. Figure 7 Change Password Screen You should now see t he 20 NWA1121-NI User’s Guide Chapter 2 Introducing the Web Configurator fact ory- default configurat ion file. This m eans t hat you will lose all t he set t ings you previously configured. The password will be reset t o “ 1234”. Figure 8 The RESET But t on 2.2.1 Methods of Restoring Factory-Defaults You can erase t he current configurat ion and rest ore fact ory default s in t wo ways: Use t he RESET but t on t o upload t he default configurat ion file. Hold t his but t on in for about 3 seconds ( t he light will begin t o blink) . Use t his m et hod for cases when t he password or I P address of t he NWA1121- NI is not known. Use t he web configurat or t o rest ore default s ( refer t o Sect ion 11.8 on page 124) . NWA1121-NI User’s Guide 21 Chapter 2 Introducing the Web Configurator 2.3 Navigating the Web Configurator The following sum m arizes how t o navigat e t he web configurat or from t he D a shboa r d screen. Figure 9 St at us Screen of t he Web Configurat or As illust rat ed above, t he Web Configurat or screen is divided int o t hese part s: • A - t it le bar • B - navigat ion panel • C - m ain window 2.3.1 Title Bar Click Logou t at any t im e t o exit t he Web Configurat or. Click ZAbout t o open t he about window, which provides inform at ion of t he boot m odule and driver versions. 22 NWA1121-NI User’s Guide Chapter 2 Introducing the Web Configurator 2.3.2 Navigation Panel Use t he m enu it em s on t he navigat ion panel t o open screens t o configure NWA1121- NI feat ures. The following t ables describe each m enu it em . Table 2 Navigat ion Panel Sum m ary LINK TAB Dashboard FUNCTION This screen shows t he NWA1121- NI ’s general device and net work st at us inform at ion. Use t his screen t o access t he st at ist ics and client list . Monit or Logs View Log Use t his screen t o view t he logs for t he cat egories t hat you select ed. St at ist ics Use t his screen t o view port st at us, packet specific st at ist ics, t he " syst em up t im e" and so on. Associat ion List Use t his screen t o view t he wireless st at ions t hat are current ly associat ed t o t he NWA1121- NI . Channel Usage Use t his screen t o know whet her a channel is used by anot her wireless net work or not . Configurat ion Net work Wireless LAN Wireless Set t ings Use t his screen t o configure t he wireless LAN set t ings and NWA1121NI ’s operat ion m ode. SSI D Use t his screen t o configure up t o eight SSI D profiles for your NWA1121- NI . Securit y Use t his screen t o configure wireless securit y profiles on t he NWA1121- NI . RADI US Use t his screen t o configure up t o four RADI US profiles. MAC Filt er Use t his screen t o configure MAC filt ering profiles. LAN Use t his screen t o configure t he NWA1121- NI ’s LAN I P address. VLAN Use t his screen t o configure t he NWA1121- NI ’s VLAN set t ings. Syst em Log Set t ings WWW Use t his screen t o configure t hrough which int erface( s) and from which I P address( es) users can use HTTP t o m anage t he NWA1121NI . Cert ificat es Use t his screen t o im port or rem ove a cert ificat e from t he NWA1121NI . Telent Use t his screen t o configure t hrough which int erface( s) and from w hich I P address( es) users can use Telnet t o m anage t he NWA1121NI . SNMP Use t his screen t o configure t he NWA1121- NI for SNMP m anagem ent . FTP Use t his screen t o configure t hrough which int erface( s) and from w hich I P address( es) users can use FTP t o access t he NWA1121- NI . Use t his screen t o change your log set t ings. Maint enance General Use t his screen t o configure your device’s nam e. Password Use t his screen t o configure your device’s password. Tim e Use t his screen t o change your NWA1121- NI ’s t im e and dat e. Firm ware Upgrade Use t his screen t o upload firm ware t o your device. NWA1121-NI User’s Guide 23 Chapter 2 Introducing the Web Configurator Table 2 Navigat ion Panel Sum m ary LINK TAB FUNCTION Configurat ion File Use t his screen t o backup and rest ore your device’s configurat ion ( set t ings) or reset t he fact ory default set t ings. Rest art Use t his screen t o reboot t he NWA1121- NI wit hout t urning t he power off. 2.3.3 Main Window The m ain window displays inform at ion and configurat ion fields. I t is discussed in t he rest of t his docum ent . 24 NWA1121-NI User’s Guide C HAPT ER Dashboard The D a shboa r d screens display when you log int o t he NWA1121- NI , or click D a shboa r d in t he navigat ion m enu. Use t he D a shboa r d screen t o look at t he current st at us of t he device, syst em resources, and int erfaces. The D a shboa r d screens also provide det ailed inform at ion about syst em st at ist ics, associat ed wireless client s, and logs. 3.1 The Dashboard Screen Use t his screen t o get a quick view of syst em , Et hernet , WLAN and ot her inform at ion regarding your NWA1121- NI . Click D a shboa r d. The following screen displays. Figure 10 The Dashboard Screen NWA1121-NI User’s Guide 25 Chapter 3 Dashboard The following t able describes t he labels in t his screen. Table 3 The Dashboard Screen LABEL DESCRIPTION Refresh I nt erval Select how oft en you want t he NWA1121- NI t o updat e t his screen. Refresh Now Click t his t o updat e t his screen im m ediat ely. Syst em I nform at ion Syst em Nam e This field displays t he NWA1121- NI syst em nam e. I t is used for ident ificat ion. You can change t his in t he M a in t e n a n ce > Ge n e r a l screen’s Syst e m N a m e field. WLAN Operat ing Mode This field displays t he current operat ing m ode of t he first wireless m odule ( Root AP, Re pe a t e r, Clie nt , or M BSSI D ) . You can change t he operat ing m ode in t he Con figu r a t ion > W ir e le ss LAN > W ir e le ss Se t t in gs screen. Firm ware Version This field displays t he current version of t he firm ware inside t he device. I t also shows t he dat e t he firm ware version was creat ed. You can change t he firm ware version by uploading new firm ware in M a in t e n a n ce > Fir m w a r e Upgr a de . Serial Num ber This field displays t he serial num ber of t he NWA1121- NI . Et hernet I nform at ion LAN MAC Address This displays t he MAC ( Media Access Cont rol) address of t he NWA1121- NI on t he LAN. Every net work device has a unique MAC address which ident ifies it across t he net work. I Pv4 Address This field displays t he current I Pv4 address of t he NWA1121- NI on t he net work. Subnet Mask Subnet m asks det erm ine t he m axim um num ber of possible host s on a net work. You can also use subnet m asks t o divide one net work int o m ult iple sub- net works. Gat eway I P Address This is t he I P address of t he gat eway. The gat eway is a rout er or swit ch on t he sam e net work segm ent as t he device's LAN port . The gat eway helps forward packet s t o t heir dest inat ions. I Pv6 Address This field displays t he current I Pv6 address( es) of t he NWA1121- NI on t he net work. Link Local This is t he I Pv6 link- local address t hat t he NWA1121- NI generat es aut om at ically. Global This is t he NWA1121- NI ’s I Pv6 global address t hat you specify m anually in t he Configur a t ion > LAN screen. WLAN I nform at ion SSI D This field displays t he SSI D ( Service Set I dent ifier) . This is available only when t he WLAN operat ion m ode is Clie n t . Channel The channel or frequency used by t he NWA1121- NI t o send and receive inform at ion. St at us This shows t he current st at us of t he wireless LAN. This is available only when t he WLAN operat ion m ode is Clie n t . Securit y Mode This displays t he securit y m ode t he NWA1121- NI is using. This is available only when t he WLAN operat ion m ode is Clie n t . Sum m ary St at ist ics Click t his link t o view port st at us and packet specific st at ist ics. See Sect ion 5.4 on page 50. Associat ion List Click t his t o see a list of wireless client s current ly associat ed t o each of t he NWA1121- NI ’s wireless m odules. See Sect ion 5.5 on page 51. View Log Click t his t o see a list of logs produced by t he NWA1121- NI . See Sect ion 5.3 on page 49. Syst em St at us Syst em Up Tim e 26 This field displays t he elapsed t im e since t he NWA1121- NI was t urned on. NWA1121-NI User’s Guide Chapter 3 Dashboard Table 3 The Dashboard Screen ( cont inued) LABEL Current Dat e/ Tim e DESCRIPTION This field displays t he dat e and t im e configured on t he NWA1121- NI . You can change t his in t he M a in t e n a n ce > Tim e screen. Syst em Resource CPU Usage This field displays what percent age of t he NWA1121- NI ’s processing abilit y is current ly being used. The higher t he CPU usage, t he m ore likely t he NWA1121- NI is t o slow down. Mem ory Usage This field displays what percent age of t he NWA1121- NI ’s volat ile m em ory is current ly in use. The higher t he m em ory usage, t he m ore likely t he NWA1121- NI is t o slow down. Som e m em ory is required j ust t o st art t he NWA1121- NI and t o run t he web configurat or. I nt erface St at us I nt erface St at us This colum n displays each int erface of t he NWA1121- NI . This field indicat es whet her or not t he NWA1121- NI is using t he int erface. For each int erface, t his field displays Up when t he NWA1121- NI is using t he int erface and D ow n when t he NWA1121- NI is not using t he int erface. Channel Rat e This shows t he channel num ber which t he NWA1121- NI is current ly using over t he wireless LAN. For t he LAN port t his displays t he port speed and duplex set t ing. For t he WLAN int erface, it displays t he downst ream and upst ream t ransm ission rat e or N / A if t he int erface is not in use. SSI D St at us This sect ion is not available when t he WLAN operat ion m ode is Clie n t . I nt erface This colum n displays each of t he NWA1121- NI ’s wireless int erfaces. SSI D This field displays t he SSI D( s) current ly used by each wireless m odule. BSSI D This field displays t he MAC address of t he wireless m odule. Securit y This field displays t he t ype of wireless securit y used by each SSI D. VLAN This field displays t he VLAN I D of each SSI D in use, or D isa ble d if t he SSI D does not use VLAN. NWA1121-NI User’s Guide 27 Chapter 3 Dashboard 28 NWA1121-NI User’s Guide C HAPT ER Tutorial This chapt er first provides an overview of how t o configure t he wireless LAN on your NWA1121- NI , and t hen gives st ep- by- st ep guidelines showing how t o configure your NWA1121- NI for som e exam ple scenarios. 4.1 How to Configure the Wireless LAN This sect ion illust rat es how t o choose which wireless operat ing m ode t o use on t he NWA1121- NI and how t o set up t he wireless LAN in each wireless m ode. See Sect ion 4.1.2 on page 29 for links t o m ore inform at ion on each st ep. 4.1.1 Choosing the Wireless Mode • Use M BSSI D ( Mult iple Basic Service Set I dent ifier) operat ing m ode if you want t o use t he NWA1121- NI as an access point wit h som e groups of users having different securit y or QoS set t ings from ot her groups of users. See Sect ion 1.2.1 on page 12 for det ails. • Use Clie n t operat ing m ode if you want t o use t he NWA1121- NI t o access a wireless net work. See Sect ion 1.2.2 on page 13 for det ails. • Use Root AP operat ing m ode if you want t o allow wireless client s t o access your wired net work t hrough t he NWA1121- NI and also have repeat ers com m unicat e wit h t he NWA1121- NI t o expand wireleass coverage. See Sect ion 1.2.3 on page 14 for det ails. • Use Re pe a t e r operat ing m ode if you want t o use t he NWA1121- NI t o com m unicat e wit h t he root AP or ot her repeat ers. See Sect ion 1.2.4 on page 14 for det ails. 4.1.2 Further Reading Use t hese links t o find m ore inform at ion on t he st eps: • Choosing 8 0 2 .1 1 M ode : see Sect ion 6.4 on page 60. • Choosing a wireless Cha nne l I D : see Sect ion 6.4 on page 60. • Choosing a Se cur it y m ode: see Sect ion 6.6 on page 74. • Configuring an ext ernal RAD I US server: see Sect ion 6.7 on page 87. • Configuring M AC Filt e r in g: see Sect ion 6.8 on page 89. 4.2 How to Configure Multiple Wireless Networks I n t his exam ple, you have been using your NWA1121- NI as an access point for your office net work. Now your net work is expanding and you want t o m ake use of t he MBSSI D feat ure ( see Sect ion NWA1121-NI User’s Guide 29 Chapter 4 Tutorial 6.4.4 on page 69) t o provide m ult iple wireless net works. Each wireless net work will cat er t o a different t ype of user. You want t o m ake t hree wireless net works: one st andard office wireless net work wit h all t he sam e set t ings you already have, anot her wireless net work wit h high priorit y QoS set t ings for Voice over I P ( VoI P) users, and a guest net work t hat allows visit ors t o access only t he I nt ernet and t he net work print er. To do t his, you will t ake t he following st eps: Edit t he SSI D profiles. Change t he operat ing m ode from Root AP t o M BSSI D and react ivat e t he st andard net work. Configure different securit y m odes for t he net works. Configure a wireless net work for st andard office use. Configure a wireless net work for VoI P users. Configure a wireless net work for guest s t o your office. The following figure shows t he m ult iple net works you want t o set up. Your NWA1121- NI is m arked Z, t he m ain net work rout er is m arked A, and your net work print er is m arked B. The st andard net work ( SSI D 0 1 ) has access t o all resources. The VoI P net work ( VoI P_ SSI D ) has access t o all resources and a high QoS priorit y. The guest net work ( Gu e st _ SSI D ) has access t o t he I nt ernet and t he net work print er only, and a low QoS priorit y. 30 NWA1121-NI User’s Guide Chapter 4 Tutorial To configure t hese set t ings, you need t o know t he Media Access Cont rol ( MAC) addresses of t he devices you want t o allow users of t he guest net work t o access. The following t able shows t he addresses used in t his exam ple. Table 4 Tut orial: Exam ple I nform at ion Net work rout er ( A) MAC address 00: AA: 00: AA: 00: AA Net work print er ( B) MAC address AA: 00: AA: 00: AA: 00 4.2.1 Configure the SSID Profiles Log in t o t he NWA1121- NI ( see Sect ion 2.1 on page 19) . Click W ir e le ss LAN > SSI D. The SSI D screen appears. Click t he Edit icon next t o t he Pr ofile 1 . Renam e t he Pr ofile N a m e and SSI D as SSI D 0 1 . Click Apply. Repeat St ep 2 and 3 t o change Pr ofile 2 and Pr ofile 3 t o VoI P_ SSI D and Gu e st _ SSI D. NWA1121-NI User’s Guide 31 Chapter 4 Tutorial 4.2.1.1 MBSSID 32 Go t o W ir e le ss LAN > W ir e le ss Se t t ings. Select M BSSI D from t he Ope r a t ion M ode drop- down list box. SSI D 0 1 is t he st andard net work, so select SSI D 0 1 as t he first profile. I t is always act ive. Select VoI P_ SSI D as t he second profile, and Gu e st _ SSI D as t he t hird profile. Select t he corresponding Act ive check- boxes. Click Apply t o save your set t ings. Now t he t hree SSI Ds are act ivat ed. NWA1121-NI User’s Guide Chapter 4 Tutorial 4.2.2 Configure the Standard Network Click W ir e le ss LAN > SSI D. Click t he Edit icon next t o SSI D 0 1 . Select Se cPr ofile 1 as SSI D 0 1 ’s securit y profile. Select t he H idde n SSI D checkbox as you want only aut horized com pany em ployees t o use t his net work, so t here is no need t o broadcast t he SSI D t o wireless client s scanning t he area. Also, t he client s on SSI D 0 1 m ight need t o access ot her client s on t he sam e wireless net work. Do not select t he I nt r a - BSS Tr a ffic block ing check- box. Click Apply. NWA1121-NI User’s Guide 33 Chapter 4 Tutorial Next , click W ir e le ss LAN > Se cu r it y. Click t he Edit icon next t o Se cPr ofile 1 . Since SSI D 0 1 is t he st andard net work t hat has access t o all resources, assign a m ore secure securit y m ode. Select W PA2 - PSK- M I X as t he Se cur it y M ode , and ent er t he Pr e - Sha r e d Ke y. I n t his exam ple, use ThisisSSI D 0 1 Pr e Sha r e dKe y. Click Apply. You have finished configuring t he st andard net work, SSI D 0 1 . 4.2.3 Configure the VoIP Network 34 Go t o W ir e le ss LAN > SSI D. Click t he Edit icon next t o VoI P_ SSI D. Select Se cPr ofile 2 as t he Se cur it y Pr ofile for t he VoI P net work. Select t he H idde n SSI D checkbox. NWA1121-NI User’s Guide Chapter 4 Tutorial Select W M M _ VOI CE in t he QoS field t o give VoI P t he highest priorit y in t he wireless net work. Click Apply. Next , click W ir e le ss LAN > Se cu r it y. Click t he Edit icon next t o Se cPr ofile 2 . NWA1121-NI User’s Guide 35 Chapter 4 Tutorial Select W PA2 - PSK as t he Se cur it y M ode , and ent er t he Pr e - Sha r e d Ke y. I n t his exam ple, use Th isisVoI PPr e Sh a r e dKe y. Click Apply. Your VoI P wireless net work is now ready t o use. Any t raffic using t he VoI P_ SSI D profile will be given t he highest priorit y across t he wireless net work. 4.2.4 Configure the Guest Network When you are set t ing up t he wireless net work for guest s t o your office, your prim ary concern is t o keep your net work secure while allowing access t o cert ain resources ( such as a net work print er, or t he I nt ernet ) . For t his reason, t he pre- configured Gu e st _ SSI D profile has int ra- BSS t raffic blocking enabled by default . “ I nt ra- BSS t raffic blocking” m eans t hat t he client cannot access ot her client s on t he sam e wireless net work. 36 Click W ir e le ss LAN > SSI D. Click t he Edit icon next t o Gu e st _ SSI D. Select Se cPr ofile 3 in t he Se cur it y field. Do not select t he H idde n SSI D check- box so t he guest s can easily find t he wireless net work. Select W M M _ BESTEFFORT in t he QoS field t o give t he guest a lower QoS priorit y. NWA1121-NI User’s Guide Chapter 4 Tutorial Select t he check- box of I nt r a - BSS Tr a ffic block ing Ena ble d. Click Apply. Next , click W ir e le ss LAN > Se cu r it y. Click t he Edit icon next t o Se cPr ofile 3 . Select W PA- PSK in t he Se cu r it y M ode field. WPA- PSK provides st rong securit y t hat is support ed by m ost wireless client s. Even t hough your Gue st _ SSI D client s do not have access t o sensit ive inform at ion on t he net work, you should not leave t he net work wit hout securit y. An at t acker could st ill cause dam age t o t he net work or int ercept unsecured com m unicat ions or use your I nt ernet access for illegal act ivit ies. NWA1121-NI User’s Guide 37 Chapter 4 Tutorial Ent er t he PSK you want t o use in your net work in t he Pr e Sha r e d Ke y field. I n t his exam ple, t he PSK is Thisism yGue st W PApr e - sh a r e dk e y. Click Apply. Your guest wireless net work is now ready t o use. 4.2.5 Testing the Wireless Networks To m ake sure t hat t he t hree net works are correct ly configured, do t he following. • On a com put er wit h a wireless client , scan for access point s. You should see t he Gu e st _ SSI D net work, but not t he SSI D 0 1 and VoI P_ SSI D net works. I f you can see t he SSI D 0 1 and VoI P_ SSI D net works, go t o it s SSI D Edit screen and m ake sure t o select t he H idde n SSI D check- box and click Apply. • Try t o access each net work using t he correct securit y set t ings, and t hen using incorrect securit y set t ings, such as t he WPA- PSK for anot her act ive net work. I f t he behavior is different from expect ed ( for exam ple, if you can access t he SSI D 0 1 or VoI P_ SSI D wireless net work using t he securit y set t ings for t he Gue st _ SSI D wireless net work) check t hat t he SSI D profile is set t o use t he correct securit y profile, and t hat t he set t ings of t he securit y profile are correct . 4.3 NWA1121-NI Setup in AP and Wireless Client Modes This exam ple shows you how t o rest rict wireless access t o your NWA1121- NI . 4.3.1 Scenario I n t he figure below, t here are t wo NWA1121- NI s ( A and B) in t he net work. A is in MBSSI D or root AP m ode while st at ion B is in wireless client m ode. St at ion B is connect ed t o a File Transfer Prot ocol ( FTP) server. You want only specified wireless client s t o be able t o access st at ion B. You also want 38 NWA1121-NI User’s Guide Chapter 4 Tutorial t o allow wireless t raffic bet ween B and wireless client s connect ed t o A ( W, Y and Z) . Ot her wireless devices ( X ) m ust not be able t o connect t o t he FTP server. Figure 11 FTP Server Connect ed t o a Wireless Client 4.3.2 Configuring the NWA1121-NI in MBSSID or Root AP Mode Before set t ing up t he NWA1121- NI as a wireless client ( B) , you need t o m ake sure t here is an access point t o connect t o. Use t he Et hernet port on NWA1121- NI ( A) t o configure it via a wired connect ion. NWA1121-NI User’s Guide 39 Chapter 4 Tutorial Log int o t he Web Configurat or on NWA1121- NI ( A) and go t o t he W ir e le ss LAN > W ir e le ss Se t t in gs screen. 40 Set t he Ope r a t ion M ode t o Root AP. Select t he W ir e le ss M ode . I n t his exam ple, select 8 0 2 .1 1 b/ g/ n . Select Pr ofile 1 as t he SSI D Pr ofile . Choose t he Cha nne l you want NWA1121- NI ( A) t o use. Click Apply. NWA1121-NI User’s Guide Chapter 4 Tutorial Go t o W ir e le ss LAN > SSI D. Click t he Edit icon next t o Pr ofile 1 . Change t he SSI D t o AP- A. Select Se cPr ofile 1 in t he Se cur it y field. Select t he check- box for I nt r a - BSS Tr a ffic block ing Ena ble d so t he client cannot access ot her client s on t he sam e wireless net work. 10 Click Apply. NWA1121-NI User’s Guide 41 Chapter 4 Tutorial 11 Go t o W ir e le ss LAN > Se cur it y. Click t he Edit icon next t o Se cPr ofile 1 . 12 Configure W PA- PSK as t he Se cur it y M ode and ent er Th isisM yPr e Sh a r e dKe y in t he Pr e Sha r e d Ke y field. 13 Click Apply t o finish configurat ion for NWA1121- NI ( A) . 4.3.3 Configuring the NWA1121-NI in Wireless Client Mode The NWA1121- NI ( B) should have a wired connect ion before it can be set t o wireless client operat ing m ode. Connect your NWA1121- NI t o t he FTP server. Login t o NWA1121- NI (B) ’s Web Configurat or and go t o t he W ir e le ss LAN > W ir e le ss Se t t ings screen. Follow t hese st eps t o configure st at ion B. 42 NWA1121-NI User’s Guide Chapter 4 Tutorial Select Clie n t as Ope r a t ion M ode. Click Apply. Click on t he Sit e Su r ve y but t on. A window should pop up which cont ains a list of all available wireless devices wit hin your NWA1121- NI ’s range. Find and select NWA1121- NI ( A) ’s SSI D: AP- A. NWA1121-NI User’s Guide 43 Chapter 4 Tutorial Go t o W ir e le ss LAN > Se cur it y t o configure t he NWA1121- NI t o use t he sam e securit y m ode and Pre- Shared Key as NWA1121- NI ( A) : W PA- PSK/ ThisisM yPr e Sh a r e dKe y. Click Apply. Figure 12 4.3.4 MAC Filter Setup One way t o ensure t hat only specified wireless client s can access t he FTP server is by enabling MAC filt ering on NWA1121- NI ( B) ( See Sect ion 6.8 on page 89 for m ore inform at ion on MAC Filt er) . Go t o W ir e le ss LAN > M AC Filt e r. Click t he Edit icon next t o M a cPr ofile 1 . Select Allow in t he Acce ss Cont r ol M ode field. Ent er t he MAC addresses of t he wireless client s ( W , Y and Z) you want t o associat e wit h t he NWA1121- NI . Click Apply. Now, only t he aut horized wireless client s ( W , Y and Z) can access t he FTP server. 44 NWA1121-NI User’s Guide Chapter 4 Tutorial 4.3.5 Testing the Connection and Troubleshooting This sect ion discusses how you can check if you have correct ly configured your net work set up as described in t his t ut orial. • Try accessing t he FTP server from wireless client s W , Y or Z. Test if you can send or ret rieve a file. I f you cannot est ablish a connect ion wit h t he FTP server, do t he following st eps. Make sure W , Y and Z use t he sam e wireless securit y set t ings as A and can access A. Make sure B uses t he sam e wireless and wireless securit y set t ings as A and can access A. Make sure int ra- BSS t raffic is enabled on A. • Try accessing t he FTP server from X. I f you are able t o access t he FTP server, do t he following. Make sure MAC filt ering is enabled. Make sure X’s MAC address is not ent ered in t he list of allowed devices. NWA1121-NI User’s Guide 45 Chapter 4 Tutorial 46 NWA1121-NI User’s Guide P ART II Technical Reference The appendices provide general inform at ion. Som e det ails m ay not apply t o your NWA1121- NI . 47 48 C HAPT ER Monitor 5.1 Overview This chapt er discusses read- only inform at ion relat ed t o t he device st at e of t he NWA1121- NI . Not e: To access t he M on it or screens, you can also click t he links in t he Sum m ary t able of t he D a sh boa r d screen t o view t he wireless packet s sent / r eceived as well as t he st at us of client s connect ed t o t he NWA1121- NI . 5.2 What You Can Do • Use t he Logs screen t o see t he logs for t he cat egories t hat you select ed in t he Configur a t ion > Log Se t t ings screen ( see Sect ion 5.3 on page 49) . You can view logs in t his page. Once t he log ent ries are all used, t he log will wrap around and t he old logs will be delet ed. • use t he St a t ist ics screen t o view 802.11 m ode, channel num ber, wireless packet specific st at ist ics and so on ( see Sect ion 5.4 on page 50) . • Use t he Associa t ion List screen t o view t he wireless devices t hat are current ly associat ed t o t he NWA1121- NI ( see Sect ion 5.5 on page 51) . • Use t he Cha nn e l Usa ge screen t o view whet her a channel is used by anot her wireless net work or not . I f a channel is being used, you should select a channel rem oved from it by five channels t o com plet ely avoid overlap ( see Sect ion 5.6 on page 52) . 5.3 View Logs Use t he Logs screen t o see t he logged m essages for t he NWA1121- NI . Log ent ries in red indicat e syst em error logs. The log wraps around and delet es t he old ent ries aft er it fills. NWA1121-NI User’s Guide 49 Chapter 5 Monitor Click M onit or > Logs. Figure 13 Logs The following t able describes t he labels in t his screen. Table 5 Logs LABEL DESCRIPTION Display Select a cat egory of logs t o view. Select All Log t o view logs from all of t he log cat egories t hat you select ed in t he Con figu r a t ion > Log Se t t in gs screen. E- Mail Log Now Click E- M a il Log N ow t o send t he log screen t o t he e- m ail address specified in t he Log Set t ings page ( m ake sure t hat you have first filled in t he E- m ail Log Set t ings fields in Configur a t ion > Log Se t t ings) . Refresh Click Re fr e sh t o renew t he log screen. Clear Log Click Cle a r Log t o delet e all t he logs. This field is a sequent ial value and is not associat ed wit h a specific ent ry. Tim e This field displays t he t im e t he log was recorded. Message This field st at es t he reason for t he log. Source This field list s t he source I P address and t he port num ber of t he incom ing packet . 5.4 Statistics Use t his screen t o view read- only inform at ion, including 802.11 Mode, Channel I D, Ret ry Count and FCS Error Count . Also provided is t he " poll int erval" . The Poll I nt e r va l field is configurable and is used for refreshing t he screen. 50 NWA1121-NI User’s Guide Chapter 5 Monitor Click M onit or > St a t ist ics. The following screen pops up. Figure 14 St at ist ics The following t able describes t he labels in t his screen. Table 6 St at ist ics LABEL DESCRIPTION Descript ion This is t he wireless int erface on t he NWA1121- NI . 802.11 Mode This field shows which 802.11 m ode t he NWA1121- NI is using. Channel I D This shows t he channel num ber which t he NWA1121- NI is current ly using over t he wireless LAN. RX Pkt s This is t he num ber of received packet s on t his port . TX Pkt s This is t he num ber of t ransm it t ed packet s on t his port . Ret ry Count This is t he t ot al num ber of ret ries for t ransm it t ed packet s ( TX) . FCS Error Count This is t he rat io percent age showing t he t ot al num ber of checksum error of received packet s ( RX) over t ot al RX. Poll I nt erval Ent er t he t im e int erval for refreshing st at ist ics. Set I nt erval Click t his but t on t o apply t he new poll int erval you ent ered above. St op Click t his but t on t o st op refreshing st at ist ics. 5.5 Association List View t he wireless devices t hat are current ly associat ed wit h t he NWA1121- NI in t he Associa t ion List screen. Associat ion m eans t hat a wireless client ( for exam ple, your net work or com put er wit h a wireless net work card) has connect ed successfully t o t he AP ( or wireless rout er) using t he sam e SSI D, channel and securit y set t ings. NWA1121-NI User’s Guide 51 Chapter 5 Monitor Click M onit or > Associa t ion List t o display t he screen as shown next . Figure 15 Associat ion List The following t able describes t he labels in t his screen. Table 7 Associat ion List LABEL DESCRIPTION This is t he index num ber of an associat ed wireless device. MAC Address This field displays t he MAC address of an associat ed wireless device. SSI D This field displays t he SSI D t o which t he wireless device is associat ed. Associat ion Tim e This field displays t he t im e a wireless device first associat ed wit h t he NWA1121- NI ’s wireless net work. Signal St rengt h This field displays t he RSSI ( Received Signal St rengt h I ndicat or) of t he wireless connect ion. Refresh Click Re fr e sh t o reload t he list . 5.6 Channel Usage Use t his screen t o know whet her a channel is used by anot her wireless net work or not . I f a channel is being used, you should select a channel rem oved from it by five channels t o com plet ely avoid overlap. Click M onit or > Cha nn e l Usa ge t o display t he screen shown next . 52 NWA1121-NI User’s Guide Chapter 5 Monitor Wait a m om ent while t he NWA1121- NI com piles t he inform at ion. Figure 16 Channel Usage The following t able describes t he labels in t his screen. Table 8 Channel Usage LABEL DESCRIPTION SSI D This is t he Service Set I Dent ificat ion ( SSI D) nam e of t he AP in an I nfrast ruct ure wireless net work or wireless st at ion in an Ad- Hoc wireless net work. For our purposes, we define an I nfrast ruct ure net work as a wireless net work t hat uses an AP and an AdHoc net work ( also known as I ndependent Basic Service Set ( I BSS) ) as one t hat doesn’t . See t he chapt er on wireless configurat ion for m ore inform at ion on basic service set s ( BSS) and ext ended service set s ( ESS) . Channel This is t he index num ber of t he channel current ly used by t he associat ed AP in an I nfrast ruct ure wireless net work or wireless st at ion in an Ad- Hoc wireless net work. MAC Address This field displays t he MAC address of t he AP in an I nfrast ruct ure wireless net work. I t is random ly generat ed ( so ignore it ) in an Ad- Hoc wireless net work. Wireless Mode This is t he I EEE 802.1x st andard used by t he wireless net work. Signal St rengt h This field displays t he st rengt h of t he AP’s signal. I f you m ust choose a channel t hat is current ly in use, choose one wit h low signal st rengt h for m inim um int erference. Securit y This is t he wireless securit y m et hod used by t he wireless net work t o prot ect wireless com m unicat ion bet ween wireless st at ions, access point s and t he wired net work. Refresh Click Re fr e sh t o reload t he screen. NWA1121-NI User’s Guide 53 Chapter 5 Monitor 54 NWA1121-NI User’s Guide C HAPT ER Wireless LAN 6.1 Overview This chapt er discusses t he st eps t o configure t he Wireless Set t ings screen on t he NWA1121- NI . I t also int roduces t he wireless LAN ( WLAN) and som e basic scenarios. Figure 17 Wireless Mode I n t he figure above, t he NWA1121- NI allows access t o anot her bridge device ( A) and a not ebook com put er ( B) upon verifying t heir set t ings and credent ials. I t denies access t o ot her devices ( C and D ) wit h configurat ions t hat do not m at ch t hose specified in your NWA1121- NI . 6.2 What You Can Do in this Chapter • Use t he W ir e le ss Se t t ings screen t o configure t he NWA1121- NI ’s operat ion m ode ( see Sect ion 6.4 on page 60) . • Uee t he SSI D screen t o configure up t o eight SSI D profiles for your NWA1121- NI ( see Sect ion 6.5 on page 72) . • Use t he Se cu r it y screen t o choose t he wireless securit y m ode for your NWA1121- NI ( see Sect ion 6.6 on page 74) . • Use t he RAD I US screen if you want t o aut hent icat e wireless users using a RADI US Server and/ or account ing server ( see Sect ion 6.7 on page 87) . • Use t he M AC Filt e r screen t o specify which wireless st at ion is allowed or denied access t o t he NWA1121- NI ( see Sect ion 6.8 on page 89) . NWA1121-NI User’s Guide 55 Chapter 6 Wireless LAN 6.3 What You Need To Know BSS A Basic Service Set ( BSS) exist s when all com m unicat ions bet ween wireless client s or bet ween a wireless client and a wired net work client go t hrough one access point ( AP) . I nt ra- BSS t raffic is t raffic bet ween wireless client s in t he BSS. ESS An Ext ended Service Set ( ESS) consist s of a series of overlapping BSSs, each cont aining an access point , wit h each access point connect ed t oget her by a wired net work. This wired connect ion bet ween APs is called a Dist ribut ion Syst em ( DS) . Operating Mode The NWA1121- NI can run in four operat ing m odes as follows: • Root AP. The NWA1121- NI is a wireless access point t hat allows wireless com m unicat ion t o ot her devices in t he net work. • Re pe a t e r. The NWA1121- NI act s as a wireless repeat er and increase a root AP’s wireless coverage area. • Clie nt . The NWA1121- NI act s as a wireless client t o access a wireless net work. • M BSSI D. The Mult iple Basic Service Set I dent ifier ( MBSSI D) m ode allows you t o use one access point t o provide several BSSs sim ult aneously. Refer t o Chapt er 1 on page 11 for illust rat ions of t hese wireless applicat ions. SSID The SSI D ( Service Set I Dent ifier) is t he nam e t hat ident ifies t he Service Set wit h which a wireless st at ion is associat ed. Wireless st at ions associat ing t o t he access point ( AP) m ust have t he sam e SSI D. I n ot her words, it is t he nam e of t he wireless net work t hat client s use t o connect t o it . Norm ally, t he NWA1121- NI act s like a beacon and regularly broadcast s t he SSI D in t he area. You can hide t he SSI D inst ead, in which case t he NWA1121- NI does not broadcast t he SSI D. I n addit ion, you should change t he default SSI D t o som et hing t hat is difficult t o guess. This t ype of securit y is fairly weak, however, because t here are ways for unaut horized wireless devices t o get t he SSI D. I n addit ion, unaut horized wireless devices can st ill see t he inform at ion t hat is sent in t he wireless net work. Channel A channel is t he radio frequency( ies) used by I EEE 802.11a/ b/ g wireless devices. Channels available depend on your geographical area. You m ay have a choice of channels ( for your region) so you should use a different channel t han an adj acent AP ( access point ) t o reduce int erference. 56 NWA1121-NI User’s Guide Chapter 6 Wireless LAN Wireless Mode The I EEE 802.1x st andard was designed t o ext end t he feat ures of I EEE 802.11 t o support ext ended aut hent icat ion as well as providing addit ional account ing and cont rol feat ures. Your NWA1121- NI can support 8 0 2 .1 1 b/ g, 8 0 2 .1 1 n and 8 0 2 .1 1 b/ g/ n . MBSSID Tradit ionally, you needed t o use different APs t o configure different Basic Service Set s ( BSSs) . As well as t he cost of buying ext ra APs, t here was also t he possibilit y of channel int erference. The NWA1121- NI ’s MBSSI D ( Mult iple Basic Service Set I Dent ifier) funct ion allows you t o use one access point t o provide several BSSs sim ult aneously. You can t hen assign varying levels of privilege t o different SSI Ds. Wireless st at ions can use different BSSI Ds t o associat e wit h t he sam e AP. The following are som e not es on m ult iple BSS. • A m axim um of four BSSs are allowed on one AP sim ult aneously. • You m ust use different WEP keys for different BSSs. I f t wo st at ions have different BSSI Ds ( t hey are in different BSSs) , but have t he sam e WEP keys, t hey m ay hear each ot her ’s com m unicat ions ( but not com m unicat e wit h each ot her) . • MBSSI D should not replace but rat her be used in conj unct ion wit h 802.1x securit y. Wireless Security Wireless securit y is vit al t o your net work. I t prot ect s com m unicat ions bet ween wireless st at ions, access point s and t he wired net work. Figure 18 Securing t he Wireless Net work I n t he figure above, t he NWA1121- NI checks t he ident it y of devices before giving t hem access t o t he net work. I n t his scenario, Com put er A is denied access t o t he net work, while Com put er B is grant ed connect ivit y. The NWA1121- NI secure com m unicat ions via dat a encrypt ion, wireless client aut hent icat ion and MAC address filt ering. I t can also hide it s ident it y in t he net work. NWA1121-NI User’s Guide 57 Chapter 6 Wireless LAN User Authentication Aut hent icat ion is t he process of verifying whet her a wireless device is allowed t o use t he wireless net work. You can m ake every user log in t o t he wireless net work before t hey can use it . However, every device in t he wireless net work has t o support I EEE 802.1x t o do t his. For wireless net works, you can st ore t he user nam es and passwords for each user in a RADI US server. This is a server used in businesses m ore t han in hom es. I f you do not have a RADI US server, you cannot set up user nam es and passwords for your users. Unaut horized wireless devices can st ill see t he inform at ion t hat is sent in t he wireless net work, even if t hey cannot use t he wireless net work. Furt herm ore, t here are ways for unaut horized wireless users t o get a valid user nam e and password. Then, t hey can use t hat user nam e and password t o use t he wireless net work. The following t able shows t he relat ive effect iveness of wireless securit y m et hods: . Table 9 Wireless Securit y Levels SECURITY LEVEL Least Secure SECURITY TYPE Unique SSI D ( Default ) Unique SSI D wit h Hide SSI D Enabled MAC Address Filt ering WEP Encrypt ion I EEE802.1x EAP wit h RADI US Server Aut hent icat ion Wi- Fi Prot ect ed Access ( WPA) Most Secure WPA2 The available securit y m odes in your NWA1121- NI are as follows: • N one . No dat a encrypt ion. • W EP. Wired Equivalent Privacy ( WEP) encrypt ion scram bles t he dat a t ransm it t ed bet ween t he wireless st at ions and t he access point s t o keep net work com m unicat ions privat e. • 8 0 2 .1 x - On ly. This is a st andard t hat ext ends t he feat ures of I EEE 802.11 t o support ext ended aut hent icat ion. I t provides addit ional account ing and cont rol feat ures. This opt ion does not support dat a encrypt ion. • 8 0 2 .1 x - St a t ic W EP. This provides 802.1x- Only aut hent icat ion wit h a st at ic 64bit or 128bit WEP key and an aut hent icat ion server. • W PA. Wi- Fi Prot ect ed Access ( WPA) is a subset of t he I EEE 802.11i st andard. • W PA2 . WPA2 ( I EEE 802.11i) is a wireless securit y st andard t hat defines st ronger encrypt ion, aut hent icat ion and key m anagem ent t han WPA. • W PA2 - M I X. This com m ands t he NWA1121- NI t o use eit her WPA2 or WPA depending on which securit y m ode t he wireless client uses. • W PA2 - PSK. This adds a pre- shared key on t op of WPA2 st andard. • W PA2 - PSK- M I X. This com m ands t he NWA1121- NI t o use eit her WPA- PSK or WPA2- PSK depending on which securit y m ode t he wireless client uses. Not e: To guarant ee 802.11n wireless speed, please only use WPA2 or WPA2- PSK securit y m ode. Ot her securit y m odes m ay degrat e t he w ireless speed perform ance t o 802.11g. 58 NWA1121-NI User’s Guide Chapter 6 Wireless LAN Passphrase A passphrase funct ions like a password. I n WEP securit y m ode, it is furt her convert ed by t he NWA1121- NI int o a com plicat ed st ring t hat is referred t o as t he “ key”. This key is request ed from all devices wishing t o connect t o a wireless net work. PSK The Pre- Shared Key ( PSK) is a password shared by a wireless access point and a client during a previous secure connect ion. The key can t hen be used t o est ablish a connect ion bet ween t he t wo part ies. Encryption Wireless net works can use encrypt ion t o prot ect t he inform at ion t hat is sent in t he wireless net work. Encrypt ion is like a secret code. I f you do not know t he secret code, you cannot underst and t he m essage. Encrypt ion is t he process of convert ing dat a int o unreadable t ext . This secures inform at ion in net work com m unicat ions. The int ended recipient of t he dat a can “ unlock” it wit h a pre- assigned key, m aking t he inform at ion readable only t o him . The NWA1121- NI when used as a wireless client em ploys Tem poral Key I nt egrit y Prot ocol ( TKI P) dat a encrypt ion. EAP Ext ensible Aut hent icat ion Prot ocol ( EAP) is a prot ocol used by a wireless client , an access point and an aut hent icat ion server t o negot iat e a connect ion. The EAP m et hods em ployed by t he NWA1121- NI when in Wireless Client operat ing m ode are Transport Layer Securit y ( TLS) , Prot ect ed Ext ensible Aut hent icat ion Prot ocol ( PEAP) , Light weight Ext ensible Aut hent icat ion Prot ocol ( LEAP) and Tunneled Transport Layer Securit y ( TTLS) . The aut hent icat ion prot ocol m ay eit her be Microsoft Challenge Handshake Aut hent icat ion Prot ocol Version 2 ( MSCHAPv2) or Generic Token Card ( GTC) . Furt her inform at ion on t hese t erm s can be found in Appendix D on page 181. RADIUS Rem ot e Aut hent icat ion Dial I n User Service ( RADI US) is a prot ocol t hat can be used t o m anage user access t o large net works. I t is based on a client- server m odel t hat support s aut hent icat ion, aut horizat ion and account ing. The access point is t he client and t he server is t he RADI US server. Figure 19 RADI US Server Set up NWA1121-NI User’s Guide 59 Chapter 6 Wireless LAN I n t he figure above, wireless client s A and B are t rying t o access t he I nt ernet via t he NWA1121- NI . The NWA1121- NI in t urn queries t he RADI US server if t he ident it y of client s A and U are allowed access t o t he I nt ernet . I n t his scenario, only client U’s ident it y is verified by t he RADI US server and allowed access t o t he I nt ernet . The RADI US server handles t he following t asks: • Aut he nt ica t ion which det erm ines t he ident it y of t he users. • Au t h or iza t ion which det erm ines t he net work services available t o aut hent icat ed users once t hey are connect ed t o t he net work. • Accou nt in g which keeps t rack of t he client ’s net work act ivit y. RADI US is a sim ple package exchange in which your AP act s as a m essage relay bet ween t he wireless client and t he net work RADI US server. You should know t he I P addresses, port s and share secret s of t he ext ernal RADI US server and/ or t he ext ernal RADI US account ing server you want t o use wit h your NWA1121- NI . You can configure a prim ary and backup RADI US and RADI US account ing server for your NWA1121- NI . 6.4 Wireless Settings Screen Use t his screen t o choose t he operat ing m ode for your NWA1121- NI . Click N e t w or k > W ir e le ss LAN > W ir e le ss Se t t ings. The screen varies depending upon t he operat ing m ode you select . 60 NWA1121-NI User’s Guide Chapter 6 Wireless LAN 6.4.1 Root AP Mode Use t his screen t o use your NWA1121- NI as an access point . Select Root AP as t he Ope r a t ion M ode . The following screen displays. Figure 20 Wireless LAN > Wireless Set t ings: Root AP NWA1121-NI User’s Guide 61 Chapter 6 Wireless LAN The following t able describes t he general wireless LAN labels in t his screen. Table 10 Wireless LAN > Wireless Set t ings: Root AP LABEL DESCRIPTION Basic Set t ings Wireless LAN I nt erface Select t he check box t o t urn on t he wireless LAN on t he NWA1121- NI . Operat ion Mode Select Root AP from t he drop- down list . Wireless Mode Select 8 0 2 .1 1 b/ g t o allow bot h I EEE802.11b and I EEE802.11g com pliant WLAN devices t o associat e wit h t he NWA1121- NI . The t ransm ission rat e of your NWA1121- NI m ight be reduced. Select 8 0 2 .1 1 b/ g/ n t o allow I EEE802.11b, I EEE802.11g and I EEE802.11n com pliant WLAN devices t o associat e wit h t he NWA1121- NI . The t ransm ission rat e of t he NWA1121NI m ight be reduced. Select 8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he NWA1121- NI . Channel Select t he operat ing frequency/ channel depending on your part icular region from t he drop- down list box. Channel Widt h This field displays only when you select 8 0 2 .1 1 n or 8 0 2 .1 1 b/ g/ n in t he W ir e le ss M ode field. A st andard 20MHz channel offers t ransfer speeds of up t o 150Mbps whereas a 40MHz channel uses t wo st andard channels and offers speeds of up t o 300Mbps. However, not all devices support 40MHz channels. Select t he channel bandwidt h you want t o use for your wireless net work. I t is recom m ended t hat you select 2 0 / 4 0 M H z . This allows t he NWA1121- NI t o adj ust t he channel bandwidt h depending on net work condit ions. Select 2 0 M H z if you want t o lessen radio int erference wit h ot her wireless devices in your neighborhood or t he wireless client s do not support channel bonding. Select SSI D Profile The SSI D ( Service Set I Dent ifier) ident ifies t he Service Set wit h which a wireless st at ion is associat ed. Wireless st at ions associat ing t o t he access point ( AP) m ust have t he sam e SSI D. You can have up t o four SSI Ds act ive at t he sam e t im e. Note: If you are configuring the NWA1121-NI from a computer connected to the wireless LAN and you change the NWA1121-NI’s SSID or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the NWA1121-NI’s new settings. This is t he index num ber of each SSI D profile. Act ivve Select t he check box t o enable an SSI D profile. Ot herwise, clear t he check box. Profile Select an SSI D Pr ofile from t he drop- down list box. Universal Repeat er Set t ings The Universal repeat er funct ion allows t he NWA1121- NI in root AP or repeat er m ode t o set up a wireless connect ion bet ween it and anot her NWA1121- NI in root AP or repeat er m ode. Note: Universal repeater security is independent of the security settings between the NWA1121-NI and any wireless clients. 62 Local MAC Address Loca l M AC Addr e ss is t he MAC address of your NWA1121- NI . Universal Repeat er SSI D Profile Select t he SSI D profile you want t o use for universal repeat er connect ions. Note: You can only configure None, WPA-PSK or WPA2-PSK security mode for the SSID used by a universal repeater connection. NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 10 Wireless LAN > Wireless Set t ings: Root AP ( cont inued) LABEL DESCRIPTION Advanced Set t ings Beacon I nt erval When a wirelessly net work device sends a beacon, it includes wit h it a beacon int erval. This specifies t he t im e period before t he device sends t he beacon again. The int erval t ells receiving devices on t he net work how long t hey can wait in lowpower m ode before waking up t o handle t he beacon. A high value helps save current consum pt ion of t he access point . DTI M I nt erval Delivery Traffic I ndicat ion Message ( DTI M) is t he t im e period aft er which broadcast and m ult icast packet s are t ransm it t ed t o m obile client s in t he Act ive Pow er Managem ent m ode. A high DTI M value can cause client s t o lose connect ivit y wit h t he net work. Out put Pow er Set t he out put power of t he NWA1121- NI in t his field. I f t here is a high densit y of APs in an area, decrease t he out put power of t he NWA1121- NI t o reduce int erference wit h ot her APs. Select one of t he following Fu ll ( Full Power) , 5 0 % , 2 5 % , or 1 2 .5 % . See t he product specificat ions for m ore inform at ion on your NWA1121- NI ’s out put power. Pream ble Type Select D yn a m ic t o have t he AP aut om at ically use short pream ble when wireless adapt ers support it , ot herwise t he AP uses long pream ble. Select Lon g if you are unsure what pream ble m ode t he wireless adapt ers support , and t o provide m ore reliable com m unicat ions in busy wireless net works. RTS/ CTS Threshold ( Request To Send) The t hreshold ( num ber of byt es) for enabling RTS/ CTS handshake. Dat a wit h it s fram e size larger t han t his value will perform t he RTS/ CTS handshake. Set t ing t his at t ribut e t o be larger t han t he m axim um MSDU ( MAC service dat a unit ) size t urns off t he RTS/ CTS handshake. Set t ing t his at t ribut e t o it s sm allest value ( 1) t urns on t he RTS/ CTS handshake. Fragm ent at ion The t hreshold ( num ber of byt es) for t he fragm ent at ion boundary for direct ed m essages. I t is t he m axim um dat a fragm ent size t hat can be sent . Ext ension Channel Prot ect ion Mode You can use CTS t o se lf or RTS- CTS prot ect ion m echanism t o reduce conflict s wit h ot her wireless net works or hidden wireless client s. The t hroughput of RTS- CTS is m uch lower t han CTS t o se lf. Using t his m ode m ay decrease your wireless perform ance. A- MPDU Aggregat ion This field is available only when 8 0 2 .1 1 b/ g/ n is select ed as t he W ir e le ss M ode . Select t o enable A- MPDU aggregat ion. Message Prot ocol Dat a Unit ( MPDU) aggregat ion collect s Et hernet fram es along wit h t heir 802.11n headers and wraps t hem in a 802.11n MAC header. This m et hod is useful for increasing bandwidt h t hroughput in environm ent s t hat are prone t o high error rat es. Short GI This field is available only when 8 0 2 .1 1 b/ g/ n is select ed as t he W ir e le ss M ode . Select En a ble d t o use Sh or t GI ( Guard I nt erval) . The guard int erval is t he gap int roduced bet ween dat a t ransm ission from users in order t o reduce int erference. Reducing t he GI increases dat a t ransfer rat es but also increases int erference. I ncreasing t he GI reduces dat a t ransfer rat es but also reduces int erference. MCS Rat e The M CS Ra t e t able is available only when 8 0 2 .1 1 b/ g/ n is select ed in t he W ir e le ss M ode field. I EEE 802.11n support s m any different dat a rat es which are called MCS rat es. MCS st ands for Modulat ion and Coding Schem e. This is an 802.11n feat ure t hat increases t he wireless net work perform ance in t erm s of t hroughput . For each MCS Rat e ( 0- 15) , select eit her Ena ble d t o have t he NWA1121- NI use t he dat a rat e. Clear t he En a ble d check box if you do not want t he NWA1121- NI t o use t he dat a rat e. Turn on t he Au t o opt ion t o have t he NWA1121- NI set t he dat a rat es aut om at ically t o opt im ize t he t hroughput . Note: You can set the NWA1121-NI to use up to four MCS rates at a time. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide 63 Chapter 6 Wireless LAN 6.4.2 Repeater Mode Use t his screen t o have t he NWA1121- NI act as a wireless repeat er. You need t o know t he MAC address of t he peer device, which also m ust be in Repeat er or Root AP m ode. Figure 21 Wireless LAN > Wireless Set t ings: Repeat er The following t able describes t he bridge labels in t his screen. Table 11 Wireless LAN > Wireless Set t ings: Repeat er LABEL DESCRIPTION Basic Set t ings 64 Wireless LAN I nt erface Select t he check box t o t urn on t he wireless LAN on t he NWA1121- NI . Operat ion Mode Select Re pe a t e r from t he drop- down list . NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 11 Wireless LAN > Wireless Set t ings: Repeat er ( cont inued) LABEL DESCRIPTION Wireless Mode Select 8 0 2 .1 1 b/ g t o allow bot h I EEE802.11b and I EEE802.11g com pliant WLAN devices t o associat e wit h t he NWA1121- NI . The t ransm ission rat e of your NWA1121- NI m ight be reduced. Select 8 0 2 .1 1 b/ g/ n t o allow I EEE802.11b, I EEE802.11g and I EEE802.11n com pliant WLAN devices t o associat e wit h t he NWA1121- NI . The t ransm ission rat e of t he NWA1121NI m ight be reduced. Select 8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he NWA1121- NI . Channel Select t he operat ing frequency/ channel depending on your part icular region from t he drop- down list box. Channel Widt h This field displays only when you select 8 0 2 .1 1 n or 8 0 2 .1 1 b/ g/ n in t he W ir e le ss M ode field. A st andard 20MHz channel offers t ransfer speeds of up t o 150Mbps whereas a 40MHz channel uses t wo st andard channels and offers speeds of up t o 300Mbps. However, not all devices support 40MHz channels. Select t he channel bandwidt h you want t o use for your wireless net work. I t is recom m ended t hat you select 2 0 / 4 0 M H z . This allows t he NWA1121- NI t o adj ust t he channel bandwidt h depending on net work condit ions. Select 2 0 M H z if you want t o lessen radio int erference wit h ot her wireless devices in your neighborhood or t he wireless client s do not support channel bonding. Universal Repeat er Set t ings The Universal repeat er funct ion allows t he NWA1121- NI in root AP or repeat er m ode t o set up a wireless connect ion bet ween it and anot her NWA1121- NI in root AP or repeat er m ode. Note: Universal repeater security is independent of the security settings between the NWA1121-NI and any wireless clients. Local MAC Address Loca l M AC Addr e ss is t he MAC address of your NWA1121- NI . Universal Repeat er SSI D Profile Select t he SSI D profile you want t o use for universal repeat er connect ions wit h an AP or repeat er or regular wireless connect ions wit h wireless client s. Note: You can only configure None, WPA-PSK or WPA2-PSK security mode for the SSID used by a universal repeater connection. Root MAC Address Specify t he peer device’s MAC address. The peer device can be a NWA1121- NI in eit her root AP m ode or repeat er m ode. Advanced Set t ings Beacon I nt erval When a wirelessly net work device sends a beacon, it includes wit h it a beacon int erval. This specifies t he t im e period before t he device sends t he beacon again. The int erval t ells receiving devices on t he net work how long t hey can wait in lowpower m ode before waking up t o handle t he beacon. A high value helps save current consum pt ion of t he access point . DTI M I nt erval Delivery Traffic I ndicat ion Message ( DTI M) is t he t im e period aft er which broadcast and m ult icast packet s are t ransm it t ed t o m obile client s in t he Act ive Pow er Managem ent m ode. A high DTI M value can cause client s t o lose connect ivit y wit h t he net work. Out put Pow er Set t he out put power of t he NWA1121- NI in t his field. I f t here is a high densit y of APs in an area, decrease t he out put power of t he NWA1121- NI t o reduce int erference wit h ot her APs. Select one of t he following Fu ll ( Full Power) , 5 0 % , 2 5 % or 1 2 .5 % . See t he product specificat ions for m ore inform at ion on your NWA1121- NI ’s out put power. NWA1121-NI User’s Guide 65 Chapter 6 Wireless LAN Table 11 Wireless LAN > Wireless Set t ings: Repeat er ( cont inued) LABEL DESCRIPTION Pream ble Type Select D yn a m ic t o have t he AP aut om at ically use short pream ble when wireless adapt ers support it , ot herwise t he AP uses long pream ble. Select Lon g if you are unsure what pream ble m ode t he wireless adapt ers support , and t o provide m ore reliable com m unicat ions in busy wireless net works. RTS/ CTS Threshold ( Request To Send) The t hreshold ( num ber of byt es) for enabling RTS/ CTS handshake. Dat a wit h it s fram e size larger t han t his value will perform t he RTS/ CTS handshake. Set t ing t his at t ribut e t o be larger t han t he m axim um MSDU ( MAC service dat a unit ) size t urns off t he RTS/ CTS handshake. Set t ing t his at t ribut e t o it s sm allest value ( 1) t urns on t he RTS/ CTS handshake. Fragm ent at ion The t hreshold ( num ber of byt es) for t he fragm ent at ion boundary for direct ed m essages. I t is t he m axim um dat a fragm ent size t hat can be sent . Ext ension Channel Prot ect ion Mode You can use CTS t o se lf or RTS- CTS prot ect ion m echanism t o reduce conflict s wit h ot her wireless net works or hidden wireless client s. The t hroughput of RTS- CTS is m uch lower t han CTS t o se lf. Using t his m ode m ay decrease your wireless perform ance. A- MPDU Aggregat ion This field is available only when 8 0 2 .1 1 b/ g/ n is select ed as t he W ir e le ss M ode . Select t o enable A- MPDU aggregat ion. Message Prot ocol Dat a Unit ( MPDU) aggregat ion collect s Et hernet fram es along wit h t heir 802.11n headers and wraps t hem in a 802.11n MAC header. This m et hod is useful for increasing bandwidt h t hroughput in environm ent s t hat are prone t o high error rat es. Short GI This field is available only when 8 0 2 .1 1 b/ g/ n is select ed as t he W ir e le ss M ode . Select En a ble d t o use Sh or t GI ( Guard I nt erval) . The guard int erval is t he gap int roduced bet ween dat a t ransm ission from users in order t o reduce int erference. Reducing t he GI increases dat a t ransfer rat es but also increases int erference. I ncreasing t he GI reduces dat a t ransfer rat es but also reduces int erference. MCS Rat e The M CS Ra t e t able is available only when 8 0 2 .1 1 b/ g/ n is select ed in t he W ir e le ss M ode field. I EEE 802.11n support s m any different dat a rat es which are called MCS rat es. MCS st ands for Modulat ion and Coding Schem e. This is an 802.11n feat ure t hat increases t he wireless net work perform ance in t erm s of t hroughput . For each MCS Rat e ( 0- 15) , select eit her Ena ble d t o have t he NWA1121- NI use t he dat a rat e. Clear t he En a ble d check box if you do not want t he NWA1121- NI t o use t he dat a rat e. Turn on t he Au t o opt ion t o have t he NWA1121- NI set t he dat a rat es aut om at ically t o opt im ize t he t hroughput . Note: You can set the NWA1121-NI to use up to four MCS rates at a time. 66 Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide Chapter 6 Wireless LAN 6.4.3 Wireless Client Mode Use t his screen t o t urn your NWA1121- NI int o a wireless client . Select Clie nt as t he Ope r a t ion M ode . The following screen displays. Figure 22 Wireless LAN > Wireless Set t ings: Wireless Client The following t able describes t he general wireless LAN labels in t his screen. Table 12 Wireless LAN > Wireless Set t ings: Wireless Client LABEL DESCRIPTION Basic Set t ings Wireless LAN I nt erface Select t he check box t o t urn on t he wireless LAN on t he NWA1121- NI . Operat ion Mode Select Clie n t in t his field. Sit e Survey Click t his t o view a list of available wireless access point s wit hin t he range. Select t he AP you want t o use. Note: After selecting Client as the Operation Mode in the Basic Settings section, you must click Apply to be able to select from the AP list. NWA1121-NI User’s Guide 67 Chapter 6 Wireless LAN Table 12 Wireless LAN > Wireless Set t ings: Wireless Client ( cont inued) LABEL DESCRIPTION SSI D Profile The SSI D ( Service Set I Dent ifier) ident ifies t he Service Set wit h which a wireless st at ion is associat ed. Wireless st at ions associat ing t o t he access point ( AP) m ust have t he sam e SSI D. I n t his field, select t he SSI D profile of t he AP you want t o use. Click Apply. The SSI D used in t he select ed SSI D profile aut om at ically changes t o be t he one you select in t he Sit e Sur ve y screen. Set t he securit y configurat ion for t his operat ing m ode in t he W ir e le ss LAN > Se cu r it y screen. Check t he D a sh boa r d screen t o check if t he set t ings you set show in t he WLAN inform at ion. Note: If you are configuring the NWA1121-NI from a computer connected to the wireless LAN and you change the NWA1121-NI’s SSID or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the NWA1121-NI’s new settings. Channel This shows t he operat ing frequency/ channel in use. This field is read- only when you select Clie n t as your operat ion m ode. Channel Widt h A st andard 20MHz channel offers t ransfer speeds of up t o 150Mbps whereas a 40MHz channel uses t wo st andard channels and offers speeds of up t o 300Mbps. However, not all devices support 40MHz channels. Select t he channel bandwidt h you want t o use for your wireless net work. I t is recom m ended t hat you select 2 0 / 4 0 M H z . This allows t he NWA1121- NI t o adj ust t he channel bandwidt h depending on net work condit ions. Select 2 0 M H z if you want t o lessen radio int erference wit h ot her wireless devices in your neighborhood or t he AP do not support channel bonding. Advanced Set t ings Out put Pow er Set t he out put power of t he NWA1121- NI in t his field. I f t here is a high densit y of APs in an area, decrease t he out put power of t he NWA1121- NI t o reduce int erference wit h ot her APs. Select one of t he following Fu ll ( Full Power) , 5 0 % , 2 5 % or 1 2 .5 % . See t he product specificat ions for m ore inform at ion on your NWA1121- NI ’s out put power. Pream ble Type Select D yn a m ic t o have t he NWA1121- NI aut om at ically use short pream ble when t he wireless net work your NWA1121- NI is connect ed t o support s it , ot herwise t he NWA1121- NI uses long pream ble. Select Lon g pream ble if you are unsure what pream ble m ode t he wireless device your NWA1121- NI is connect ed t o support s, and t o provide m ore reliable com m unicat ions in busy wireless net works. 68 RTS/ CTS Threshold ( Request To Send) The t hreshold ( num ber of byt es) for enabling RTS/ CTS handshake. Dat a wit h it s fram e size larger t han t his value will perform t he RTS/ CTS handshake. Set t ing t his at t ribut e t o be larger t han t he m axim um MSDU ( MAC service dat a unit ) size t urns off t he RTS/ CTS handshake. Set t ing t his at t ribut e t o it s sm allest value ( 1) t urns on t he RTS/ CTS handshake. Fragm ent at ion The t hreshold ( num ber of byt es) for t he fragm ent at ion boundary for direct ed m essages. I t is t he m axim um dat a fragm ent size t hat can be sent . Ext ension channel prot ect ion m ode You can use CTS t o se lf or RTS- CTS prot ect ion m echanism t o reduce conflict s wit h ot her wireless net works or hidden wireless client s. The t hroughput of RTS- CTS is m uch lower t han CTS t o se lf. Using t his m ode m ay decrease your wireless perform ance. A- MPDU Aggregat ion Select t o enable A- MPDU aggregat ion. Message Prot ocol Dat a Unit ( MPDU) aggregat ion collect s Et hernet fram es along wit h t heir 802.11n headers and wraps t hem in a 802.11n MAC header. This m et hod is useful for increasing bandwidt h t hroughput in environm ent s t hat are prone t o high error rat es. NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 12 Wireless LAN > Wireless Set t ings: Wireless Client ( cont inued) LABEL DESCRIPTION Short GI Select Ena ble d t o use Sh or t GI ( Guard I nt erval) . The guard int erval is t he gap int roduced bet ween dat a t ransm ission from users in order t o reduce int erference. Reducing t he GI increases dat a t ransfer rat es but also increases int erference. I ncreasing t he GI reduces dat a t ransfer rat es but also reduces int erference. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.4.4 MBSSID Mode Use t his screen t o have t he NWA1121- NI funct ion in MBSSI D m ode. Select M BSSI D as t he Ope r a t ion M ode . The following screen diplays. Figure 23 Wireless LAN > Wireless Set t ings: MBSSI D NWA1121-NI User’s Guide 69 Chapter 6 Wireless LAN The following t able describes t he labels in t his screen. Table 13 Wireless LAN > Wireless Set t ings: MBSSI D LABEL DESCRIPTION Basic Set t ings Wireless LAN I nt erface Select t he check box t o t urn on t he wireless LAN on t he NWA1121- NI . Operat ion Mode Select M BSSI D from t he drop- down list . Wireless Mode Select 8 0 2 .1 1 b/ g t o allow bot h I EEE802.11b and I EEE802.11g com pliant WLAN devices t o associat e wit h t he NWA1121- NI . The t ransm ission rat e of your NWA1121- NI m ight be reduced. Select 8 0 2 .1 1 b/ g/ n t o allow I EEE802.11b, I EEE802.11g and I EEE802.11n com pliant WLAN devices t o associat e wit h t he NWA1121- NI . The t ransm ission rat e of t he NWA1121NI m ight be reduced. Select 8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he NWA1121- NI . Channel Select t he operat ing frequency/ channel depending on your part icular region from t he drop- down list box. Channel Widt h This field displays only when you select 8 0 2 .1 1 n or 8 0 2 .1 1 b/ g/ n in t he W ir e le ss M ode field. A st andard 20MHz channel offers t ransfer speeds of up t o 150Mbps whereas a 40MHz channel uses t wo st andard channels and offers speeds of up t o 300Mbps. However, not all devices support 40MHz channels. Select t he channel bandwidt h you want t o use for your wireless net work. Select 2 0 M H z if you want t o lessen radio int erference wit h ot her wireless devices in your neighborhood or t he wireless client s do not support channel bonding. Select SSI D Profile The SSI D ( Service Set I Dent ifier) ident ifies t he Service Set wit h which a wireless st at ion is associat ed. Wireless st at ions associat ing t o t he access point ( AP) m ust have t he sam e SSI D. You can have up t o eight SSI Ds act ive at t he sam e t im e. Note: If you are configuring the NWA1121-NI from a computer connected to the wireless LAN and you change the NWA1121-NI’s SSID or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the NWA1121-NI’s new settings. This is t he index num ber of each SSI D profile. Act ivve Select t he check box t o enable an SSI D profile. Ot herwise, clear t he check box. Profile Select an SSI D Pr ofile from t he drop- down list box. Advanced Set t ings 70 Beacon I nt erval When a wirelessly net work device sends a beacon, it includes wit h it a beacon int erval. This specifies t he t im e period before t he device sends t he beacon again. The int erval t ells receiving devices on t he net work how long t hey can wait in lowpower m ode before waking up t o handle t he beacon. A high value helps save current consum pt ion of t he access point . DTI M I nt erval Delivery Traffic I ndicat ion Message ( DTI M) is t he t im e period aft er which broadcast and m ult icast packet s are t ransm it t ed t o m obile client s in t he Act ive Pow er Managem ent m ode. A high DTI M value can cause client s t o lose connect ivit y wit h t he net work. Out put Pow er Set t he out put power of t he NWA1121- NI in t his field. I f t here is a high densit y of APs in an area, decrease t he out put power of t he NWA1121- NI t o reduce int erference wit h ot her APs. Select one of t he following Fu ll ( Full Power) , 5 0 % , 2 5 % or 1 2 .5 % . See t he product specificat ions for m ore inform at ion on your NWA1121- NI ’s out put power. NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 13 Wireless LAN > Wireless Set t ings: MBSSI D ( cont inued) LABEL DESCRIPTION Pream ble Type Select D yn a m ic t o have t he AP aut om at ically use short pream ble when wireless adapt ers support it , ot herwise t he AP uses long pream ble. Select Lon g if you are unsure what pream ble m ode t he wireless adapt ers support , and t o provide m ore reliable com m unicat ions in busy wireless net works. RTS/ CTS Threshold ( Request To Send) The t hreshold ( num ber of byt es) for enabling RTS/ CTS handshake. Dat a wit h it s fram e size larger t han t his value will perform t he RTS/ CTS handshake. Set t ing t his at t ribut e t o be larger t han t he m axim um MSDU ( MAC service dat a unit ) size t urns off t he RTS/ CTS handshake. Set t ing t his at t ribut e t o it s sm allest value ( 1) t urns on t he RTS/ CTS handshake. Ext ension Channel Prot ect ion Mode You can use CTS t o se lf or RTS- CTS prot ect ion m echanism t o reduce conflict s wit h ot her wireless net works or hidden wireless client s. The t hroughput of RTS- CTS is m uch lower t han CTS t o se lf. Using t his m ode m ay decrease your wireless perform ance. A- MPDU Aggregat ion This field is available only when 8 0 2 .1 1 b/ g/ n is select ed as t he W ir e le ss M ode . Select t o enable A- MPDU aggregat ion. Message Prot ocol Dat a Unit ( MPDU) aggregat ion collect s Et hernet fram es along wit h t heir 802.11n headers and wraps t hem in a 802.11n MAC header. This m et hod is useful for increasing bandwidt h t hroughput in environm ent s t hat are prone t o high error rat es. Short GI This field is available only when 8 0 2 .1 1 b/ g/ n is select ed as t he W ir e le ss M ode . Select En a ble d t o use Sh or t GI ( Guard I nt erval) . The guard int erval is t he gap int roduced bet ween dat a t ransm ission from users in order t o reduce int erference. Reducing t he GI increases dat a t ransfer rat es but also increases int erference. I ncreasing t he GI reduces dat a t ransfer rat es but also reduces int erference. MCS Rat e The M CS Ra t e t able is available only when 8 0 2 .1 1 b/ g/ n is select ed in t he W ir e le ss M ode field. I EEE 802.11n support s m any different dat a rat es which are called MCS rat es. MCS st ands for Modulat ion and Coding Schem e. This is an 802.11n feat ure t hat increases t he wireless net work perform ance in t erm s of t hroughput . For each MCS Rat e ( 0- 15) , select eit her Ena ble d t o have t he NWA1121- NI use t he dat a rat e. Clear t he En a ble d check box if you do not want t he NWA1121- NI t o use t he dat a rat e. Turn on t he Au t o opt ion t o have t he NWA1121- NI set t he dat a rat es aut om at ically t o opt im ize t he t hroughput . Note: You can set the NWA1121-NI to use up to four MCS rates at a time. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide 71 Chapter 6 Wireless LAN 6.5 SSID Screen Use t his screen t o view and m odify t he set t ings of t he SSI D profiles on t he NWA1121- NI . Click W ir e le ss LAN > SSI D t o display t he screen as shown. Figure 24 Wireless LAN > SSI D The following t able describes t he labels in t his screen. Figure 25 Wireless LAN > SSI D LABEL DESCRI PTI ON Profile Set t ings 72 This field displays t he index num ber of each SSI D profile. Profile Nam e This field displays t he ident ificat ion nam e of each SSI D profile on t he NWA1121- NI . SSI D This field displays t he nam e of t he wireless profile on t he net work. When a wireless client scans for an AP t o associat e wit h, t his is t he nam e t hat is broadcast and seen in t he wireless client ut ilit y. Securit y This field indicat es which securit y profile is current ly associat ed wit h each SSI D profile. See Sect ion 6.6 on page 74 for m ore inform at ion. RADI US This field displays which RADI US profile is current ly associat ed wit h each SSI D profile, if you have a RADI US server configured. QoS This field displays t he Qualit y of Service set t ing for t his profile or N ON E if QoS is not configured on a profile. MAC Filt er This field displays which MAC filt er profile is current ly associat ed wit h each SSI D profile, or D isa ble if MAC filt ering is not configured on an SSI D profile. Modify Click Edit t o go t o t he SSI D configurat ion screen where you can m odify set t ings in an SSI D profile. NWA1121-NI User’s Guide Chapter 6 Wireless LAN 6.5.1 Configuring SSID Use t his screen t o configure an SSI D profile. I n t he W ir e le ss LAN > SSI D screen, click Edit next t o t he SSI D profile you want t o configure t o display t he following screen. Figure 26 SSI D: Edit The following t able describes t he labels in t his screen. Table 14 SSI D: Edit LABEL DESCRI PTI ON Profile Nam e This is t he nam e t hat ident ifying t his profile. SSI D When a wireless client scans for an AP t o associat e wit h, t his is t he nam e t hat is broadcast and seen in t he wireless client ut ilit y. Securit y Select a securit y profile t o use wit h t his SSI D profile. See Sect ion 6.6 on page 74 for m ore inform at ion. I f you do not want t his profile t o use wireless securit y, select D isa ble d. RADI US Select a RADI US profile from t he drop- down list box, if you have a RADI US server configured. I f you do not need t o use RADI US aut hent icat ion, ignore t his field. See Sect ion 6.7 on page 87 for m ore inform at ion. MAC Filt ering Select a MAC filt er profile from t he drop- down list box. I f you do not want t o use MAC filt ering on t his profile, select D isa ble d. QoS Select t he Qualit y of Service priorit y for t his BSS’s t raffic. • • • I f you select W M M from t he QoS list , t he priorit y of a dat a packet depends on t he packet ’s I EEE 802.1q or DSCP header. I f a packet has no WMM value assigned t o it , it is assigned t he default priorit y. I f you select W M M _ VOI CE, W M M _ VI D EO, W M M _ BESTEFFORT or W M M _ BACKGROUN D, t he NWA1121- NI applies t hat QoS set t ing t o all of t hat SSI D’s t raffic. I f you select N on e , t he NWA1121- NI applies no priorit y t o t raffic on t his SSI D. Note: When you configure an SSID profile’s QoS settings, the NWA1121-NI applies the same QoS setting to all of the profile’s traffic. NWA1121-NI User’s Guide 73 Chapter 6 Wireless LAN Table 14 SSI D: Edit ( cont inued) LABEL DESCRI PTI ON BSSI D VLAN I D Ent er a VLAN I D for t he SSI D profile. Packet s com ing from t he WLAN using t his SSI D profile are t agged wit h t he VLAN I D num ber by t he NWA1121- NI . Num ber of Wireless St at ions Allowed t o Associat e Use t his field t o set a m axim um num ber of wireless st at ions t hat m ay connect t o t he device. Hidden SSI D I f you do not select t he checkbox, t he NWA1121- NI broadcast s t his SSI D ( a wireless client scanning for an AP will find t his SSI D) . Alt ernat ively, if you select t he checkbox, t he NWA1121- NI hides t his SSI D ( a wireless client scanning for an AP will not find t his SSI D) . I nt ra- BSS Traffic Blocking Select t he check box t o prevent wireless client s in t his profile’s BSS from com m unicat ing wit h one anot her. Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.6 Wireless Security Screen Use t his screen t o choose t he securit y m ode for your NWA1121- NI . Click W ir e le ss LAN > Se cu r it y. Select t he profile t hat you want t o configure and click Edit . Figure 27 Wireless > Securit y 74 NWA1121-NI User’s Guide Chapter 6 Wireless LAN The Se cur it y Se t t in gs screen varies depending upon t he securit y m ode you select . Figure 28 Securit y: None Not e t hat som e screens display different ly depending on t he operat ing m ode select ed in t he W ir e le ss LAN > W ir e le ss Se t t ings screen. Not e: You m ust enable t he sam e wireless securit y set t ings on t he NWA1121- NI and on all wireless client s t hat you want t o associat e wit h it . NWA1121-NI User’s Guide 75 Chapter 6 Wireless LAN 6.6.1 Security: WEP Use t his screen t o use WEP as t he securit y m ode for your NWA1121- NI . Select W EP in t he Se cur it y M ode field t o display t he following screen. Figure 29 Securit y: WEP The following t able describes t he labels in t his screen. Table 15 Securit y: WEP 76 LABEL DESCRIPTION Profile Nam e This is t he nam e t hat ident ifying t his profile. Securit y Mode Choose W EP in t his field. Aut hent icat ion Type Select Ope n or Sh a r e d from t he drop- down list box. Dat a Encrypt ion Select 6 4 - bit W EP or 1 2 8 - bit W EP t o enable dat a encrypt ion. Passphrase Ent er t he passphrase or st ring of t ext used for aut om at ic WEP key generat ion on wireless client adapt ers. Generat e Click t his t o get t he keys from t he Pa ssph r a se you ent ered. NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 15 Securit y: WEP ( cont inued) LABEL DESCRIPTION Key 1 t o The WEP keys are used t o encrypt dat a. Bot h t he NWA1121- NI and t he wireless st at ions m ust use t he sam e WEP key for dat a t ransm ission. Key 4 I f you chose 6 4 - bit W EP, t hen ent er any 5 ASCI I charact ers or 10 hexadecim al charact ers ( " 0- 9" , " A- F" ) . I f you chose 1 2 8 - bit W EP, t hen ent er 13 ASCI I charact ers or 26 hexadecim al charact ers ( " 0- 9" , " A- F" ) . You m ust configure all four keys, but only one key can be act ivat ed at any one t im e. Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.6.2 Security: 802.1x Only This screen varies depending on t he operat ing m ode you select in t he W ir e le ss LAN > W ir e le ss Se t t in gs screen. 6.6.2.1 Access Point Use t his screen t o use 802.1x- Only securit y m ode for your NWA1121- NI t hat is in root AP, MBSSI D or repeat er operat ing m ode. Select 8 0 2 .1 x - On ly in t he Se cur it y M ode field t o display t he following screen. Figure 30 Securit y: 802.1x Only for Access Point The following t able describes t he labels in t his screen. Table 16 Securit y: 802.1x Only for Access Point LABEL DESCRIPTION Securit y Set t ings Profile Nam e This is t he nam e t hat ident ifying t his profile. Securit y Mode Choose 8 0 2 .1 x - Only in t his field. Rekey Opt ions NWA1121-NI User’s Guide 77 Chapter 6 Wireless LAN Table 16 Securit y: 802.1x Only for Access Point ( cont inued) LABEL DESCRIPTION Reaut hent icat ion Tim e Specify how oft en wireless st at ions have t o resend user nam es and passwords in order t o st ay connect ed. Ent er a t im e int erval bet ween 100 and 3600 seconds. Alt ernat ively, ent er “ 0” t o t urn reaut hent icat ion off. Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority. Enable Group- Key Updat e Select t his opt ion t o have t he NWA1121- NI aut om at ically disconnect a wireless st at ion from t he wired net work aft er a period of inact ivit y. The wireless st at ion needs t o ent er t he user nam e and password again before access t o t he wired net w ork is allowed. Ent er a t im e int erval bet ween 100 and 3600 seconds. Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.6.2.2 Wireless Client Use t his screen t o use 802.1x- Only securit y m ode for your NWA1121- NI t hat is in wireless client operat ing m ode. Select 8 0 2 .1 x - Only in t he Se cur it y M ode field t o display t he following screen. Figure 31 Securit y: 802.1x Only for Wireless Client The following t able describes t he labels in t his screen. Table 17 Securit y: 802.1x Only for Wireless Client LABEL DESCRIPTION Securit y Set t ings Profile Nam e 78 This is t he nam e t hat ident ifying t his profile. NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 17 Securit y: 802.1x Only for Wireless Client ( cont inued) LABEL DESCRIPTION Securit y Mode Choose t he sam e securit y m ode used by t he AP. I EEE802.1x Aut hent icat ion Eap Type The opt ions on t he left refer t o EAP m et hods. You can choose eit her TLS, LEAP, PEAP or TTLS. I f you select TTLS or PEAP, t he opt ions on t he right refer t o aut hent icat ion prot ocols. You can choose bet ween PAP, CH AP, M SCH AP, M SCH APv2 and/ or GTC. User I nform at ion Usernam e Supply t he user nam e of t he account creat ed in t he RADI US server. Login Nam e Password Supply t he password of t he account creat ed in t he RADI US server. Cert ificat e User Cert ificat e I f you select TLS, ent er t he nam e of t he cert ificat e used t o t o verify t he ident it y of client s. Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.6.3 Security: 802.1x Static WEP This screen varies depending on t he operat ing m ode you select in t he W ir e le ss LAN > W ir e le ss Se t t in gs screen. NWA1121-NI User’s Guide 79 Chapter 6 Wireless LAN 6.6.3.1 Access Point Use t his screen t o use 802.1x st at ic WEP securit y m ode for your NWA1121- NI t hat is in root AP, MBSSI D or repeat er operat ing m ode. Select 8 0 2 .1 X- St a t ic W EP in t he Se cur it y M ode field t o display t he following screen. Figure 32 Securit y: 802.1X- St at ic WEP for Access Point The following t able describes t he labels in t his screen. Table 18 Securit y: 802.1X- St at ic WEP for Access Point LABEL DESCRIPTION Securit y Set t ings 80 Profile Nam e This is t he nam e t hat ident ifying t his profile. Securit y Mode Choose 8 0 2 .1 X - St a t ic W EP in t his field. Dat a Encrypt ion Select 6 4 - bit W EP or 1 2 8 - bit W EP t o enable dat a encrypt ion. Passphrase Ent er t he passphrase or st ring of t ext used for aut om at ic WEP key generat ion on wireless client adapt ers. Generat e Click t his t o get t he keys from t he Pa ssph r a se you ent ered. NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 18 Securit y: 802.1X- St at ic WEP for Access Point ( cont inued) LABEL DESCRIPTION Key 1 t o The WEP keys are used t o encrypt dat a. Bot h t he NWA1121- NI and t he wireless st at ions m ust use t he sam e WEP key for dat a t ransm ission. Key 4 I f you chose 6 4 - bit W EP, t hen ent er any 5 ASCI I charact ers or 10 hexadecim al charact ers ( " 0- 9" , " A- F" ) . I f you chose 1 2 8 - bit W EP, t hen ent er 13 ASCI I charact ers or 26 hexadecim al charact ers ( " 0- 9" , " A- F" ) . You m ust configure all four keys, but only one key can be act ivat ed at any one t im e. Rekey Opt ions Reaut hent icat ion Tim e Specify how oft en wireless st at ions have t o resend user nam es and passwords in order t o st ay connect ed. Ent er a t im e int erval bet ween 100 and 3600 seconds. Alt ernat ively, ent er “ 0” t o t urn reaut hent icat ion off. Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority. Enable Group- Key Updat e Select t his opt ion t o have t he NWA1121- NI aut om at ically disconnect a wireless st at ion from t he wired net work aft er a period of inact ivit y. The wireless st at ion needs t o ent er t he user nam e and password again before access t o t he wired net work is allowed. Ent er a t im e int erval bet ween 100 and 3600 seconds. Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide 81 Chapter 6 Wireless LAN 6.6.3.2 Wireless Client Use t his screen t o use 802.1x- Only securit y m ode for your NWA1121- NI t hat is in wireless client operat ing m ode. Select 8 0 2 .1 X- St a t ic W EP in t he Se cur it y M ode field t o display t he following screen. Figure 33 Securit y: 802.1X- St at ic WEP for Wireless Client The following t able describes t he labels in t his screen. Table 19 Securit y: 802.1X- St at ic WEP for Wireless Client LABEL DESCRIPTION Securit y Set t ings 82 Profile Nam e This is t he nam e t hat ident ifying t his profile. Securit y Mode Choose t he sam e securit y m ode used by t he AP. NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 19 Securit y: 802.1X- St at ic WEP for Wireless Client ( cont inued) LABEL DESCRIPTION Dat a Encrypt ion Select 6 4 - bit W EP or 1 2 8 - bit W EP t o enable dat a encrypt ion. Passphrase Ent er t he passphrase or st ring of t ext used for aut om at ic WEP key generat ion. Generat e Click t his t o get t he keys from t he Pa ssph r a se you ent ered. Key 1 t o The WEP keys are used t o encrypt dat a. Bot h t he NWA1121- NI and t he AP m ust use t he sam e WEP key for dat a t ransm ission. Key 4 I f you chose 6 4 - bit W EP, t hen ent er any 5 ASCI I charact ers or 10 hexadecim al charact ers ( " 0- 9" , " A- F" ) . I f you chose 1 2 8 - bit W EP, t hen ent er 13 ASCI I charact ers or 26 hexadecim al charact ers ( " 0- 9" , " A- F" ) . You m ust configure all four keys, but only one key can be act ivat ed at any one t im e. I EEE802.1x Aut hent icat ion Eap Type The opt ions on t he left refer t o EAP m et hods. You can choose eit her TLS, LEAP, PEAP or TTLS. I f you select TTLS or PEAP, t he opt ions on t he right refer t o aut hent icat ion prot ocols. You can choose bet ween PAP, CH AP, M SCH AP, M SCH APv2 and/ or GTC. User I nform at ion Usernam e Supply t he user nam e of t he account creat ed in t he RADI US server. Login Nam e Password Supply t he password of t he account creat ed in t he RADI US server. Cert ificat e User Cert ificat e I f you select TLS, ent er t he nam e of t he cert ificat e used t o t o verify t he ident it y of client s. Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.6.4 Security: WPA, WPA2, WPA2-MIX This screen varies depending on t he operat ing m ode you select in t he W ir e le ss LAN > W ir e le ss Se t t in gs screen. NWA1121-NI User’s Guide 83 Chapter 6 Wireless LAN 6.6.4.1 Access Point Use t his screen t o em ploy WPA or WPA2 as t he securit y m ode for your NWA1121- NI t hat is in root AP, MBSSI D or repeat er operat ing m ode. Select W PA, W PA2 or W PA2 - M I X in t he Se cur it y M ode field t o display t he following screen. Figure 34 Securit y: WPA/ WPA2 for Access Point The following t able describes t he labels in t his screen. Table 20 Securit y: WPA/ WPA2 for Access Point LABEL DESCRIPTION Securit y Set t ings Profile Nam e This is t he nam e t hat ident ifying t his profile. Securit y Mode Choose W PA, W PA2 or W PA- M I X in t his field. Rekey Opt ions Reaut hent icat ion Tim e Specify how oft en wireless st at ions have t o resend user nam es and passwords in order t o st ay connect ed. Ent er a t im e int erval bet ween 100 and 3600 seconds. Alt ernat ively, ent er “ 0” t o t urn reaut hent icat ion off. Note: If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has priority. Enable Group- Key Updat e Select t his opt ion t o have t he NWA1121- NI aut om at ically disconnect a wireless st at ion from t he wired net work aft er a period of inact ivit y. The wireless st at ion needs t o ent er t he user nam e and password again before access t o t he wired net work is allowed. Ent er a t im e int erval bet ween 100 and 3600 seconds. 84 Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide Chapter 6 Wireless LAN 6.6.4.2 Wireless Client Use t his screen t o em ploy WPA or WPA2 as t he securit y m ode for your NWA1121- NI t hat is in wireless client operat ing m ode. Select W PA or W PA2 in t he Se cur it y M ode field t o display t he following screen. Figure 35 Securit y: WPA for Wireless Client The following t able describes t he labels in t his screen. Table 21 Securit y: WPA/ WPA2 for Wireless Client LABEL DESCRIPTION Securit y Set t ings Profile Nam e This is t he nam e t hat ident ifying t his profile. Securit y Mode Choose t he sam e securit y m ode used by t he AP. Dat a Encrypt ion This shows t he encrypt ion m et hod used by t he NWA1121- NI . I EEE802.1x Aut hent icat ion Eap Type The opt ions on t he left refer t o EAP m et hods. You can choose eit her TLS, LEAP, PEAP or TTLS. I f you select TTLS or PEAP, t he opt ions on t he right refer t o aut hent icat ion prot ocols. You can choose bet ween PAP, CH AP, M SCH AP, M SCH APv2 and/ or GTC. User I nform at ion Usernam e Supply t he user nam e of t he account creat ed in t he RADI US server. Login Nam e Password Supply t he password of t he account creat ed in t he RADI US server. Cert ificat e User Cert ificat e NWA1121-NI User’s Guide I f you select TLS, ent er t he nam e of t he cert ificat e used t o t o verify t he ident it y of client s. 85 Chapter 6 Wireless LAN Table 21 Securit y: WPA/ WPA2 for Wireless Client ( cont inued) LABEL DESCRIPTION Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.6.5 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX Use t his screen t o em ploy WPA- PSK, WPA2- PSK or WPA2- PSK- MI X as t he securit y m ode of your NWA1121- NI . Select W PA- PSK, W PA2 - PSK or W PA2 - PSK- M I X in t he Se cur it y M ode field t o display t he following screen. Figure 36 Securit y: WPA- PSK, WPA2- PSK or WPA2- PSK- MI X The following t able describes t he labels not previously discussed Table 22 Securit y: WPA- PSK, WPA2- PSK or WPA2- PSK- MI X LABEL DESCRIPTION Profile Nam e This is t he nam e t hat ident ifying t his profile. Securit y Mode Choose W PA- PSK, W PA2 - PSK or W PA2 - PSK- M I X in t his field. Pre- Shared Key The encrypt ion m echanism s used for W PA and W PA- PSK are t he sam e. The only difference bet ween t he t wo is t hat W PA- PSK uses a sim ple com m on password, inst ead of user- specific credent ials. Type a pre- shared key from 8 t o 63 case- sensit ive ASCI I charact ers ( including spaces and sym bols) . 86 Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide Chapter 6 Wireless LAN 6.7 RADIUS Screen Use t his screen t o set up your NWA1121- NI ’s RADI US server set t ings. Click W ir e le ss LAN > RAD I US. The screen appears as shown. Figure 37 Wireless LAN > RADI US Select a profile you want t o configure and click Edit . Figure 38 Wireless LAN > RADI US NWA1121-NI User’s Guide 87 Chapter 6 Wireless LAN The following t able describes t he labels in t his screen. Table 23 Wireless LAN > RADI US LABEL DESCRIPTION Profile Nam e This is t he nam e t hat ident ifying t his RADI US profile. Prim ary RADI US Server Select t he check box t o enable user aut hent icat ion t hrough an ext ernal aut hent icat ion server. Prim ary Server I P Address Ent er t he I P address of t he RADI US server t o be used for aut hent icat ion. Prim ary Server Port Ent er t he port num ber of t he RADI US server t o be used for aut hent icat ion. Prim ary Share Secret Ent er a password ( up t o 128 alphanum eric charact ers) as t he key t o be shared bet ween t he ext ernal aut hent icat ion server and t he NWA1121- NI . The key m ust be t he sam e on t he ext ernal aut hent icat ion server and your NWA1121- NI . The key is not sent over t he net work. Backup RADI US Server I f t he NWA1121- NI cannot com m unicat e wit h t he prim ary RADI US server, you can have t he NWA1121- NI use a backup RADI US server. Make sure t he check boxe is select ed if you want t o use t he backup server. The NWA1121- NI will at t em pt t o com m unicat e t hree t im es before using t he backup server. Request s can be issued from t he client int erface t o use t he backup server. The lengt h of t im e for each aut hent icat ion is decided by t he wireless client or based on t he configurat ion of t he Re a u t h e n t ica t ion Tim e field in t he W ir e le ss LAN > Se cu r it y screen. Backup Server I P Address Ent er t he I P address of t he RADI US server t o be used for aut hent icat ion. Backup Server Port Ent er t he port num ber of t he RADI US server t o be used for aut hent icat ion. Backup Share Secret Ent er a password ( up t o 128 alphanum eric charact ers) as t he key t o be shared bet ween t he ext ernal aut hent icat ion server and t he NWA1121- NI . The key m ust be t he sam e on t he ext ernal aut hent icat ion server and your NWA1121- NI . The key is not sent over t he net work. Prim ary Account ing Server Select t he check box t o enable user account ing t hrough an ext ernal aut hent icat ion server. Prim ary Server I P Address Ent er t he I P address of t he ext ernal account ing server in dot t ed decim al not at ion. Prim ary Server Port Ent er t he port num ber of t he ext ernal account ing server. Prim ary Share Secret Ent er a password ( up t o 128 alphanum eric charact ers) as t he key t o be shared bet ween t he ext ernal account ing server and t he NWA1121- NI . The key m ust be t he sam e on t he ext ernal account ing server and your NWA1121- NI . The key is not sent over t he net work. Backup Account ing Server I f t he NWA1121- NI cannot com m unicat e wit h t he prim ary account ing server, you can have t he NWA1121- NI use a backup account ing server. Make sure t he check boxe is select ed if you want t o use t he backup server. The NWA1121- NI will at t em pt t o com m unicat e t hree t im es before using t he backup server. Backup Server I P Address Ent er t he I P address of t he ext ernal account ing server in dot t ed decim al not at ion. Backup Server Port Ent er t he port num ber of t he ext ernal account ing server. Backup Share Secret Ent er a password ( up t o 128 alphanum eric charact ers) as t he key t o be shared bet ween t he ext ernal account ing server and t he NWA1121- NI . The key m ust be t he sam e on t he ext ernal account ing and your NWA1121- NI . The key is not sent over t he net work. Back 88 Click Ba ck t o ret urn t o t he previous screen. NWA1121-NI User’s Guide Chapter 6 Wireless LAN Table 23 Wireless LAN > RADI US ( cont inued) LABEL DESCRIPTION Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.8 MAC Filter Screen Every Et hernet device has a unique MAC ( Media Access Cont rol) address. The MAC address is assigned at t he fact ory and consist s of six pairs of hexadecim al charact ers, for exam ple, 00: A0: C5: 00: 00: 02. You need t o know t he MAC address of each device t o configure MAC filt ering on t he NWA1121- NI . The MAC filt er funct ion allows you t o configure t he NWA1121- NI t o grant access t o t he NWA1121NI from ot her wireless devices ( Allow Associat ion) or exclude devices from accessing t he NWA1121NI ( Deny Associat ion) . Figure 39 MAC Filt ering I n t he figure above, wireless client U is able t o connect t o t he I nt ernet because it s MAC address is in t he allowed associat ion list specified in t he NWA1121- NI . The MAC address of client A is eit her denied associat ion or is not in t he list of allowed wireless client s specified in t he NWA1121- NI . NWA1121-NI User’s Guide 89 Chapter 6 Wireless LAN Use t his screen t o enable MAC address filt ering in your NWA1121- NI . You can specify MAC addresses t o eit her allow or deny associat ion wit h your NWA1121- NI . Click W ir e le ss LAN > M AC Filt e r. The screen displays as shown. Figure 40 Wireless LAN > MAC Filt er Select a profile you want t o configure and click Edit . Figure 41 MAC Filt er: Edit 90 NWA1121-NI User’s Guide Chapter 6 Wireless LAN The following t able describes t he labels in t his screen. Table 24 Wireless LAN > MAC Filt er LABEL DESCRIPTION Profile Nam e This is t he nam e t hat ident ifying t his profile. Access Cont rol Mode Select D isa ble d if you do not want t o use t his feat ure. Select Allow t o perm it access t o t he NWA1121- NI . MAC addresses not list ed will be denied access t o t he NWA1121- NI . Select D e n y t o block access t o t heNWA1121- NI . MAC addresses not list ed will be allowed t o access t he NWA1121- NI . This is t he index num ber of t he MAC address list ed. MAC Address Ent er t he MAC addresses ( in XX: XX: XX: XX: XX: XX form at ) of t he wireless st at ion t o be allowed or denied access t o t he NWA1121- NI . Back Click Ba ck t o ret urn t o t he previous screen. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 6.9 Technical Reference This sect ion provides t echnical background inform at ion about t he t opics covered in t his chapt er. Refer t o Appendix D on page 181 for furt her readings on Wireless LAN. 6.9.1 Additional Wireless Terms Table 25 Addit ional Wireless Term s TERM DESCRIPTION I nt ra- BSS Traffic This describes direct com m unicat ion ( not t hrough t he NWA1121- NI ) bet ween t wo wireless devices wit hin a wireless net work. You m ight disable t his kind of com m unicat ion t o enhance securit y wit hin your wireless net work. RTS/ CTS Threshold I n a wireless net work which covers a large area, wireless devices are som et im es not aware of each ot her ’s presence. This m ay cause t hem t o send inform at ion t o t he AP at t he sam e t im e and result in inform at ion colliding and not get t ing t hrough. By set t ing t his value lower t han t he default value, t he wireless devices m ust som et im es get perm ission t o send inform at ion t o t he NWA1121- NI . The lower t he value, t he m ore oft en t he devices m ust get perm ission. I f t his value is great er t han t he fragm ent at ion t hreshold value ( see below) , t hen wireless devices never have t o get perm ission t o send inform at ion t o t he NWA1121NI . Pream ble A pream ble affect s t he t im ing in your wireless net work. There are t wo pream ble m odes: long and short . I f a device uses a different pream ble m ode t han t he NWA1121- NI does, it cannot com m unicat e wit h t he NWA1121- NI . Fragm ent at ion Threshold A sm all fragm ent at ion t hreshold is recom m ended for busy net works, while a larger t hreshold provides fast er perform ance if t he net work is not very busy. NWA1121-NI User’s Guide 91 Chapter 6 Wireless LAN TERM DESCRIPTION Roam ing I f you have t wo or m ore NWA1121- NI s ( or ot her wireless access point s) on your wireless net work, you can enable t his opt ion so t hat wireless devices can change locat ions wit hout having t o log in again. This is useful for devices, such as not ebooks, t hat m ove around a lot . Ant enna An ant enna couples Radio Frequency ( RF) signals ont o air. A t ransm it t er wit hin a wireless device sends an RF signal t o t he ant enna, which propagat es t he signal t hrough t he air. The ant enna also operat es in reverse by capt uring RF signals from t he air. Posit ioning t he ant ennas properly increases t he range and coverage area of a wireless LAN. 6.9.2 WMM QoS WMM ( Wi- Fi Mult iMedia) QoS ( Qualit y of Service) ensures qualit y of service in wireless net works. I t cont rols WLAN t ransm ission priorit y on packet s t o be t ransm it t ed over t he wireless net work. WMM QoS priorit izes wireless t raffic according t o t he delivery requirem ent s of t he individual and applicat ions. WMM QoS is a part of t he I EEE 802.11e QoS enhancem ent t o cert ified Wi- Fi wireless net works. On APs wit hout WMM QoS, all t raffic st ream s are given t he sam e access priorit y t o t he wireless net work. I f t he int roduct ion of anot her t raffic st ream creat es a dat a t ransm ission dem and t hat exceeds t he current net work capacit y, t hen t he new t raffic st ream reduces t he t hroughput of t he ot her t raffic st ream s. The NWA1121- NI uses WMM QoS t o priorit ize t raffic st ream s according t o t he I EEE 802.1q or DSCP inform at ion in each packet ’s header. The NWA1121- NI aut om at ically det erm ines t he priorit y t o use for an individual t raffic st ream . This prevent s reduct ions in dat a t ransm ission for applicat ions t hat are sensit ive t o lat ency and j it t er ( variat ions in delay) . 6.9.2.1 WMM QoS Priorities The following t able describes t he WMM QoS priorit y levels t hat t he NWA1121- NI uses. Table 26 WMM QoS Priorit ies Priorit y Level descript ion voice Typically used for t raffic t hat is especially sensit ive t o j it t er. Use t his priorit y t o reduce lat ency for im proved voice qualit y. ( WMM_VOI CE) video ( WMM_VI DEO) best effort ( WMM_BESTEFFORT) background ( WMM_BACKGROUND) 92 Typically used for t raffic which has som e t olerance for j it t er but needs t o be priorit ized over ot her dat a t raffic. Typically used for t raffic from applicat ions or devices t hat lack QoS capabilit ies. Use best effort priorit y for t raffic t hat is less sensit ive t o lat ency, but is affect ed by long delays, such as I nt ernet surfing. This is t ypically used for non- crit ical t raffic such as bulk t ransfers and print j obs t hat are allowed but t hat should not affect ot her applicat ions and users. Use background priorit y for applicat ions t hat do not have st rict lat ency and t hroughput requirem ent s. NWA1121-NI User’s Guide Chapter 6 Wireless LAN 6.9.3 Security Mode Guideline The following is a general guideline in choosing t he securit y m ode for your NWA1121- NI . • Use WPA( 2) - PSK if you have WPA( 2) - aware wireless client s but no RADI US server. • Use WPA( 2) securit y if you have WPA( 2) - aware wireless client s and a RADI US server. WPA has user aut hent icat ion and im proved dat a encrypt ion over WEP. • Use WPA( 2) - PSK if you have WPA( 2) - aware wireless client s but no RADI US server. • I f you don’t have WPA( 2) - aware wireless client s, t hen use WEP key encrypt ing. A higher bit key offers bet t er securit y. You can m anually ent er 64- bit or 128- bit WEP keys. More inform at ion on Wireless Securit y can be found in Appendix D on page 181. NWA1121-NI User’s Guide 93 C HAPT ER LAN 7.1 Overview This chapt er describes how you can configure t he I P address of your NWA1121- NI . The I nt ernet Prot ocol ( I P) address ident ifies a device on a net work. Every net working device ( including com put ers, servers, rout ers, print ers, et c.) needs an I P address t o com m unicat e across t he net work. These net working devices are also known as host s. Figure 42 I Pv4 Set up The figure above illust rat es one possible set up of your NWA1121- NI . The gat eway I Pv4 address is 192.168.1.1 and t he I Pv4 address of t he NWA1121- NI is 192.168.1.2 ( default ) . The gat eway and t he device m ust belong in t he sam e subnet m ask t o be able t o com m unicat e wit h each ot her. 7.2 What You Can Do in this Chapter Use t he LAN I P screen t o configure t he I P address of your NWA1121- NI ( see Sect ion 7.4 on page 96) . 7.3 What You Need to Know The Et hernet param et ers of t he NWA1121- NI are preset in t he fact ory wit h t he following values: I P address of 192.168.1.2 Subnet m ask of 255.255.255.0 ( 24 bit s) NWA1121-NI User’s Guide 94 Chapter 7 LAN IPv6 I Pv6 ( I nt ernet Prot ocol version 6) , is designed t o enhance I P address size and feat ures. The increase in I Pv6 address size t o 128 bit s ( from t he 32- bit I Pv4 address) allows up t o 3.4 x 10 38 I P addresses. IPv6 Addressing The 128- bit I Pv6 address is writ t en as eight 16- bit hexadecim al blocks separat ed by colons ( : ) . This is an exam ple I Pv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000. I Pv6 addresses can be abbreviat ed in t wo ways: • Leading zeros in a block can be om it t ed. So 2001:0db8:1a2b:0015:0000:0000:1a2f:0000 can be writ t en as 2001:db8:1a2b:15:0:0:1a2f:0. • Any num ber of consecut ive blocks of zeros can be replaced by a double colon. A double colon can only appear once in an I Pv6 address. So 2001:0db8:0000:0000:1a2f:0000:0000:0015 can be writ t en as 2001:0db8::1a2f:0000:0000:0015, 2001:0db8:0000:0000:1a2f::0015, 2001:db8::1a2f:0:0:15 or 2001:db8:0:0:1a2f::15. Prefix and Prefix Length Sim ilar t o an I Pv4 subnet m ask, I Pv6 uses an address prefix t o represent t he net work address. An I Pv6 prefix lengt h specifies how m any m ost significant bit s ( st art from t he left ) in t he address com pose t he net work address. The prefix lengt h is writ t en as “ / x” where x is a num ber. For exam ple, 2001:db8:1a2b:15::1a2f:0/32 m eans t hat t he first 32 bit s ( 2001:db8) is t he subnet prefix. Link-local Address A link- local address uniquely ident ifies a device on t he local net work ( t he LAN) . I t is sim ilar t o a “ privat e I P address” in I Pv4. You can have t he sam e link- local address on m ult iple int erfaces on a device. A link- local unicast address has a predefined prefix of fe80: : / 10. The link- local unicast address form at is as follows. Table 27 Link- local Unicast Address Form at 1111 1110 10 I nt erface I D 10 bit s 54 bit s 64 bit s Global Address A global address uniquely ident ifies a device on t he I nt ernet . I t is sim ilar t o a “ public I P address” in I Pv4. A global unicast address st art s wit h a 2 or 3. NWA1121-NI User’s Guide 95 Chapter 7 LAN 7.4 LAN IP Screen Use t his screen t o configure t he I P address for your NWA1121- NI . Click N e t w or k > LAN t o display t he following screen. Figure 43 LAN I P The following t able describes t he labels in t his screen. Table 28 LAN I P LABEL DESCRIPTION I Pv4 Address Assignm ent Obt ain I P Address Aut om at ically Select t his opt ion if your NWA1121- NI is using a dynam ically assigned I Pv4 address from a DHCP server each t im e. Note: You must know the IP address assigned to the NWA1121-NI (by the DHCP server) to access the NWA1121-NI again. Use Fixed I P Address I P Address Select t his opt ion if your NWA1121- NI is using a st at ic I Pv4 address. When you select t his opt ion, fill in t he fields below. Ent er t he I P address of your NWA1121- NI in dot t ed decim al not at ion. Note: If you change the NWA1121-NI's IP address, you must use the new IP address if you want to access the web configurator again. 96 Subnet Mask Type t he subnet m ask. Gat eway I P Address Type t he I Pv4 address of t he gat eway. The gat eway is an im m ediat e neighbor of your NWA1121- NI t hat will forward t he packet t o t he dest inat ion. On t he LAN, t he gat eway m ust be a rout er on t he sam e segm ent as your NWA1121- NI ; over t he WAN, t he gat eway m ust be t he I P address of one of t he rem ot e nodes. NWA1121-NI User’s Guide Chapter 7 LAN Table 28 LAN I P ( cont inued) LABEL DESCRIPTION I Pv6 Address Assignm ent Enable St at eful Address Aut oconfigurat ion Select t his t o t urn on I Pv6 st at eful aut oconfigurat ion t o have t he NWA1121- NI obt ain an I Pv6 global address from a DHCPv6 server in your net work. I Pv6 Address/ Prefix Lengt h Ent er your I Pv6 address and prefix m anually. Syst em DNS Servers Prim ary DNS Server Ent er t he I Pv4 address of t he first DNS ( Dom ain Nam e Service) server, if provided. Secondary DNS Server Ent er t he I Pv4 address of t he second DNS ( Dom ain Nam e Service) server address, if provided. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide 97 C HAPT ER VLAN 8.1 Overview This chapt er discusses how t o configure t he NWA1121- NI ’s VLAN set t ings. Figure 44 Managem ent VLAN Set up I n t he figure above, t o access and m anage t he NWA1121- NI from com put er A, t he NWA1121- NI and swit ch B’s port s t o which com put er A and t he NWA1121- NI are connect ed should be in t he sam e VLAN. 8.1.1 What You Can Do in This Chapter The VLAN screens let you set up t he NWA1121- NI ’s m angem ent VLAN ( Sect ion 8.3 on page 99) . 8.2 What You Need to Know Introduction to VLANs A Virt ual Local Area Net work ( VLAN) allows a physical net work t o be part it ioned int o m ult iple logical net works. Devices on a logical net work belong t o one group. A device can belong t o m ore t han one group. Wit h VLAN, a device cannot direct ly t alk t o or hear from devices t hat are not in t he sam e group( s) ; t he t raffic m ust first go t hrough a rout er. I n Mult i-Tenant Unit ( MTU) applicat ions, VLAN is vit al in providing isolat ion and securit y am ong t he subscribers. When properly configured, VLAN prevent s one subscriber from accessing t he net work resources of anot her on t he sam e LAN, t hus a user will not see t he print ers and hard disks of anot her user in t he sam e building. NWA1121-NI User’s Guide 98 Chapter 8 VLAN VLAN also increases net work perform ance by lim it ing broadcast s t o a sm aller and m ore m anageable logical broadcast dom ain. I n t radit ional swit ched environm ent s, all broadcast packet s go t o each and every individual port . Wit h VLAN, all broadcast s are confined t o a specific broadcast dom ain. IEEE 802.1Q Tag The I EEE 802.1Q st andard defines an explicit VLAN t ag in t he MAC header t o ident ify t he VLAN m em bership of a fram e across bridges. A VLAN t ag includes t he 12- bit VLAN I D and 3- bit user priorit y. The VLAN I D associat es a fram e wit h a specific VLAN and provides t he inform at ion t hat devices need t o process t he fram e across t he net work. 8.3 VLAN Screen Use t his screen t o set up t he VLAN for m anaging t he NWA1121- NI . Click N e t w or k > VLAN t o display t he screen as shown. Figure 45 Net work > VLAN The following t able describes t he labels in t his screen. Figure 46 Net work > VLAN LABEL DESCRI PTI ON 802.1Q VLAN Select t his t o enable VLAN t agging on t he NWA1121- NI . Managem ent VLAN Select t his t o enable VLAN m anagem ent . Only t raffic t agged wit h t he m anagem ent VLAN I D can access t he NWA1121- NI . At least one device in your net work m ust belong t o t he VLAN specified below in order t o m anage t he NWA1121- NI . Managem ent VLAN I D Ent er a num ber from 1 t o 4094 t o define t he NWA1121- NI ’s m anagem ent VLAN group. Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide 99 Chapter 8 VLAN 100 NWA1121-NI User’s Guide C HAPT ER System 9.1 Overview This chapt er shows you how t o enable rem ot e m anagem ent of your NWA1121- NI . I t provides inform at ion on det erm ining which services or prot ocols can access which of t he NWA1121- NI ’s int erfaces. Rem ot e Managem ent allows a user t o adm inist rat e t he device over t he net work. You can m anage your NWA1121- NI from a rem ot e locat ion via t he following int erfaces: • WLAN • LAN • Bot h WLAN and LAN • Neit her ( Disable) Figure 47 Rem ot e Managem ent Exam ple I n t he figure above, t he NWA1121- NI ( A) is being m anaged by a deskt op com put er ( B) connect ed via LAN ( Land Area Net work) . I t is also being accessed by a not ebook ( C) connect ed via WLAN ( Wireless LAN) . 9.2 What You Can Do in this Chapter • Use t he W W W screen t o configure t hrough which int erface( s) and from which I P address( es) you can use t he Web Browser t o m anage t he NWA1121- NI ( see Sect ion 9.4 on page 104) . • Use t he Ce r t ifica t e s screen t o delet e and im port cert ificat es ( seen Sect ion 9.5 on page 105) . NWA1121-NI User’s Guide 101 Chapter 9 System • Use t he Te lne t screen t o configure t hrough which int erface( s) and from which I P address( es) you can use Telnet t o m anage t he NWA1121- NI . A Telnet connect ion is priorit ized by t he NWA1121- NI over ot her rem ot e m anagem ent sessions ( see Sect ion 9.6 on page 106) . • Use t he SN M P screen t o configure t hrough which int erface( s) and from which I P address( es) a net work syst em s m anager can access t he NWA1121- NI ( see Sect ion 9.7 on page 107) . • Use t he FTP screen t o configure t hrough which int erface( s) and from which I P address( es) you can use File Transfer Prot ocol ( FTP) t o m anage t he NWA1121- NI . You can use FTP t o upload t he lat est firm ware for exam ple ( see Sect ion 9.8 on page 110) . 9.3 What You Need To Know WWW The World Wide Web allows you t o access files host ed in a rem ot e server. For exam ple, you can view t ext files ( usually referred t o as ‘pages’) using your web browser via HyperText Transfer Prot ocol ( HTTP) . Telnet Telnet is short for Telecom m unicat ions Net work, which is a client- side prot ocol t hat enables you t o access a device over t he net work. FTP File Transfer Prot ocol ( FTP) allows you t o upload or download a file or several files t o and from a rem ot e locat ion using a client or t he com m and console. SNMP Sim ple Net work Managem ent Prot ocol ( SNMP) is a m em ber of t he TCP/ I P prot ocol suit e used for exchanging m anagem ent inform at ion bet ween net work devices. Your NWA1121- NI support s SNMP agent funct ionalit y, which allows a m anager st at ion t o m anage and m onit or t he NWA1121- NI t hrough t he net work. The NWA1121- NI support s SNMP version one ( SNMPv1) , version t wo ( SNMPv2c) and version t hree ( SNMPv3) . 102 NWA1121-NI User’s Guide Chapter 9 System The next figure illust rat es an SNMP m anagem ent operat ion. Figure 48 SNMP Managem ent Mode An SNMP m anaged net work consist s of t wo m ain t ypes of com ponent : agent s and a m anager. An agent is a m anagem ent soft ware m odule t hat resides in a m anaged device ( t he NWA1121- NI ) . An agent t ranslat es t he local m anagem ent inform at ion from t he m anaged device int o a form com pat ible wit h SNMP. The m anager is t he console t hrough which net work adm inist rat ors perform net work m anagem ent funct ions. I t execut es applicat ions t hat cont rol and m onit or m anaged devices. SNMP allows a m anager and agent s t o com m unicat e for t he purpose of accessing inform at ion such as packet s received, node port st at us, et c. SNMP v3 and Security SNMP v3 enhances securit y for SNMP m anagem ent . SNMP m anagers can be required t o aut hent icat e wit h agent s before conduct ing SNMP m anagem ent sessions. Securit y can be furt her enhanced by encrypt ing t he SNMP m essages sent from t he m anagers. Encrypt ion prot ect s t he cont ent s of t he SNMP m essages. When t he cont ent s of t he SNMP m essages are encrypt ed, only t he int ended recipient s can read t hem . Remote Management Limitations Rem ot e m anagem ent over LAN or WLAN will not work when: • You have disabled t hat service in one of t he rem ot e m anagem ent screens. • The I P address in t he Se cu r e d Clie n t I P Addr e ss field does not m at ch t he client I P address. I f it does not m at ch, t he NWA1121- NI will disconnect t he session im m ediat ely. NWA1121-NI User’s Guide 103 Chapter 9 System • You m ay only aut om at ically m anagem ent m anagem ent Telnet HTTP have one rem ot e m anagem ent session running at one t im e. The NWA1121- NI disconnect s a rem ot e m anagem ent session of lower priorit y when anot her rem ot e session of higher priorit y st art s. The priorit ies for t he different t ypes of rem ot e sessions are as follows: System Timeout There is a default syst em m anagem ent idle t im eout of five m inut es ( t hree hundred seconds) . The NWA1121- NI aut om at ically logs you out if t he m anagem ent session rem ains idle for longer t han t his t im eout period. The m anagem ent session does not t im e out when a st at ist ics screen is polling. You can change t he t im eout period in t he SYSTEM screen. Certificate A cert ificat e cont ains t he cert ificat e owner ’s ident it y and public key. Cert ificat es provide a way t o exchange public keys for use in aut hent icat ion. Figure 49 Cert ificat es Exam ple I n t he figure above, t he NWA1121- NI ( Z) checks t he ident it y of t he not ebook ( A) using a cert ificat e before grant ing access t o t he net work. The cert ificat ion aut horit y cert ificat e t hat you can im port t o your NWA1121- NI should be in PFX PKCS# 12 file form at . This form at referred t o as t he Personal I nform at ion Exchange Synt ax St andard is com prised of a privat e key- public cert ificat e pair t hat is furt her encrypt ed wit h a password. Before you im port a cert ificat e int o t he NWA1121- NI , you should verify t hat you have t he correct cert ificat e. Key dist ribut ion is sim ple and very secure since you can freely dist ribut e public keys and you never need t o t ransm it privat e keys. 9.4 WWW Screen Use t his screen t o configure your NWA1121- NI via t he World Wide Web ( W W W ) using a Web browser. This let s you specify which I P addresses or com put ers are able t o com m unicat e wit h and access t he NWA1121- NI . 104 NWA1121-NI User’s Guide Chapter 9 System To change your NWA1121- NI ’s W W W set t ings, click Syst e m > W W W. The following screen shows. Figure 50 Syst em > WWW The following t able describes t he labels in t his screen. Table 29 Syst em > WWW LABEL DESCRIPTION WWW HTTP Port You m ay change t he server port num ber for a service if needed, however you m ust use t he sam e port num ber in order t o use t hat service for rem ot e m anagem ent . HTTPS Port The HTTPS proxy server list ens on port 443 by default . I f you change t he HTTPS proxy server port t o a different num ber on t he NWA1121- NI , for exam ple 8443, t hen you m ust not ify people who need t o access t he NWA1121- NI web configurat or t o use “ ht t ps: / / NWA1121- NI I P Address: 8443” as t he URL. Server Access Select t he int erface( s) t hrough which a com put er m ay access t he NWA1121- NI using t his service. Secured Client I P Address A secured client is a “ t rust ed” com put er t hat is allowed t o com m unicat e w it h t he NWA1121- NI using t his service. Select All t o allow any com put er t o access t he NWA1121- NI using t his service. Choose Se le ct e d t o j ust allow t he com put er wit h t he I P address t hat you specify t o access t he NWA1121- NI using t his service. Secured Client MAC Address Select All t o allow any com put er t o access t he NWA1121- NI using t his service. Apply Click Apply t o save your cust om ized set t ings. Cancel Click Ca nce l t o begin configuring t his screen afresh. Choose Se le ct e d t o j ust allow t he com put er wit h t he MAC address t hat you specify t o access t he NWA1121- NI using t his service. 9.5 Certificates Screen Use t his screen t o delet e or im port cert ificat es. NWA1121-NI User’s Guide 105 Chapter 9 System Click Syst e m > Ce r t ifica t e s. The following screen shows. Figure 51 Syst em > Cert ificat es The following t able describes t he labels in t his screen. Table 30 Syst em > Cert ificat es LABEL DESCRIPTION I m port Cert ificat e I m port Cert ificat e Ent er t he locat ion of a previously- saved cert ificat e t o upload t o t he NWA1121- NI . Alt ernat ively, click t he Br ow se but t on t o locat e a list . Browse Click t his but t on t o locat e a previously- saved cert ificat e t o upload t o t he NWA1121- NI . I m port Click t his but t on t o upload t he previously- saved cert ificat e displayed in t he I m por t Ce r t ifica t e field t o t he NWA1121- NI . Delet e Cert ificat e You can delet e a cert ificat e Select t he cert ificat e from t he list t hat you want t o delet e. Delet e Click t his t o delet e t he select ed cert ificat e. 9.6 Telnet Screen Use t his screen t o configure your NWA1121- NI for rem ot e Telnet access. You can use Telnet t o access t he NWA1121- NI ’s Com m and Line I nt erface ( CLI ) . Click Syst e m > Te lne t . The following screen displays. Figure 52 Syst em > Telnet 106 NWA1121-NI User’s Guide Chapter 9 System The following t able describes t he labels in t his screen. Table 31 Syst em > Telnet LABEL DESCRIPTION TELNET Port You can change t he server port num ber for a service if needed, however you m ust use t he sam e port num ber in order t o use t hat service for rem ot e m anagem ent . Server Access Select t he int erface( s) t hrough which a com put er m ay access t he NWA1121- NI using Telnet . Secured Client I P Address A secured client is a “ t rust ed” com put er t hat is allowed t o com m unicat e wit h t he NWA1121- NI using t his service. Select All t o allow any com put er t o access t he NWA1121- NI using t his service. Choose Se le ct e d t o j ust allow t he com put er wit h t he I P address t hat you specify t o access t he NWA1121- NI using t his service. Secured Client MAC Address Select All t o allow any com put er t o access t he NWA1121- NI using t his service. Apply Click Apply t o save your cust om ized set t ings. Cancel Click Ca n ce l t o begin configuring t his screen afresh. Choose Se le ct e d t o j ust allow t he com put er wit h t he MAC address t hat you specify t o access t he NWA1121- NI using t his service. 9.7 SNMP Screen Use t his screen t o have a m anager st at ion adm inist rat e your NWA1121- NI over t he net work and configure SNMP account s on t he SNMP v3 m anager. An SNMP adm inist rat or/ user is an SNMP NWA1121-NI User’s Guide 107 Chapter 9 System m anager. To change your NWA1121- NI ’s SNMP set t ings, click Syst e m > SN M P. The following screen displays. Figure 53 Syst em > SNMP The following t able describes t he labels in t his screen. Table 32 Syst em > SNMP LABEL DESCRIPTION SNMP Port 108 You can change t he server port num ber for a service if needed, however you m ust use t he sam e port num ber in order t o use t hat service for rem ot e m anagem ent . NWA1121-NI User’s Guide Chapter 9 System Table 32 Syst em > SNMP ( cont inued) LABEL DESCRIPTION Server Access Select t he int erface( s) t hrough which a com put er m ay access t he NWA1121- NI using Telnet . Secured Client I P Address A secured client is a “ t rust ed” com put er t hat is allowed t o com m unicat e wit h t he NWA1121- NI using t his service. Select All t o allow any com put er t o access t he NWA1121- NI using t his service. Choose Se le ct e d t o j ust allow t he com put er wit h t he I P address t hat you specify t o access t he NWA1121- NI using t his service. Secured Client MAC Address Select All t o allow any com put er t o access t he NWA1121- NI using t his service. Choose Se le ct e d t o j ust allow t he com put er wit h t he MAC address t hat you specify t o access t he NWA1121- NI using t his service. SNMP Configurat ion Prot ocol Version Select t he SNMP version for t he NWA1121- NI , which you allow t he SNMP m anager t o use t o access t he NWA1121- NI . The SNMP version on t he NWA1121- NI m ust m at ch t he version on t he SNMP m anager. Note: SNMP version 2c is backwards compatible with SNMP version 1. Get Com m unit y Ent er t he Ge t Com m u n it y, which is t he password for t he incom ing Get and Get Next request s from t he m anagem ent st at ion. Set Com m unit y Ent er t he Se t com m u n it y, which is t he password for incom ing Set request s from t he m anagem ent st at ion. Trap Com m unit y Type t he t rap com m unit y, which is t he password sent wit h each t rap t o t he SNMP m anager. Trap Dest inat ion Type t he I P address of t he st at ion t o send your SNMP t raps t o. SNMPv3 Adm in Set t ings SNMPv3 Adm in Select t he check box t o enable t he SNMP adm inist rat or account for aut hent icat ion wit h SNMP m anagers using SNMP v3. User Nam e Specify t he user nam e of t he SNMP adm inist rat or account . Password Ent er t he password for SNMP adm inist rat or aut hent icat ion. Confirm Password Ret ype t he password for confirm at ion. Access Type Specify t he SNMP adm inist rat or ’s access right s t o MI Bs. Re a d/ W r it e - The SNMP adm inist rat or has read and writ e right s, m eaning t hat t he user can creat e and edit t he MI Bs on t he NWA1121- NI . Re a d Only - The SNMP adm inist rat or has read right s only, m eaning t he user can collect inform at ion from t he NWA1121- NI . Aut hent icat ion Prot ocol Select an aut hent icat ion algorit hm used for SNMP com m unicat ion wit h t he SNMP adm inist rat or. M D 5 ( Message Digest 5) and SH A ( Secure Hash Algorit hm ) are hash algorit hm s used t o aut hent icat e SNMP dat a. SH A aut hent icat ion is generally considered st ronger t han M D 5 , but is slower. Privacy Prot ocol Specify t he encrypt ion m et hod used for SNMP com m unicat ion wit h t he SNMP adm inist rat or. D ES - Dat a Encrypt ion St andard is a widely used ( but breakable) m et hod of dat a encrypt ion. I t applies a 56- bit key t o each 64- bit block of dat a. AES - Advanced Encrypt ion St andard is anot her m et hod for dat a encrypt ion t hat also uses a secret key. AES applies a 128- bit key t o 128- bit blocks of dat a. NWA1121-NI User’s Guide 109 Chapter 9 System Table 32 Syst em > SNMP ( cont inued) LABEL DESCRIPTION SNMPv3 User Set t ings SNMPv3 User Select t he check box t o enable t he SNMP user account for aut hent icat ion wit h SNMP m anagers using SNMP v3. User Nam e Specify t he user nam e of t he SNMP user account . Password Ent er t he password for SNMP user aut hent icat ion. Confirm Password Ret ype t he password for confirm at ion. Access Type Specify t he SNMP user ’s access right s t o MI Bs. Re a d On ly - The SNMP user has read right s only, m eaning t he user can collect inform at ion from t he NWA1121- NI . Re a d/ W r it e - The SNMP user has read and writ e right s, m eaning t hat t he user can creat e and edit t he MI Bs on t he NWA1121- NI . Aut hent icat ion Prot ocol Privacy Prot ocol Select an aut hent icat ion algorit hm used for SNMP com m unicat ion wit h t he SNMP user. M D 5 ( Message Digest 5) and SH A ( Secure Hash Algorit hm ) are hash algorit hm s used t o aut hent icat e SNMP dat a. SH A aut hent icat ion is generally considered st ronger t han M D 5 , but is slower. Specify t he encrypt ion m et hod used for SNMP com m unicat ion wit h t he SNMP user. D ES - Dat a Encrypt ion St andard is a widely used ( but breakable) m et hod of dat a encrypt ion. I t applies a 56- bit key t o each 64- bit block of dat a. AES - Advanced Encrypt ion St andard is anot her m et hod for dat a encrypt ion t hat also uses a secret key. AES applies a 128- bit key t o 128- bit blocks of dat a. Apply Click Apply t o save your cust om ized set t ings. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 9.8 FTP Screen Use t his screen t o upload and download t he NWA1121- NI ’s firm ware using FTP. To use t his feat ure, your com put er m ust have an FTP client . To change your NWA1121- NI ’s FTP set t ings, click Syst e m > FTP. The following screen displays. Figure 54 Syst em > FTP 110 NWA1121-NI User’s Guide Chapter 9 System The following t able describes t he labels in t his screen. Table 33 Syst em > FTP LABEL DESCRIPTION FTP Port You m ay change t he server port num ber for a service if needed, however you m ust use t he sam e port num ber in order t o use t hat service for rem ot e m anagem ent . Server Access Select t he int erface( s) t hrough which a com put er m ay access t he NWA1121- NI using t his service. Secured Client I P Address A secured client is a “ t rust ed” com put er t hat is allowed t o com m unicat e wit h t he NWA1121- NI using t his service. Select All t o allow any com put er t o access t he NWA1121- NI using t his service. Choose Se le ct e d t o j ust allow t he com put er wit h t he I P address t hat you specify t o access t he NWA1121- NI using t his service. Secured Client MAC Address Select All t o allow any com put er t o access t he NWA1121- NI using t his service. Choose Se le ct e d t o j ust allow t he com put er wit h t he MAC address t hat you specify t o access t he NWA1121- NI e using t his service. Apply Click Apply t o save your cust om ized set t ings. Cancel Click Ca n ce l t o begin configuring t his screen afresh. 9.9 Technical Reference This sect ion provides som e t echnical background inform at ion about t he t opics covered in t his chapt er. 9.9.1 MIB Managed devices in an SMNP m anaged net work cont ain obj ect variables or m anaged obj ect s t hat define each piece of inform at ion t o be collect ed about a device. Exam ples of variables include such as num ber of packet s received, node port st at us et c. A Managem ent I nform at ion Base ( MI B) is a collect ion of m anaged obj ect s.SNMP it self is a sim ple request / response prot ocol based on t he m anager/ agent m odel. The m anager issues a request and t he agent ret urns responses using t he following prot ocol operat ions: • Get - Allows t he m anager t o ret rieve an obj ect variable from t he agent . • Get Next - Allows t he m anager t o ret rieve t he next obj ect variable from a t able or list wit hin an agent . I n SNMPv1, when a m anager want s t o ret rieve all elem ent s of a t able from an agent , it init iat es a Get operat ion, followed by a series of Get Next operat ions. • Set - Allows t he m anager t o set values for obj ect variables wit hin an agent . • Trap - Used by t he agent t o inform t he m anager of som e event s. 9.9.2 Supported MIBs The NWA1121- NI support s MI B I I t hat is defined in RFC- 1213 and RFC- 1215 as well as t he propriet ary ZyXEL privat e MI B. The purpose of t he MI Bs is t o let adm inist rat ors collect st at ist ical dat a and m onit or st at us and perform ance. NWA1121-NI User’s Guide 111 Chapter 9 System 9.9.3 SNMP Traps SNMP t raps are m essages sent by t he agent s of each m anaged device t o t he SNMP m anager. These m essages inform t he adm inist rat or of event s in dat a net works handled by t he device. The NWA1121- NI can send t he following t raps t o t he SNMP m anager. Table 34 SNMP Traps OBJECT IDENTIFIER # (OID) TRAP NAME DESCRIPTION Generic Traps coldSt art 1.3.6.1.6.3.1.1.5.1 This t rap is sent aft er boot ing ( power on) . This t rap is defined in RFC- 1215. warm St art 1.3.6.1.6.3.1.1.5.2 This t rap is sent aft er boot ing ( soft ware reboot ) . This t rap is defined in RFC- 1215. linkDown 1.3.6.1.6.3.1.1.5.3 This t rap is sent when t he Et hernet link is down. linkUp 1.3.6.1.6.3.1.1.5.4 This t rap is sent when t he Et hernet link is up. aut hent icat ionFailure ( defined in RFC- 1215) 1.3.6.1.6.3.1.1.5.5 The device sends t his t rap when it receives any SNMP get or set requirem ent s wit h t he wrong com m unit y ( password) . Not e: snm pEnableAut henTraps, OI D 1.3.6.1.2.1.11.30 ( defined in RFC 1214 and RFC 1907) m ust be enabled on in order for t he device t o send aut hent icat ionFailure t raps. Use a MI B browser t o enable or disable snm pEnableAut henTraps. Traps defined in t he ZyXEL Privat e MI B. w hyReboot 1.3.6.1.4.1.890.1.5.13.0. This t rap is sent wit h t he reason for rest art ing before t he syst em reboot s ( warm st art ) . " Syst em reboot by user! " is added for an int ent ional reboot ( for exam ple, download new files, CI com m and " sys reboot " ) . I f t he syst em reboot s because of fat al errors, a code for t he error is list ed. pwTFTPSt at us 1.3.6.1.4.1.890.1.9.2.3.3 .1 This t rap is sent t o indicat e t he st at us and result of a TFTP client session t hat has ended. Som e t raps include an SNMP int erface index. The following t able m aps t he SNMP int erface indexes t o t he NWA1121- NI ’s physical and virt ual port s. Table 35 SNMP I nt erface I ndex t o Physical and Virt ual Port Mapping TYPE INTERFACE PORT Physical enet 0 Wireless LAN adapt or WLAN1 enet 1 Et hernet port ( LAN) enet 2 Wireless LAN adapt or WLAN2 enet 3 ~ enet 9 WLAN1 in MBSSI D m ode enet 10 ~ enet 16 WLAN2 in MBSSI D m ode enet 17 ~ enet 21 WLAN1 in WDS m ode enet 22 ~ enet 26 WLAN2 in WDS m ode Virt ual 112 NWA1121-NI User’s Guide Chapter 9 System 9.9.4 Private-Public Certificates When using public- key crypt ology for aut hent icat ion, each host has t wo keys. One key is public and can be m ade openly available. The ot her key is privat e and m ust be kept secure. These keys work like a handwrit t en signat ure ( in fact, cert ificat es are oft en referred t o as “ digit al signat ures” ) . Only you can writ e your signat ure exact ly as it should look. When people know what your signat ure looks like, t hey can verify whet her som et hing was signed by you, or by som eone else. I n t he sam e way, your privat e key “ writ es” your digit al signat ure and your public key allows people t o verify whet her dat a was signed by you, or by som eone else. This process works as follows. Tim want s t o send a m essage t o Jenny. He needs her t o be sure t hat it com es from him , and t hat t he m essage cont ent has not been alt ered by anyone else along t he way. Tim generat es a public key pair ( one public key and one privat e key) . Tim keeps t he privat e key and m akes t he public key openly available. This m eans t hat anyone who receives a m essage seem ing t o com e from Tim can read it and verify whet her it is really from him or not . Tim uses his privat e key t o sign t he m essage and sends it t o Jenny. Jenny receives t he m essage and uses Tim ’s public key t o verify it . Jenny knows t hat t he m essage is from Tim , and t hat alt hough ot her people m ay have been able t o read t he m essage, no- one can have alt ered it ( because t hey cannot re- sign t he m essage wit h Tim ’s privat e key) . Addit ionally, Jenny uses her own privat e key t o sign a m essage and Tim uses Jenny’s public key t o verify t he m essage. 9.9.5 Certification Authorities A Cert ificat ion Aut horit y ( CA) issues cert ificat es and guarant ees t he ident it y of each cert ificat e owner. There are com m ercial cert ificat ion aut horit ies like CyberTrust or VeriSign and governm ent cert ificat ion aut horit ies. You can use t he NWA1121- NI t o generat e cert ificat ion request s t hat cont ain ident ifying inform at ion and public keys and t hen send t he cert ificat ion request s t o a cert ificat ion aut horit y. 9.9.6 Checking the Fingerprint of a Certificate on Your Computer A cert ificat e’s fingerprint s are m essage digest s calculat ed using t he MD5 or SHA1 algorit hm s. The following procedure describes how t o check a cert ificat e’s fingerprint t o verify t hat you have t he act ual cert ificat e. Browse t o where you have t he cert ificat e saved on your com put er. Make sure t hat t he cert ificat e has a “ .cer ” or “ .crt ” file nam e ext ension. Figure 55 Cert ificat es on Your Com put er NWA1121-NI User’s Guide 113 Chapter 9 System Double- click t he cert ificat e’s icon t o open t he Ce r t ifica t e window. Click t he D e t a ils t ab and scroll down t o t he Thum bpr int Algor it hm and Th um bpr int fields. Figure 56 Cert ificat e Det ails 114 Use a secure m et hod t o verify t hat t he cert ificat e owner has t he sam e inform at ion in t he Th um bpr in t Algor it h m and Th u m bpr in t fields. The secure m et hod m ay vary according t o your sit uat ion. Possible exam ples would be over t he t elephone or t hrough an HTTPS connect ion. NWA1121-NI User’s Guide C HAPTER 10 Log Settings 10.1 Overview This chapt er provides inform at ion on viewing and generat ing logs on your NWA1121- NI . Logs are files t hat cont ain recorded net work act ivit y over a set period. They are used by adm inist rat ors t o m onit or t he healt h of t he syst em ( s) t hey are m anaging. Logs enable adm inist rat ors t o effect ively m onit or event s, errors, progress, et c. so t hat when net work problem s or syst em failures occur, t he cause or origin can be t raced. Logs are also essent ial for audit ing and keeping t rack of changes m ade by users. Figure 57 Accessing Logs in t he Net work The figure above illust rat es t hree ways t o access logs. The user ( U) can access logs direct ly from t he NWA1121- NI ( A) via t he Web configurat or. Logs can also be locat ed in an ext ernal log server ( B) . An em ail server ( C) can also send harvest ed logs t o t he user ’s em ail account . 10.2 What You Can Do in this Chapter Use t he Log Se t t ings screen t o configure where and when t he NWA1121- NI will send t he logs, and which logs and/ or im m ediat e alert s it will send ( Sect ion 10.4 on page 116) . Use t he M onit or > Logs screen t o display all logs or logs for a cert ain cat egory. NWA1121-NI User’s Guide 115 Chapter 10 Log Settings 10.3 What You Need To Know Alerts and Logs An alert is a t ype of log t hat warrant s m ore serious at t ent ion. Som e cat egories such as Syst e m Er r or consist of bot h logs and alert s. You can different iat e t hem by t heir color in t he M onit or > Logs screen. Alert s are displayed in red and logs are displayed in black. Receiving Logs via E-mail I f you want t o receive logs in your e- m ail account , you need t o have t he necessary det ails ready, such as t he Server Nam e or Sim ple Mail Transfer Prot ocol ( SMTP) Address of your e- m ail account . Ensure t hat you have a valid e- m ail address. Enabling Syslog Logging To enable Syslog Logging, obt ain your Syslog server ’s I P address ( or server nam e) . 10.4 Log Settings Screen Use t his screen t o configure t o where and when t he NWA1121- NI is t o send t he logs and which logs and/ or im m ediat e alert s it is t o send. 116 NWA1121-NI User’s Guide Chapter 10 Log Settings To change your NWA1121- NI ’s log set t ings, click Configu r a t ion > Log Se t t in gs. The screen appears as shown. Figure 58 Log Set t ings The following t able describes t he labels in t his screen. Table 36 Log Set t ings LABEL DESCRIPTION E- m ail Log Set t ings Mail Server Ent er t he server nam e or t he I P address of t he m ail server for t he e- m ail addresses specified below. I f t his field is left blank, logs and alert m essages will not be sent via e- m ail. Mail Subj ect Type a t it le t hat you want t o be in t he subj ect line of t he log e- m ail m essage t hat t he NWA1121- NI sends. Send Log t o Logs are sent t o t he e- m ail address specified in t his field. I f t his field is left blank, logs will not be sent via e- m ail. NWA1121-NI User’s Guide 117 Chapter 10 Log Settings Table 36 Log Set t ings ( cont inued) LABEL DESCRIPTION SMTP Aut hent icat ion SMTP ( Sim ple Mail Transfer Prot ocol) is t he m essage- exchange st andard for t he I nt ernet . Select t he check box t o act ivat e SMTP aut hent icat ion. I f m ail server aut hent icat ion is needed but t his feat ure is disabled, you will not receive t he e- m ail logs. I f you use SMTP aut hent icat ion, t he m ail receiver should be t he owner of t he SMTP account . User Nam e I f your e- m ail account requires SMTP aut hent icat ion, ent er t he usernam e here. Password Ent er t he password associat ed wit h t he above usernam e. Syslog Logging Syslog logging sends a log t o an ext ernal syslog server used t o st ore logs. Syslog Logging Select t he check box t o enable syslog logging. Syslog Server I P Address Ent er t he I P address of t he syslog server t hat will log t he select ed cat egories of logs. Syslog Port Num ber Ent er t he port num ber of t he syslog server t hat will log t he select ed cat egories of logs. Send Log Log Schedule This drop- down m enu is used t o configure t he frequency of log m essages being sent as E- m ail: • • • • • When Log is Full Hourly Daily Weekly None. I f t he W e e k ly or t he D a ily opt ion is select ed, specify a t im e of day when t he E- m ail should be sent . I f t he W e e k ly opt ion is select ed, t hen also specify which day of t he week t he E- m ail should be sent . I f t he W h e n Log is Fu ll opt ion is select ed, an alert is sent when t he log fills up. I f you select N one , no log m essages are sent . Day for Sending Log This field is only available when you select W e e k ly in t he Log Sch e du le field. Tim e for Sending Log Ent er t he t im e of t he day in 24- hour form at ( for exam ple 23: 00 equals 11: 00 pm ) t o send t he logs. Clear log aft er sending m ail Select t he check box t o clear all logs aft er logs and alert m essages are sent via em ail. Use t he drop down list box t o select which day of t he week t o send t he logs. Log Cat egory 118 Syst em Maint enance Click t his t o receive logs relat ed t o syst em m aint enance. Syst em Error Click t his t o receive logs relat ed t o syst em errors. 802.1x Click t his t o receive logs relat ed t o t he 802.1x m ode. Wireless Click t his t o receive logs relat ed t o t he wireless funct ion. Em ail Log Now Select t he cat egories of alert s for which you want t he NWA1121- NI t o im m ediat ely send e- m ail alert s. Apply Click Apply t o save your cust om ized set t ings. Cancel Click Ca n ce l t o begin configuring t his screen afresh. NWA1121-NI User’s Guide C HAPTER 11 Maintenance 11.1 Overview This chapt er describes t he m aint enance screens. I t discusses how you can upload new firm ware, m anage configurat ion and rest art your NWA1121- NI wit hout t urning it off and on. This chapt er provides inform at ion and inst ruct ions on how t o ident ify and m anage your NWA1121NI over t he net work. Figure 59 NWA1121- NI Set up I n t he figure above, t he NWA1121- NI connect s t o a Dom ain Nam e Server ( DNS) server t o avail of a dom ain nam e. I t also connect s t o an Net work Tim e Prot ocol ( NTP) server t o set t he t im e on t he device. 11.2 What You Can Do in this Chapter • Use t he Ge ne r a l screen t o specify t he syst em nam e ( see Sect ion 11.4 on page 120) . • Use t he Pa ssw or d screen t o m anage t he password for your NWA1121- NI ( see Sect ion 11.5 on page 121) . • Use t he Tim e screen t o change your NWA1121- NI ’s t im e and dat e. This screen allows you t o configure t he NWA1121- NI ’s t im e based on your local t im e zone ( see Sect ion 11.6 on page 122) . • Use t he Fir m w a r e Uploa d screen t o upload t he lat est firm ware for your NWA1121- NI ( see Sect ion 11.7 on page 123) . • Use t he Ba ck u p/ Re st or e screen t o view inform at ion relat ed t o fact ory default s, backup configurat ion, and rest oring configurat ion ( see Sect ion 11.8 on page 124) . NWA1121-NI User’s Guide 119 Chapter 11 Maintenance • Use Re st a r t screen t o reboot t he NWA1121- NI wit hout t urning t he power off ( see Sect ion 11.9 on page 126) . 11.3 What You Need To Know You can find t he firm ware for your device at www.zyxel.com . I t is a file t hat ( usually) uses t he syst em m odel nam e wit h a " * .bin" ext ension, for exam ple " [ Model # ] .bin" . The upload process uses HTTP ( Hypert ext Transfer Prot ocol) and m ay t ake up t o t wo m inut es. Aft er a successful upload, t he syst em will reboot . 11.4 General Screen Use t he Ge n e r a l screen t o ident ify your NWA1121- NI over t he net work. Click M a in t e n a n ce > Ge ne r a l. The following screen displays. Figure 60 Maint enance > General The following t able describes t he labels in t his screen. Table 37 Maint enance > General LABEL DESCRIPTION Syst em Set t ings Syst em Nam e Type a descript ive nam e t o ident ify t he NWA1121- NI in t he Et hernet net work. This nam e can be up t o 15 alphanum eric charact ers long. Spaces are not allowed, but dashes " - " are accept ed. 120 Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o reload t he previous configurat ion for t his screen. NWA1121-NI User’s Guide Chapter 11 Maintenance 11.5 Password Screen Use t his screen t o cont rol access t o your NWA1121- NI by assigning a password t o it . Click M a int e na nce > Pa ssw or d. The following screen displays. Figure 61 Maint enance > Password The following t able describes t he labels in t his screen. Table 38 Maint enance > Password LABEL DESCRIPTIONS Current Password Type in your exist ing syst em password. New Password Type your new syst em password. Not e t hat as you t ype a password, t he screen displays a dot ( .) for each charact er you t ype. Ret ype t o Confirm Ret ype your new syst em password for confirm at ion. Apply Click Apply t o save your changes. Cancel Click Ca nce l t o reload t he previous configurat ion for t his screen. NWA1121-NI User’s Guide 121 Chapter 11 Maintenance 11.6 Time Screen Use t his screen t o change your NWA1121- NI ’s t im e and dat e, click M a int e n a n ce > Tim e . The following screen displays. Figure 62 Maint enance > Tim e The following t able describes t he labels in t his screen. Table 39 Maint enance > Tim e LABEL DESCRIPTION Current Tim e and Dat e Current Tim e This field displays t he t im e of your NWA1121- NI . Each t im e you reload t his page, t he NWA1121- NI synchronizes t he t im e wit h t he t im e server ( if configured) . When you disable N TP Clie n t Upda t e , you can m anually ent er t he new t im e in t his field and t hen click Apply. Current Dat e This field displays t he last updat ed dat e from t he t im e server. When you disable N TP Clie n t Upda t e , you can m anually ent er t he new dat e in t his field and t hen click Apply. Tim e and Dat e Set up NTP Client Updat e Select t his t o have t he NWA1121- NI get t he t im e and dat e from t he t im e server you specified below. NTP server Select t his opt ion t o use t he predefined list of Net work Tim e Prot ocol ( NTP) servers. Select an NTP server from t he drop- list box. Manual I P Select t his opt ion t o ent er t he I P address or URL of your t im e server. Check wit h your I SP/ net work adm inist rat or if you are unsure of t his inform at ion. Tim e Zone Set up 122 Tim e Zone Choose t he t im e zone of your locat ion. This will set t he t im e difference bet ween your t im e zone and Greenwich Mean Tim e ( GMT) . Apply Click Apply t o save your changes. Cancel Click Ca n ce l t o reload t he previous configurat ion for t his screen. NWA1121-NI User’s Guide Chapter 11 Maintenance 11.7 Firmware Upgrade Screen Use t his screen t o upload a firm ware t o your NWA1121- NI . Click M a int e na nce > Fir m w a r e Upgr a de . Follow t he inst ruct ions in t his sect ion t o upload firm ware t o your NWA1121- NI . Figure 63 Maint enance > Firm ware Upgrade The following t able describes t he labels in t his screen. Table 40 Maint enance > Firm ware Upgrade LABEL DESCRIPTION File Pat h Type in t he locat ion of t he file you want t o upload in t his field or click Br ow se ... t o find it . Browse... Click Br ow se ... t o find t he .bin file you want t o upload. Rem em ber t hat you m ust decom press com pressed ( .zip) files before you can upload t hem . Upload Click Uploa d t o begin t he upload process. This process m ay t ake up t o t wo m inut es. Do not turn off the NWA1121-NI while firmware upload is in progress! Aft er you see t he Fir m w a r e Uploa d in Pr oce ss screen, wait t wo m inut es before logging int o t he NWA1121- NI again. Figure 64 Firm ware Upload I n Process The NWA1121- NI aut om at ically rest art s in t his t im e causing a t em porary net work disconnect . I n som e operat ing syst em s, you m ay see t he following icon on your deskt op. Figure 65 Net work Tem porarily Disconnect ed NWA1121-NI User’s Guide 123 Chapter 11 Maintenance Aft er t he upload was finished, log in again and check your new firm ware version in t he D a sh boa r d screen. I f t he upload was not successful, t he following screen will appear. Click Re t ur n t o go back t o t he F/ W Uploa d screen. Figure 66 Firm ware Upload Error 11.8 Configuration File Screen Use t his screen t o backup, rest ore and reset t he configurat ion of your NWA1121- NI . Click M a int e na nce > Con figu r a t ion File . The screen appears as shown next . Figure 67 Maint enance > Configurat ion File 11.8.1 Backup Configuration Backup configurat ion allows you t o back up ( save) t he NWA1121- NI ’s current configurat ion t o a file on your com put er. Once your NWA1121- NI is configured and funct ioning properly, it is highly recom m ended t hat you back up your configurat ion file before m aking configurat ion changes. The backup configurat ion file will be useful in case you need t o ret urn t o your previous set t ings. Click Ba ck up t o save t he NWA1121- NI ’s current configurat ion t o your com put er. 124 NWA1121-NI User’s Guide Chapter 11 Maintenance 11.8.2 Restore Configuration Rest ore configurat ion allows you t o upload a new or previously saved configurat ion file from your com put er t o your NWA1121- NI . Table 41 Rest ore Configurat ion LABEL DESCRIPTION File Pat h Type in t he locat ion of t he file you want t o upload in t his field or click Br ow se ... t o find it . Browse... Click Br ow se ... t o find t he file you want t o upload. Rem em ber t hat you m ust decom press com pressed ( .ZI P) files before you can upload t hem . Upload Click Uploa d t o begin t he upload process. Do not turn off the NWA1121-NI while configuration file upload is in progress. Aft er you see a “ rest ore configurat ion successful” screen, you m ust t hen wait one m inut e before logging int o t he NWA1121- NI again. Figure 68 Configurat ion Upload Successful The NWA1121- NI aut om at ically rest art s in t his t im e causing a t em porary net work disconnect . I n som e operat ing syst em s, you m ay see t he following icon on your deskt op. Figure 69 Net work Tem porarily Disconnect ed I f you uploaded t he default configurat ion file you m ay need t o change t he I P address of your com put er t o be in t he sam e subnet as t hat of t he default NWA1121- NI I P address ( 192.168.1.2) . See Appendix A on page 133 for det ails on how t o set up your com put er ’s I P address. NWA1121-NI User’s Guide 125 Chapter 11 Maintenance I f t he upload was not successful, t he following screen will appear. Click Re t u r n t o go back t o t he Ba ck up/ Re st or e screen. Figure 70 Configurat ion Upload Error 11.8.3 Back to Factory Defaults Pressing t he Re se t but t on in t his sect ion clears all user- ent ered configurat ion inform at ion and ret urns t he NWA1121- NI t o it s fact ory default s as shown on t he screen. The following warning screen will appear. Figure 71 Reset Message You can also press t he RESET but t on t o reset your NWA1121- NI t o it s fact ory default set t ings. Refer t o Sect ion 2.2 on page 20 for m ore inform at ion. 11.9 Restart Screen Use t his screen t o reboot t he NWA1121- NI wit hout t urning t he power off. Click M a int e na nce > Re st a r t . The following screen displays. Figure 72 Maint enance > Rest art Click Re st a r t t o have t he NWA1121- NI reboot . This does not affect t he NWA1121- NI 's configurat ion. 126 NWA1121-NI User’s Guide Chapter 11 Maintenance NWA1121-NI User’s Guide 127 Chapter 11 Maintenance 128 NWA1121-NI User’s Guide C HAPTER 12 Troubleshooting This chapt er offers som e suggest ions t o solve problem s you m ight encount er. The pot ent ial problem s are divided int o t he following cat egories. • Power, Hardware Connect ions, and LEDs • NWA1121- NI Access and Login • I nt ernet Access 12.1 Power, Hardware Connections, and LEDs The NWA1121- NI does not t urn on. None of t he LEDs t urn on. Make sure you are using t he power adapt or or cord included wit h t he NWA1121- NI . Make sure t he power adapt or or cord is connect ed t o t he NWA1121- NI and plugged in t o an appropriat e power source. Make sure t he power source is t urned on. Disconnect and re- connect t he power adapt or or cord t o t he NWA1121- NI . I f t he problem cont inues, cont act t he vendor. One of t he LEDs does not behave as expect ed. Make sure you underst and t he norm al behavior of t he LED. See Sect ion 1.7 on page 17. Check t he hardware connect ions. See t he Quick St art Guide. I nspect your cables for dam age. Cont act t he vendor t o replace any dam aged cables. Disconnect and re- connect t he power adapt or t o t he NWA1121- NI . I f t he problem cont inues, cont act t he vendor. NWA1121-NI User’s Guide 129 Chapter 12 Troubleshooting 12.2 NWA1121-NI Access and Login I forgot t he I P address for t he NWA1121- NI . The default I P address is 1 9 2 .1 6 8 .1 .2 . I f you changed t he I P address and have forgot t en it , you m ight get t he I P address of t he NWA1121NI by looking up t he I P address of t he default gat eway for your com put er. To do t his in m ost Windows com put ers, click St a r t > Run , ent er “ cm d”, and t hen ent er “ ipconfig”. The I P address of t he D e fa ult Ga t e w a y m ight be t he I P address of t he NWA1121- NI ( it depends on t he net work) , so ent er t his I P address in your I nt ernet browser. I f t his does not work, you have t o reset t he device t o it s fact ory default s. See Sect ion 2.2 on page 20. I forgot t he passwor d. The default password is 1 2 3 4 . I f t his does not work, you have t o reset t he device t o it s fact ory default s. See Sect ion 2.2 on page 20. I cannot see or access t he Login screen in t he web configurat or. Make sure you are using t he correct I P address. • The default I P address is 192.168.1.2. • I f you changed t he I P address ( Sect ion 7.4 on page 96) , use t he new I P address. • I f you changed t he I P address and have forgot t en it , see t he t roubleshoot ing suggest ions for I forgot t he I P address for t he NWA1121- NI . Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See t he Quick St art Guide and Sect ion 1.7 on page 17. Make sure your I nt ernet browser does not block pop- up windows and has JavaScript and Java enabled. See Sect ion 12.1 on page 129. Make sure your com put er is in t he sam e subnet as t he NWA1121- NI . ( I f you know t hat t here are rout ers bet ween your com put er and t he NWA1121- NI , skip t his st ep.) • I f t here is no DHCP server on your net work, m ake sure your com put er ’s I P address is in t he sam e subnet as t he NWA1121- NI . 130 Reset t he device t o it s fact ory default s, and t ry t o access t he NWA1121- NI wit h t he default I P address. See Chapt er 2 on page 20. NWA1121-NI User’s Guide Chapter 12 Troubleshooting I f t he problem cont inues, cont act t he net work adm inist rat or or vendor, or t ry one of t he advanced suggest ions. Adva n ce d Sugge st ions • Try t o access t he NWA1121- NI using anot her service, such as Telnet . I f you can access t he NWA1121- NI , check t he rem ot e m anagem ent set t ings t o find out why t he NWA1121- NI does not respond t o HTTP. • I f your com put er is connect ed wirelessly, use a com put er t hat is connect ed t o a LAN/ Et hernet port . I can see t he Login screen, but I cannot log in t o t he NWA1121- NI . Make sure you have ent ered t he user nam e and password correct ly. The default password is 1 2 3 4 . This fields are case- sensit ive, so m ake sure [ Caps Lock] is not on. You cannot log in t o t he web configurat or while som eone is using t he Telnet t o access t he NWA1121- NI . Log out of t he NWA1121- NI in t he ot her session, or ask t he person who is logged in t o log out . Disconnect and re- connect t he power adapt or or cord t o t he NWA1121- NI . I f t his does not work, you have t o reset t he device t o it s fact ory default s. See Sect ion 2.2 on page 20. I cannot use FTP t o upload new firm ware. See t he t roubleshoot ing suggest ions for I cannot see or access t he Login screen in t he web configurat or. I gnore t he suggest ions about your browser. 12.3 Internet Access I cannot access t he I nt er net . Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See t he Quick St art Guide and Sect ion 12.1 on page 129. 2. Make sure your NWA1121- NI is connect ed t o a net working device t hat provides I nt ernet access. I f you are t rying t o access t he I nt ernet wirelessly, m ake sure t he wireless set t ings on t he wireless client are t he sam e as t he set t ings on t he AP. Disconnect all t he cables from your device, and follow t he direct ions in t he Quick St art Guide again. NWA1121-NI User’s Guide 131 Chapter 12 Troubleshooting I f t he problem cont inues, cont act your I SP. I cannot access t he I nt ernet anym ore. I had access t o t he I nt ernet ( wit h t he NWA1121- NI ) , but m y I nt ernet connect ion is not available anym ore. Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See t he Quick St art Guide and Sect ion 1.7 on page 17. Reboot t he NWA1121- NI . I f t he problem cont inues, cont act your I SP or net work adm inist rat or. The I nt ernet connect ion is slow or int erm it t ent . There m ight be a lot of t raffic on t he net work. Look at t he LEDs, and check Sect ion 1.7 on page 17. I f t he NWA1121- NI is sending or receiving a lot of inform at ion, t ry closing som e program s t hat use t he I nt ernet , especially peer- t o- peer applicat ions. Check t he signal st rengt h. I f t he signal is weak, t ry m oving t he NWA1121- NI ( in wireless client m ode) closer t o t he AP ( if possible) , and look around t o see if t here are any devices t hat m ight be int erfering wit h t he wireless net work ( m icrowaves, ot her wireless net works, and so on) . Reboot t he NWA1121- NI . I f t he problem cont inues, cont act t he net work adm inist rat or or vendor, or t ry one of t he advanced suggest ions. Adva n ce d Sugge st ions • Check t he set t ings for QoS. I f it is disabled, you m ight consider act ivat ing it . 132 NWA1121-NI User’s Guide A PPENDIX Setting Up Your Computer’s IP Address Not e: Your specific NWA1121- NI m ay not support all of t he operat ing syst em s described in t his appendix. See t he product specificat ions for m ore inform at ion about which operat ing syst em s are support ed. This appendix shows you how t o configure t he I P set t ings on your com put er in order for it t o be able t o com m unicat e wit h t he ot her devices on your net work. Windows Vist a/ XP/ 2000, Mac OS 9/ OS X, and all versions of UNI X/ LI NUX include t he soft ware com ponent s you need t o use TCP/ I P on your com put er. I f you m anually assign I P inform at ion inst ead of using a dynam ic I P, m ake sure t hat your net work’s com put ers have I P addresses t hat place t hem in t he sam e subnet . I n t his appendix, you can set up an I P address for: • Windows XP/ NT/ 2000 on page 133 • Windows Vist a on page 137 • Windows 7 on page 141 • Mac OS X: 10.3 and 10.4 on page 145 • Mac OS X: 10.5 and 10.6 on page 148 • Linux: Ubunt u 8 ( GNOME) on page 151 • Linux: openSUSE 10.3 ( KDE) on page 155 Windows XP/NT/2000 The following exam ple uses t he default Windows XP display t hem e but can also apply t o Windows 2000 and Windows NT. NWA1121-NI User’s Guide 133 Appendix A Setting Up Your Computer’s IP Address 134 Click St a r t > Con t r ol Pa n e l. I n t he Cont r ol Pa n e l, click t he N e t w or k Con ne ct ion s icon. Right- click Loca l Ar e a Conne ct ion and t hen select Pr ope r t ie s. NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address On t he Ge n e r a l t ab, select I n t e r n e t Pr ot ocol ( TCP/ I P) and t hen click Pr ope r t ie s. NWA1121-NI User’s Guide 135 Appendix A Setting Up Your Computer’s IP Address The I nt e r ne t Pr ot ocol TCP/ I P Pr ope r t ie s window opens. Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your net work adm inist rat or or I SP assigns your I P address dynam ically. Select Use t h e follow in g I P Addr e ss and fill in t he I P a ddr e ss, Subn e t m a sk , and D e fa ult ga t e w a y fields if you have a st at ic I P address t hat was assigned t o you by your net work adm inist rat or or I SP. You m ay also have t o ent er a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S se r ve r , if t hat inform at ion was provided. Click OK t o close t he I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window. Click OK t o close t he Loca l Ar e a Con n e ct ion Pr ope r t ie s window. Verifying Settings Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt . I n t he Com m a nd Pr om pt window, t ype " ipconfig" and t hen press [ ENTER] . You can also go t o St a r t > Con t r ol Pa n e l > N e t w or k Con n e ct ions, right- click a net work connect ion, click St a t u s and t hen click t he Suppor t t ab t o view your I P address and connect ion inform at ion. 136 NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address Windows Vista This sect ion shows screens from Windows Vist a Professional. Click St a r t > Cont r ol Pa n e l. I n t he Cont r ol Pa n e l, click t he N e t w or k a nd I n t e r n e t icon. Click t he N e t w or k a n d Sh a r ing Ce n t e r icon. NWA1121-NI User’s Guide 137 Appendix A Setting Up Your Computer’s IP Address Click M a n a ge n e t w or k con n e ct ions. Right- click Loca l Ar e a Conne ct ion and t hen select Pr ope r t ie s. Not e: During t his procedure, click Con t inu e whenever Windows displays a screen saying t hat it needs your perm ission t o cont inue. 138 NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address Select I n t e r n e t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) and t hen select Pr ope r t ie s. NWA1121-NI User’s Guide 139 Appendix A Setting Up Your Computer’s IP Address The I nt e r ne t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window opens. Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your net work adm inist rat or or I SP assigns your I P address dynam ically. Select Use t h e follow in g I P Addr e ss and fill in t he I P a ddr e ss, Subn e t m a sk , and D e fa ult ga t e w a y fields if you have a st at ic I P address t hat was assigned t o you by your net work adm inist rat or or I SP. You m ay also have t o ent er a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S se r ve r , if t hat inform at ion was provided.Click Adva nce d. Click OK t o close t he I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window. 10 Click OK t o close t he Loca l Ar e a Con n e ct ion Pr ope r t ie s window. Verifying Settings Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt . I n t he Com m a nd Pr om pt window, t ype " ipconfig" and t hen press [ ENTER] . You can also go t o St a r t > Con t r ol Pa n e l > N e t w or k Con n e ct ions, right- click a net work connect ion, click St a t u s and t hen click t he Suppor t t ab t o view your I P address and connect ion inform at ion. 140 NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address Windows 7 This sect ion shows screens from Windows 7 Ent erprise. Click St a r t > Cont r ol Pa n e l. I n t he Cont r ol Pa n e l, click Vie w ne t w or k st a t us a nd t a sk s under t he N e t w or k a n d I n t e r n e t cat egory. Click Ch a n ge a da pt e r se t t in gs. NWA1121-NI User’s Guide 141 Appendix A Setting Up Your Computer’s IP Address Double click Loca l Ar e a Conne ct ion and t hen select Pr ope r t ie s. Not e: During t his procedure, click Con t inu e whenever Windows displays a screen saying t hat it needs your perm ission t o cont inue. 142 NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address Select I n t e r n e t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) and t hen select Pr ope r t ie s. NWA1121-NI User’s Guide 143 Appendix A Setting Up Your Computer’s IP Address The I nt e r ne t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window opens. Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your net work adm inist rat or or I SP assigns your I P address dynam ically. Select Use t h e follow in g I P Addr e ss and fill in t he I P a ddr e ss, Subn e t m a sk , and D e fa ult ga t e w a y fields if you have a st at ic I P address t hat was assigned t o you by your net work adm inist rat or or I SP. You m ay also have t o ent er a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S se r ve r , if t hat inform at ion was provided. Click Adva nce d if you want t o configure advanced set t ings for I P, DNS and WI NS. Click OK t o close t he I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window. Click OK t o close t he Loca l Ar e a Con n e ct ion Pr ope r t ie s window. Verifying Settings 144 Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt . I n t he Com m a nd Pr om pt window, t ype " ipconfig" and t hen press [ ENTER] . NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address The I P set t ings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in t his sect ion are from Mac OS X 10.4 but can also apply t o 10.3. Click Apple > Syst e m Pr e fe r e nce s. NWA1121-NI User’s Guide 145 Appendix A Setting Up Your Computer’s IP Address 146 I n t he Syst e m Pr e fe r e nce s window, click t he N e t w or k icon. When t he N e t w or k preferences pane opens, select Built - in Et he r ne t from t he net work connect ion t ype list , and t hen click Configu r e . NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address For dynam ically assigned set t ings, select Usin g D H CP from t he Configu r e I Pv4 list in t he TCP/ I P t ab. For st at ically assigned set t ings, do t he following: • From t he Configu r e I Pv4 list , select M a nua lly. • I n t he I P Addr e ss field, t ype your I P address. • I n t he Subn e t M a sk field, t ype your subnet m ask. • I n t he Rou t e r field, t ype t he I P address of your device. Click Apply N ow and close t he window. NWA1121-NI User’s Guide 147 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/ I P propert ies by clicking Applica t ions > Ut ilit ie s > N e t w or k Ut ilit ie s, and t hen select ing t he appropriat e N e t w or k I nt e r fa ce from t he I n fo t ab. Figure 73 Mac OS X 10.4: Net work Ut ilit y Mac OS X: 10.5 and 10.6 The screens in t his sect ion are from Mac OS X 10.5 but can also apply t o 10.6. 148 Click Apple > Syst e m Pr e fe r e nce s. NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address I n Syst e m Pr e fe r e n ce s, click t he N e t w or k icon. When t he N e t w or k preferences pane opens, select Et he r ne t from t he list of available connect ion t ypes. From t he Configu r e list , select Usin g D H CP for dynam ically assigned set t ings. For st at ically assigned set t ings, do t he following: NWA1121-NI User’s Guide 149 Appendix A Setting Up Your Computer’s IP Address • From t he Configu r e list , select M a nua lly. • I n t he I P Addr e ss field, ent er your I P address. • I n t he Subn e t M a sk field, ent er your subnet m ask. • I n t he Rou t e r field, ent er t he I P address of your NWA1121- NI . 150 Click Apply and close t he window. NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/ I P propert ies by clicking Applica t ions > Ut ilit ie s > N e t w or k Ut ilit ie s, and t hen select ing t he appropriat e N e t w or k int e r fa ce from t he I nfo t ab. Figure 74 Mac OS X 10.5: Net work Ut ilit y Linux: Ubuntu 8 (GNOME) This sect ion shows you how t o configure your com put er ’s TCP/ I P set t ings in t he GNU Obj ect Model Environm ent ( GNOME) using t he Ubunt u 8 Linux dist ribut ion. The procedure, screens and file locat ions m ay vary depending on your specific dist ribut ion, release version, and individual configurat ion. The following screens use t he default Ubunt u 8 inst allat ion. Not e: Make sur e you are logged in as t he root adm inist rat or. Follow t he st eps below t o configure your com put er I P address in GNOME: Click Syst e m > Adm in ist r a t ion > N e t w or k . NWA1121-NI User’s Guide 151 Appendix A Setting Up Your Computer’s IP Address 152 When t he N e t w or k Se t t in gs window opens, click Un lock t o open t he Aut he nt ica t e window. ( By default , t he Unlock but t on is greyed out unt il clicked.) You cannot m ake changes t o your configurat ion unless you first ent er your adm in password. I n t he Aut he nt ica t e window, ent er your adm in account nam e and password t hen click t he Aut he nt ica t e but t on. NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address I n t he N e t w or k Se t t ings window, select t he connect ion t hat you want t o configure, t hen click Pr ope r t ie s. The Pr ope r t ie s dialog box opens. • I n t he Configu r a t ion list , select Au t om a t ic Con figu r a t ion ( D H CP) if you have a dynam ic I P address. • I n t he Configur a t ion list , select St a t ic I P a ddr e ss if you have a st at ic I P address. Fill in t he I P a ddr e ss, Subne t m a sk , and Ga t e w a y a ddr e ss fields. Click OK t o save t he changes and close t he Pr ope r t ie s dialog box and ret urn t o t he N e t w or k Se t t in gs screen. NWA1121-NI User’s Guide 153 Appendix A Setting Up Your Computer’s IP Address 154 I f you know your DNS server I P address( es) , click t he D N S t ab in t he N e t w or k Se t t in gs window and t hen ent er t he DNS server inform at ion in t he fields provided. Click t he Close but t on t o apply t he changes. NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/ I P propert ies by clicking Syst e m > Adm in ist r a t ion > N e t w or k Tools, and t hen select ing t he appropriat e N e t w or k de vice from t he D e vice s t ab. The I n t e r fa ce St a t ist ics colum n shows dat a if your connect ion is working properly. Figure 75 Ubunt u 8: Net work Tools Linux: openSUSE 10.3 (KDE) This sect ion shows you how t o configure your com put er ’s TCP/ I P set t ings in t he K Deskt op Environm ent ( KDE) using t he openSUSE 10.3 Linux dist ribut ion. The procedure, screens and file locat ions m ay vary depending on your specific dist ribut ion, release version, and individual configurat ion. The following screens use t he default openSUSE 10.3 inst allat ion. Not e: Make sur e you are logged in as t he root adm inist rat or. Follow t he st eps below t o configure your com put er I P address in t he KDE: NWA1121-NI User’s Guide 155 Appendix A Setting Up Your Computer’s IP Address 156 Click K M e n u > Com pu t e r > Adm in ist r a t or Se t t in gs ( Ya ST) . When t he Run a s Root - KD E su dialog opens, ent er t he adm in password and click OK. NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address When t he Ya ST Cont r ol Ce nt e r window opens, select N e t w or k D e vice s and t hen click t he N e t w or k Ca r d icon. When t he N e t w or k Se t t in gs window opens, click t he Ove r vie w t ab, select t he appropriat e connect ion N a m e from t he list , and t hen click t he Configu r e but t on. NWA1121-NI User’s Guide 157 Appendix A Setting Up Your Computer’s IP Address When t he N e t w or k Ca r d Se t u p window opens, click t he Addr e ss t ab Figure 76 openSUSE 10.3: Net work Card Set up Select D yna m ic Addr e ss ( D H CP) if you have a dynam ic I P address. Select St a t ica lly a ssign e d I P Addr e ss if you have a st at ic I P address. Fill in t he I P a ddr e ss, Subne t m a sk , and H ost na m e fields. 158 Click N e x t t o save t he changes and close t he N e t w or k Ca r d Se t up window. NWA1121-NI User’s Guide Appendix A Setting Up Your Computer’s IP Address I f you know your DNS server I P address( es) , click t he H ost na m e / D N S t ab in N e t w or k Se t t in gs and t hen ent er t he DNS server inform at ion in t he fields provided. Click Finish t o save your set t ings and close t he window. Verifying Settings Click t he KN e t w or k M a na ge r icon on t he Ta sk ba r t o check your TCP/ I P propert ies. From t he Opt ion s sub- m enu, select Sh ow Con n e ct ion I n for m a t ion . Figure 77 openSUSE 10.3: KNet work Manager NWA1121-NI User’s Guide 159 Appendix A Setting Up Your Computer’s IP Address When t he Conn e ct ion St a t u s - KN e t w or k M a n a ge r window opens, click t he St a t ist ics t a b t o see if your connect ion is working properly. Figure 78 openSUSE: Connect ion St at us - KNet work Manager 160 NWA1121-NI User’s Guide A PPENDIX Pop-up Windows, JavaScript and Java Permissions I n order t o use t he web configurat or you need t o allow: • Web browser pop- up windows from your device. • JavaScript ( enabled by default ) . • Java perm issions ( enabled by default ) . Not e: The screens used below belong t o I nt ernet Explorer version 6, 7 and 8. Screens for ot her I nt ernet Explorer versions m ay vary. Internet Explorer Pop-up Blockers You m ay have t o disable pop- up blocking t o log int o your device. Eit her disable pop- up blocking ( enabled by default in Windows XP SP ( Service Pack) 2) or allow pop- up blocking and creat e an except ion for your device’s I P address. Disable Pop-up Blockers I n I nt ernet Explorer, select Tools, Pop- u p Block e r and t hen select Tur n Off Pop- up Block e r. Figure 79 Pop- up Blocker You can also check if pop- up blocking is disabled in t he Pop- u p Block e r sect ion in t he Pr iva cy t ab. I n I nt ernet Explorer, select Tools, I nt e r ne t Opt ions, Pr iva cy. NWA1121-NI User’s Guide 161 Appendix B Pop-up Windows, JavaScript and Java Permissions Clear t he Block pop- ups check box in t he Pop- u p Block e r sect ion of t he screen. This disables any web pop- up blockers you m ay have enabled. Figure 80 I nt ernet Opt ions: Privacy Click Apply t o save t his set t ing. Enable Pop-up Blockers with Exceptions Alt ernat ively, if you only want t o allow pop- up windows from your device, see t he following st eps. 162 I n I nt ernet Explorer, select Tools, I nt e r ne t Opt ions and t hen t he Pr iva cy t ab. NWA1121-NI User’s Guide Appendix B Pop-up Windows, JavaScript and Java Permissions Select Se t t ings…t o open t he Pop- up Block e r Se t t ings screen. Figure 81 I nt ernet Opt ions: Privacy Type t he I P address of your device ( t he web page t hat you do not want t o have blocked) wit h t he prefix “ ht t p: / / ”. For exam ple, ht t p: / / 192.168.167.1. NWA1121-NI User’s Guide 163 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Add t o m ove t he I P address t o t he list of Allow e d sit e s. Figure 82 Pop- up Blocker Set t ings Click Close t o ret urn t o t he Pr iva cy screen. Click Apply t o save t his set t ing. JavaScript I f pages of t he web configurat or do not display properly in I nt ernet Explorer, check t hat JavaScript are allowed. 164 NWA1121-NI User’s Guide Appendix B Pop-up Windows, JavaScript and Java Permissions I n I nt ernet Explorer, click Tools, I n t e r ne t Opt ion s and t hen t he Se cur it y t ab. Figure 83 I nt ernet Opt ions: Securit y Click t he Cu st om Le ve l... but t on. Scroll down t o Scr ipt ing. Under Act ive scr ipt ing m ake sure t hat Ena ble is select ed ( t he default ) . Under Scr ipt ing of Ja va a pple t s m ake sure t hat Ena ble is select ed ( t he default ) . NWA1121-NI User’s Guide 165 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK t o close t he window. Figure 84 Securit y Set t ings - Java Script ing Java Permissions 166 From I nt ernet Explorer, click Tools, I nt e r ne t Opt ions and t hen t he Se cu r it y t ab. Click t he Cu st om Le ve l... but t on. Scroll down t o M icr osoft VM . Under Ja va pe r m issions m ake sure t hat a safet y level is select ed. NWA1121-NI User’s Guide Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK t o close t he window. Figure 85 Securit y Set t ings - Java JAVA (Sun) From I nt ernet Explorer, click Tools, I nt e r ne t Opt ions and t hen t he Adva n ce d t ab. Make sure t hat Use Ja va 2 for < a pple t > under Ja va ( Sun) is select ed. NWA1121-NI User’s Guide 167 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK t o close t he window. Figure 86 Java ( Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for ot her versions m ay vary slight ly. The st eps below apply t o Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop- ups in one screen. Click Tools, t hen click Opt ions in t he screen t hat appears. Figure 87 Mozilla Firefox: TOOLS > Opt ions 168 NWA1121-NI User’s Guide Appendix B Pop-up Windows, JavaScript and Java Permissions Click Cont e n t t o show t he screen below. Select t he check boxes as shown in t he following screen. Figure 88 Mozilla Firefox Cont ent Securit y Opera Opera 10 screens are used here. Screens for ot her versions m ay vary slight ly. NWA1121-NI User’s Guide 169 Appendix B Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, t hen Pr e fe r e nce s. I n t he Ge n e r a l t ab, go t o Ch oose h ow you pr e fe r t o h a n dle pop- ups and select Ope n a ll pop- ups. Figure 89 Opera: Allowing Pop- Ups Enabling Java From Opera, click Tools, t hen Pr e fe r e nce s. I n t he Adva nce d t ab, select Cont e nt from t he leftside m enu. Select t he check boxes as shown in t he following screen. Figure 90 Opera: Enabling Java 170 NWA1121-NI User’s Guide Appendix B Pop-up Windows, JavaScript and Java Permissions To cust om ize JavaScript behavior in t he Opera browser, click Ja va Scr ipt Opt ions. Figure 91 Opera: JavaScript Opt ions Select t he it em s you want Opera’s JavaScript t o apply. NWA1121-NI User’s Guide 171 Appendix B Pop-up Windows, JavaScript and Java Permissions 172 NWA1121-NI User’s Guide A PPENDIX IP Addresses and Subnetting This appendix int roduces I P addresses and subnet m asks. I P addresses ident ify individual devices on a net work. Every net working device ( including com put ers, servers, rout ers, print ers, et c.) needs an I P address t o com m unicat e across t he net work. These net working devices are also known as host s. Subnet m asks det erm ine t he m axim um num ber of possible host s on a net work. You can also use subnet m asks t o divide one net work int o m ult iple sub- net works. Introduction to IP Addresses One part of t he I P address is t he net work num ber, and t he ot her part is t he host I D. I n t he sam e way t hat houses on a st reet share a com m on st reet nam e, t he host s on a net work share a com m on net work num ber. Sim ilarly, as each house has it s own house num ber, each host on t he net work has it s own unique ident ifying num ber - t he host I D. Rout ers use t he net work num ber t o send packet s t o t he correct net work, while t he host I D det erm ines t o which host on t he net work t he packet s are delivered. Structure An I P address is m ade up of four part s, writ t en in dot t ed decim al not at ion ( for exam ple, 192.168.1.1) . Each of t hese four part s is known as an oct et . An oct et is an eight- digit binary num ber ( for exam ple 11000000, which is 192 in decim al not at ion) . Therefore, each oct et has a possible range of 00000000 t o 11111111 in binary, or 0 t o 255 in decim al. NWA1121-NI User’s Guide 173 Appendix C IP Addresses and Subnetting The following figure shows an exam ple I P address in which t he first t hree oct et s ( 192.168.1) are t he net work num ber, and t he fourt h oct et ( 16) is t he host I D. Figure 92 Net work Num ber and Host I D How m uch of t he I P address is t he net work num ber and how m uch is t he host I D varies according t o t he subnet m ask. Subnet Masks A subnet m ask is used t o det erm ine which bit s are part of t he net work num ber, and which bit s are part of t he host I D ( using a logical AND operat ion) . The t erm “ subnet ” is short for “ sub- net work”. A subnet m ask has 32 bit s. I f a bit in t he subnet m ask is a “ 1” t hen t he corresponding bit in t he I P address is part of t he net work num ber. I f a bit in t he subnet m ask is “ 0” t hen t he corresponding bit in t he I P address is part of t he host I D. The following exam ple shows a subnet m ask ident ifying t he net work num ber ( in bold t ext ) and host I D of an I P address ( 192.168.1.2 in decim al) . Table 42 Subnet Masks 1ST OCTET: 2ND OCTET: (192) (168) 3RD OCTET: 4TH OCTET (1) (2) I P Address ( Binary) 11000000 10101000 00000001 00000010 Subnet Mask ( Binary) 11111111 11111111 11111111 00000000 Net work Num ber 11000000 10101000 00000001 Host I D 00000010 By convent ion, subnet m asks always consist of a cont inuous sequence of ones beginning from t he left m ost bit of t he m ask, followed by a cont inuous sequence of zeros, for a t ot al num ber of 32 bit s. 174 NWA1121-NI User’s Guide Appendix C IP Addresses and Subnetting Subnet m asks can be referred t o by t he size of t he net work num ber part ( t he bit s wit h a “ 1” value) . For exam ple, an “ 8- bit m ask” m eans t hat t he first 8 bit s of t he m ask are ones and t he rem aining 24 bit s are zeroes. Subnet m asks are expressed in dot t ed decim al not at ion j ust like I P addresses. The following exam ples show t he binary and decim al not at ion for 8- bit , 16- bit , 24- bit and 29- bit subnet m asks. Table 43 Subnet Masks BINARY DECIMAL 1ST OCTET 2ND OCTET 3RD OCTET 4TH OCTET 8- bit m ask 11111111 00000000 00000000 00000000 255.0.0.0 16- bit m ask 11111111 11111111 00000000 00000000 255.255.0.0 24- bit m ask 11111111 11111111 11111111 00000000 255.255.255.0 29- bit m ask 11111111 11111111 11111111 11111000 255.255.255.248 Network Size The size of t he net work num ber det erm ines t he m axim um num ber of possible host s you can have on your net work. The larger t he num ber of net work num ber bit s, t he sm aller t he num ber of rem aining host I D bit s. An I P address wit h host I Ds of all zeros is t he I P address of t he net work ( 192.168.1.0 wit h a 24- bit subnet m ask, for exam ple) . An I P address wit h host I Ds of all ones is t he broadcast address for t hat net work ( 192.168.1.255 wit h a 24- bit subnet m ask, for exam ple) . As t hese t wo I P addresses cannot be used for individual host s, calculat e t he m axim um num ber of possible host s in a net work as follows: Table 44 Maxim um Host Num bers SUBNET MASK HOST ID SIZE MAXIMUM NUMBER OF HOSTS 24 8 bit s 255.0.0.0 24 bit s 16 bit s 255.255.0.0 16 bit s 2 16 – 2 24 bit s 29 bit s 255.255.255.0 255.255.255.24 8 bit s 3 bit s – 2 16777214 65534 254 2 – 2 2 – 2 Notation Since t he m ask is always a cont inuous num ber of ones beginning from t he left , followed by a cont inuous num ber of zeros for t he rem ainder of t he 32 bit m ask, you can sim ply specify t he num ber of ones inst ead of writ ing t he value of each oct et . This is usually specified by writ ing a “ / ” followed by t he num ber of bit s in t he m ask aft er t he address. For exam ple, 192.1.1.0 / 25 is equivalent t o saying 192.1.1.0 wit h subnet m ask 255.255.255.128. NWA1121-NI User’s Guide 175 Appendix C IP Addresses and Subnetting The following t able shows som e possible subnet m asks using bot h not at ions. Table 45 Alt ernat ive Subnet Mask Not at ion SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.0 / 24 0000 0000 255.255.255.128 / 25 1000 0000 128 255.255.255.192 / 26 1100 0000 192 255.255.255.224 / 27 1110 0000 224 255.255.255.240 / 28 1111 0000 240 255.255.255.248 / 29 1111 1000 248 255.255.255.252 / 30 1111 1100 252 Subnetting You can use subnet t ing t o divide one net work int o m ult iple sub- net works. I n t he following exam ple a net work adm inist rat or creat es t wo sub- net works t o isolat e a group of servers from t he rest of t he com pany net work for securit y reasons. I n t his exam ple, t he com pany net work address is 192.168.1.0. The first t hree oct et s of t he address ( 192.168.1) are t he net work num ber, and t he rem aining oct et is t he host I D, allowing a m axim um of 2 8 – 2 or 254 possible host s. The following figure shows t he com pany net work before subnet t ing. Figure 93 Subnet t ing Exam ple: Before Subnet t ing You can “ borrow” one of t he host I D bit s t o divide t he net work 192.168.1.0 int o t wo separat e subnet works. The subnet m ask is now 25 bit s ( 255.255.255.128 or / 25) . The “ borrowed” host I D bit can have a value of eit her 0 or 1, allowing t wo subnet s; 192.168.1.0 / 25 and 192.168.1.128 / 25. 176 NWA1121-NI User’s Guide Appendix C IP Addresses and Subnetting The following figure shows t he com pany net work aft er subnet t ing. There are now t wo subnet works, A and B. Figure 94 Subnet t ing Exam ple: Aft er Subnet t ing I n a 25- bit subnet t he host I D has 7 bit s, so each sub- net work has a m axim um of 2 7 – 2 or 126 possible host s ( a host I D of all zeroes is t he subnet ’s address it self, all ones is t he subnet ’s broadcast address) . 192.168.1.0 wit h m ask 255.255.255.128 is subnet A it self, and 192.168.1.127 wit h m ask 255.255.255.128 is it s broadcast address. Therefore, t he lowest I P address t hat can be assigned t o an act ual host for subnet A is 192.168.1.1 and t he highest is 192.168.1.126. Sim ilarly, t he host I D range for subnet B is 192.168.1.129 t o 192.168.1.254. Example: Four Subnets The previous exam ple illust rat ed using a 25- bit subnet m ask t o divide a 24- bit address int o t wo subnet s. Sim ilarly, t o divide a 24- bit address int o four subnet s, you need t o “ borrow” t wo host I D bit s t o give four possible com binat ions ( 00, 01, 10 and 11) . The subnet m ask is 26 bit s ( 11111111.11111111.11111111.1 1 000000) or 255.255.255.192. Each subnet cont ains 6 host I D bit s, giving 2 6 - 2 or 62 host s for each subnet ( a host I D of all zeroes is t he subnet it self, all ones is t he subnet ’s broadcast address) . Table 46 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE I P Address ( Decim al) 192.168.1. I P Address ( Binary) 11000000.10101000.00000001. 0 0 000000 Subnet Mask ( Binary) 11111111.11111111.11111111. 1 1 000000 NWA1121-NI User’s Guide 177 Appendix C IP Addresses and Subnetting Table 46 Subnet 1 ( cont inued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host I D: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host I D: 192.168.1.62 LAST OCTET BIT VALUE Table 47 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE I P Address 192.168.1. 64 I P Address ( Binary) 11000000.10101000.00000001. 0 1 000000 Subnet Mask ( Binary) 11111111.11111111.11111111. 1 1 000000 Subnet Address: 192.168.1.64 Lowest Host I D: 192.168.1.65 Broadcast Address: 192.168.1.127 Highest Host I D: 192.168.1.126 Table 48 Subnet 3 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE I P Address 192.168.1. 128 I P Address ( Binary) 11000000.10101000.00000001. 1 0 000000 Subnet Mask ( Binary) 11111111.11111111.11111111. 1 1 000000 Subnet Address: 192.168.1.128 Lowest Host I D: 192.168.1.129 Broadcast Address: 192.168.1.191 Highest Host I D: 192.168.1.190 Table 49 Subnet 4 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE I P Address 192.168.1. 192 I P Address ( Binary) 11000000.10101000.00000001. 1 1 000000 Subnet Mask ( Binary) 11111111.11111111.11111111. 1 1 000000 Subnet Address: 192.168.1.192 Lowest Host I D: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host I D: 192.168.1.254 Example: Eight Subnets Sim ilarly, use a 27- bit m ask t o creat e eight subnet s ( 000, 001, 010, 011, 100, 101, 110 and 111) . 178 NWA1121-NI User’s Guide Appendix C IP Addresses and Subnetting The following t able shows I P address last oct et values for each subnet . Table 50 Eight Subnet s SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 30 31 32 33 62 63 64 65 94 95 96 97 126 127 128 129 158 159 160 161 190 191 192 193 222 223 224 225 254 255 Subnet Planning The following t able is a sum m ary for subnet planning on a net work wit h a 24- bit net work num ber. Table 51 24- bit Net work Num ber Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 255.255.255.128 ( / 25) 126 255.255.255.192 ( / 26) 62 255.255.255.224 ( / 27) 30 255.255.255.240 ( / 28) 16 14 255.255.255.248 ( / 29) 32 255.255.255.252 ( / 30) 64 255.255.255.254 ( / 31) 128 The following t able is a sum m ary for subnet planning on a net work wit h a 16- bit net work num ber. Table 52 16- bit Net work Num ber Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 255.255.128.0 ( / 17) 32766 255.255.192.0 ( / 18) 16382 255.255.224.0 ( / 19) 8190 255.255.240.0 ( / 20) 16 4094 255.255.248.0 ( / 21) 32 2046 255.255.252.0 ( / 22) 64 1022 255.255.254.0 ( / 23) 128 510 255.255.255.0 ( / 24) 256 254 255.255.255.128 ( / 25) 512 126 10 255.255.255.192 ( / 26) 1024 62 11 255.255.255.224 ( / 27) 2048 30 12 255.255.255.240 ( / 28) 4096 14 NWA1121-NI User’s Guide 179 Appendix C IP Addresses and Subnetting Table 52 16- bit Net work Num ber Subnet Planning ( cont inued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 ( / 29) 8192 14 255.255.255.252 ( / 30) 16384 15 255.255.255.254 ( / 31) 32768 Configuring IP Addresses Where you obt ain your net work num ber depends on your part icular sit uat ion. I f t he I SP or your net work adm inist rat or assigns you a block of regist ered I P addresses, follow t heir inst ruct ions in select ing t he I P addresses and t he subnet m ask. I f t he I SP did not explicit ly give you an I P net work num ber, t hen m ost likely you have a single user account and t he I SP will assign you a dynam ic I P address when t he connect ion is est ablished. I f t his is t he case, it is recom m ended t hat you select a net work num ber from 192.168.0.0 t o 192.168.255.0. The I nt ernet Assigned Num ber Aut horit y ( I ANA) reserved t his block of addresses specifically for privat e use; please do not use any ot her num ber unless you are t old ot herwise. You m ust also enable Net work Address Translat ion ( NAT) on t he NWA1121- NI . Once you have decided on t he net work num ber, pick an I P address for your NWA1121- NI t hat is easy t o rem em ber ( for inst ance, 192.168.1.1) but m ake sure t hat no ot her device on your net work is using t hat I P address. The subnet m ask specifies t he net work num ber port ion of an I P address. Your NWA1121- NI will com put e t he subnet m ask aut om at ically based on t he I P address t hat you ent ered. You don't need t o change t he subnet m ask com put ed by t he NWA1121- NI unless you are inst ruct ed t o do ot herwise. Private IP Addresses Every m achine on t he I nt ernet m ust have a unique address. I f your net works are isolat ed from t he I nt ernet ( running only bet ween t wo branch offices, for exam ple) you can assign any I P addresses t o t he host s wit hout problem s. However, t he I nt ernet Assigned Num bers Aut horit y ( I ANA) has reserved t he following t hree blocks of I P addresses specifically for privat e net works: • 10.0.0.0 • 172.16.0.0 — 10.255.255.255 — 172.31.255.255 • 192.168.0.0 — 192.168.255.255 You can obt ain your I P address from t he I ANA, from an I SP, or it can be assigned from a privat e net work. I f you belong t o a sm all organizat ion and your I nt ernet access is t hrough an I SP, t he I SP can provide you wit h t he I nt ernet addresses for your local net works. On t he ot her hand, if you are part of a m uch larger organizat ion, you should consult your net work adm inist rat or for t he appropriat e I P addresses. Regardless of your part icular sit uat ion, do not creat e an arbit rary I P address; always follow t he guidelines above. For m ore inform at ion on address assignm ent , please refer t o RFC 1597, Address Allocat ion for Privat e I nt ernet s and RFC 1466, Guidelines for Managem ent of I P Address Space. 180 NWA1121-NI User’s Guide A PPENDIX Wireless LANs Wireless LAN Topologies This sect ion discusses ad- hoc and infrast ruct ure wireless LAN t opologies. Ad-hoc Wireless LAN Configuration The sim plest WLAN configurat ion is an independent ( Ad- hoc) WLAN t hat connect s a set of com put ers wit h wireless adapt ers ( A, B, C) . Any t im e t wo or m ore wireless adapt ers are wit hin range of each ot her, t hey can set up an independent net work, which is com m only referred t o as an ad- hoc net work or I ndependent Basic Service Set ( I BSS) . The following diagram shows an exam ple of not ebook com put ers using wireless adapt ers t o form an ad- hoc wireless LAN. Figure 95 Peer- t o- Peer Com m unicat ion in an Ad- hoc Net work BSS A Basic Service Set ( BSS) exist s when all com m unicat ions bet ween wireless client s or bet ween a wireless client and a wired net work client go t hrough one access point ( AP) . I nt ra- BSS t raffic is t raffic bet ween wireless client s in t he BSS. When I nt ra- BSS is enabled, wireless client A and B can access t he wired net work and com m unicat e wit h each ot her. When I nt ra- BSS is NWA1121-NI User’s Guide 181 Appendix D Wireless LANs disabled, wireless client A and B can st ill access t he wired net work but cannot com m unicat e wit h each ot her. Figure 96 Basic Service Set ESS An Ext ended Service Set ( ESS) consist s of a series of overlapping BSSs, each cont aining an access point , wit h each access point connect ed t oget her by a wired net work. This wired connect ion bet ween APs is called a Dist ribut ion Syst em ( DS) . This t ype of wireless LAN t opology is called an I nfrast ruct ure WLAN. The Access Point s not only provide com m unicat ion wit h t he wired net work but also m ediat e wireless net work t raffic in t he im m ediat e neighborhood. 182 NWA1121-NI User’s Guide Appendix D Wireless LANs An ESSI D ( ESS I Dent ificat ion) uniquely ident ifies each ESS. All access point s and t heir associat ed wireless client s wit hin t he sam e ESS m ust have t he sam e ESSI D in order t o com m unicat e. Figure 97 I nfrast ruct ure WLAN Channel A channel is t he radio frequency( ies) used by wireless devices t o t ransm it and receive dat a. Channels available depend on your geographical area. You m ay have a choice of channels ( for your region) so you should use a channel different from an adj acent AP ( access point ) t o reduce int erference. I nt erference occurs when radio signals from different access point s overlap causing int erference and degrading perform ance. Adj acent channels part ially overlap however. To avoid int erference due t o overlap, your AP should be on a channel at least five channels away from a channel t hat an adj acent AP is using. For exam ple, if your region has 11 channels and an adj acent AP is using channel 1, t hen you need t o select a channel bet ween 6 or 11. RTS/CTS A hidden node occurs when t wo st at ions are wit hin range of t he sam e access point , but are not wit hin range of each ot her. The following figure illust rat es a hidden node. Bot h st at ions ( STA) are wit hin range of t he access point ( AP) or wireless gat eway, but out- of- range of each ot her, so t hey NWA1121-NI User’s Guide 183 Appendix D Wireless LANs cannot " hear" each ot her, t hat is t hey do not know if t he channel is current ly being used. Therefore, t hey are considered hidden from each ot her. Figure 98 RTS/ CTS When st at ion A sends dat a t o t he AP, it m ight not know t hat t he st at ion B is already using t he channel. I f t hese t wo st at ions send dat a at t he sam e t im e, collisions m ay occur when bot h set s of dat a arrive at t he AP at t he sam e t im e, result ing in a loss of m essages for bot h st at ions. RTS/ CTS is designed t o prevent collisions due t o hidden nodes. An RTS/ CTS defines t he biggest size dat a fram e you can send before an RTS ( Request To Send) / CTS ( Clear t o Send) handshake is invoked. When a dat a fram e exceeds t he RTS/ CTS value you set ( bet ween 0 t o 2432 byt es) , t he st at ion t hat want s t o t ransm it t his fram e m ust first send an RTS ( Request To Send) m essage t o t he AP for perm ission t o send it . The AP t hen responds wit h a CTS ( Clear t o Send) m essage t o all ot her st at ions wit hin it s range t o not ify t hem t o defer t heir t ransm ission. I t also reserves and confirm s wit h t he request ing st at ion t he t im e fram e for t he request ed t ransm ission. St at ions can send fram es sm aller t han t he specified RTS/ CTS direct ly t o t he AP wit hout t he RTS ( Request To Send) / CTS ( Clear t o Send) handshake. You should only configure RTS/ CTS if t he possibilit y of hidden nodes exist s on your net work and t he " cost " of resending large fram es is m ore t han t he ext ra net work overhead involved in t he RTS ( Request To Send) / CTS ( Clear t o Send) handshake. I f t he RTS/ CTS value is great er t han t he Fr a gm e nt a t ion Thr e sh old value ( see next ) , t hen t he RTS ( Request To Send) / CTS ( Clear t o Send) handshake will never occur as dat a fram es will be fragm ent ed before t hey reach RTS/ CTS size. Not e: Enabling t he RTS Threshold causes redundant net w ork overhead t hat could negat ively affect t he t hroughput perfor m ance inst ead of pr oviding a rem edy. Fragmentation Threshold A Fr a gm e nt a t ion Thr e sh old is t he m axim um dat a fragm ent size ( bet ween 256 and 2432 byt es) t hat can be sent in t he wireless net work before t he AP will fragm ent t he packet int o sm aller dat a fram es. A large Fr a gm e n t a t ion Th r e sh old is recom m ended for net works not prone t o int erference while you should set a sm aller t hreshold for busy net works or net works t hat are prone t o int erference. 184 NWA1121-NI User’s Guide Appendix D Wireless LANs I f t he Fr a gm e nt a t ion Thr e shold value is sm aller t han t he RTS/ CTS value ( see previously) you set t hen t he RTS ( Request To Send) / CTS ( Clear t o Send) handshake will never occur as dat a fram es will be fragm ent ed before t hey reach RTS/ CTS size. Preamble Type Pream ble is used t o signal t hat dat a is com ing t o t he receiver. Short and long refer t o t he lengt h of t he synchronizat ion field in a packet . Short pream ble increases perform ance as less t im e sending pream ble m eans m ore t im e for sending dat a. All I EEE 802.11 com pliant wireless adapt ers support long pream ble, but not all support short pream ble. Use long pream ble if you are unsure what pream ble m ode ot her wireless devices on t he net work support , and t o provide m ore reliable com m unicat ions in busy wireless net works. Use short pream ble if you are sure all wireless devices on t he net work support it , and t o provide m ore efficient com m unicat ions. Use t he dynam ic set t ing t o aut om at ically use short pream ble when all wireless devices on t he net work support it , ot herwise t he NWA1121- NI uses long pream ble. Not e: The wireless devices MUST use t he sam e pream ble m ode in order t o com m unicat e. IEEE 802.11g Wireless LAN I EEE 802.11g is fully com pat ible wit h t he I EEE 802.11b st andard. This m eans an I EEE 802.11b adapt er can int erface direct ly wit h an I EEE 802.11g access point ( and vice versa) at 11 Mbps or lower depending on range. I EEE 802.11g has several int erm ediat e rat e st eps bet ween t he m axim um and m inim um dat a rat es. The I EEE 802.11g dat a rat e and m odulat ion are as follows: Table 53 I EEE 802.11g DATA RATE (MBPS) MODULATION DBPSK ( Different ial Binary Phase Shift Keyed) DQPSK ( Different ial Quadrat ure Phase Shift Keying) 5.5 / 11 CCK ( Com plem ent ary Code Keying) 6/ 9/ 12/ 18/ 24/ 36/ 48/ 54 OFDM ( Ort hogonal Frequency Division Mult iplexing) Wireless Security Overview Wireless securit y is vit al t o your net work t o prot ect wireless com m unicat ion bet ween wireless client s, access point s and t he wired net work. Wireless securit y m et hods available on t he NWA1121- NI are dat a encrypt ion, wireless client aut hent icat ion, rest rict ing access by device MAC address and hiding t he NWA1121- NI ident it y. NWA1121-NI User’s Guide 185 Appendix D Wireless LANs The following figure shows t he relat ive effect iveness of t hese wireless securit y m et hods available on your NWA1121- NI . Table 54 Wireless Securit y Levels SECURITY LEVEL Least Secure SECURITY TYPE Unique SSI D ( Default ) Unique SSI D wit h Hide SSI D Enabled MAC Address Filt ering WEP Encrypt ion I EEE802.1x EAP wit h RADI US Server Aut hent icat ion Wi- Fi Prot ect ed Access ( WPA) WPA2 Most Secure Not e: You m ust enable t he sam e wireless securit y set t ings on t he NWA1121- NI and on all wireless client s t hat you want t o associat e wit h it . IEEE 802.1x I n June 2001, t he I EEE 802.1x st andard was designed t o ext end t he feat ures of I EEE 802.11 t o support ext ended aut hent icat ion as well as providing addit ional account ing and cont rol feat ures. I t is support ed by Windows XP and a num ber of net work devices. Som e advant ages of I EEE 802.1x are: • User based ident ificat ion t hat allows for roam ing. • Support for RADI US ( Rem ot e Aut hent icat ion Dial I n User Service, RFC 2138, 2139) for cent ralized user profile and account ing m anagem ent on a net work RADI US server. • Support for EAP ( Ext ensible Aut hent icat ion Prot ocol, RFC 2486) t hat allows addit ional aut hent icat ion m et hods t o be deployed wit h no changes t o t he access point or t he wireless client s. RADIUS RADI US is based on a client- server m odel t hat support s aut hent icat ion, aut horizat ion and account ing. The access point is t he client and t he server is t he RADI US server. The RADI US server handles t he following t asks: • Aut hent icat ion Det erm ines t he ident it y of t he users. • Aut horizat ion Det erm ines t he net work services available t o aut hent icat ed users once t hey are connect ed t o t he net work. • Account ing Keeps t rack of t he client ’s net work act ivit y. 186 NWA1121-NI User’s Guide Appendix D Wireless LANs RADI US is a sim ple package exchange in which your AP act s as a m essage relay bet ween t he wireless client and t he net work RADI US server. Types of RADIUS Messages The following t ypes of RADI US m essages are exchanged bet ween t he access point and t he RADI US server for user aut hent icat ion: • Access- Request Sent by an access point request ing aut hent icat ion. • Access- Rej ect Sent by a RADI US server rej ect ing access. • Access-Accept Sent by a RADI US server allowing access. • Access- Challenge Sent by a RADI US server request ing m ore inform at ion in order t o allow access. The access point sends a proper response from t he user and t hen sends anot her Access- Request m essage. The following t ypes of RADI US m essages are exchanged bet ween t he access point and t he RADI US server for user account ing: • Account ing- Request Sent by t he access point request ing account ing. • Account ing- Response Sent by t he RADI US server t o indicat e t hat it has st art ed or st opped account ing. I n order t o ensure net work securit y, t he access point and t he RADI US server use a shared secret key, which is a password, t hey bot h know. The key is not sent over t he net work. I n addit ion t o t he shared key, password inform at ion exchanged is also encrypt ed t o prot ect t he net work from unaut horized access. Types of EAP Authentication This sect ion discusses som e popular aut hent icat ion t ypes: EAP- MD5, EAP-TLS, EAP-TTLS, PEAP and LEAP. Your wireless LAN device m ay not support all aut hent icat ion t ypes. EAP ( Ext ensible Aut hent icat ion Prot ocol) is an aut hent icat ion prot ocol t hat runs on t op of t he I EEE 802.1x t ransport m echanism in order t o support m ult iple t ypes of user aut hent icat ion. By using EAP t o int eract wit h an EAP- com pat ible RADI US server, an access point helps a wireless st at ion and a RADI US server perform aut hent icat ion. The t ype of aut hent icat ion you use depends on t he RADI US server and an int erm ediary AP( s) t hat support s I EEE 802.1x. . For EAP-TLS aut hent icat ion t ype, you m ust first have a wired connect ion t o t he net work and obt ain t he cert ificat e( s) from a cert ificat e aut horit y ( CA) . A cert ificat e ( also called digit al I Ds) can be used t o aut hent icat e users and a CA issues cert ificat es and guarant ees t he ident it y of each cert ificat e owner. NWA1121-NI User’s Guide 187 Appendix D Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 aut hent icat ion is t he sim plest one- way aut hent icat ion m et hod. The aut hent icat ion server sends a challenge t o t he wireless client . The wireless client ‘proves’ t hat it knows t he password by encrypt ing t he password wit h t he challenge and sends back t he inform at ion. Password is not sent in plain t ext . However, MD5 aut hent icat ion has som e weaknesses. Since t he aut hent icat ion server needs t o get t he plaint ext passwords, t he passwords m ust be st ored. Thus som eone ot her t han t he aut hent icat ion server m ay access t he password file. I n addit ion, it is possible t o im personat e an aut hent icat ion server as MD5 aut hent icat ion m et hod does not perform m ut ual aut hent icat ion. Finally, MD5 aut hent icat ion m et hod does not support dat a encrypt ion wit h dynam ic session key. You m ust configure WEP encrypt ion keys for dat a encrypt ion. EAP-TLS (Transport Layer Security) Wit h EAP-TLS, digit al cert ificat ions are needed by bot h t he server and t he wireless client s for m ut ual aut hent icat ion. The server present s a cert ificat e t o t he client . Aft er validat ing t he ident it y of t he server, t he client sends a different cert ificat e t o t he server. The exchange of cert ificat es is done in t he open before a secured t unnel is creat ed. This m akes user ident it y vulnerable t o passive at t acks. A digit al cert ificat e is an elect ronic I D card t hat aut hent icat es t he sender ’s ident it y. However, t o im plem ent EAP-TLS, you need a Cert ificat e Aut horit y ( CA) t o handle cert ificat es, which im poses a m anagem ent overhead. EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an ext ension of t he EAP-TLS aut hent icat ion t hat uses cert ificat es for only t he serverside aut hent icat ions t o est ablish a secure connect ion. Client aut hent icat ion is t hen done by sending usernam e and password t hrough t he secure connect ion, t hus client ident it y is prot ect ed. For client aut hent icat ion, EAP-TTLS support s EAP m et hods and legacy aut hent icat ion m et hods such as PAP, CHAP, MS- CHAP and MS- CHAP v2. PEAP (Protected EAP) Like EAP-TTLS, server- side cert ificat e aut hent icat ion is used t o est ablish a secure connect ion, t hen use sim ple usernam e and password m et hods t hrough t he secured connect ion t o aut hent icat e t he client s, t hus hiding client ident it y. However, PEAP only support s EAP m et hods, such as EAP- MD5, EAP- MSCHAPv2 and EAP- GTC ( EAP- Generic Token Card) , for client aut hent icat ion. EAP- GTC is im plem ent ed only by Cisco. LEAP LEAP ( Light weight Ext ensible Aut hent icat ion Prot ocol) is a Cisco im plem ent at ion of I EEE 802.1x. Dynamic WEP Key Exchange The AP m aps a unique key t hat is generat ed wit h t he RADI US server. This key expires when t he wireless connect ion t im es out , disconnect s or reaut hent icat ion t im es out . A new WEP key is generat ed each t im e reaut hent icat ion is perform ed. 188 NWA1121-NI User’s Guide Appendix D Wireless LANs I f t his feat ure is enabled, it is not necessary t o configure a default encrypt ion key in t he wireless securit y configurat ion screen. You m ay st ill configure and st ore keys, but t hey will not be used while dynam ic WEP is enabled. Not e: EAP- MD5 cannot be used wit h Dynam ic WEP Key Exchange For added securit y, cert ificat e- based aut hent icat ions ( EAP-TLS, EAP-TTLS and PEAP) use dynam ic keys for dat a encrypt ion. They are oft en deployed in corporat e environm ent s, but for public deploym ent , a sim ple user nam e and password pair is m ore pract ical. The following t able is a com parison of t he feat ures of aut hent icat ion t ypes. Table 55 Com parison of EAP Aut hent icat ion Types EAP-MD5 EAP-TLS EAP-TTLS PEAP LEAP Mut ual Aut hent icat ion No Yes Yes Yes Yes Cert ificat e – Client No Yes Opt ional Opt ional No Cert ificat e – Server No Yes Yes Yes No Dynam ic Key Exchange No Yes Yes Yes Yes Credent ial I nt egrit y None St rong St rong St rong Moderat e Deploym ent Difficult y Easy Hard Moderat e Moderat e Moderat e Client I dent it y Prot ect ion No No Yes Yes No WPA and WPA2 Wi- Fi Prot ect ed Access ( WPA) is a subset of t he I EEE 802.11i st andard. WPA2 ( I EEE 802.11i) is a wireless securit y st andard t hat defines st ronger encrypt ion, aut hent icat ion and key m anagem ent t han WPA. Key differences bet ween WPA or WPA2 and WEP are im proved dat a encrypt ion and user aut hent icat ion. I f bot h an AP and t he wireless client s support WPA2 and you have an ext ernal RADI US server, use WPA2 for st ronger dat a encrypt ion. I f you don't have an ext ernal RADI US server, you should use WPA2- PSK ( WPA2- Pre- Shared Key) t hat only requires a single ( ident ical) password ent ered int o each access point , wireless gat eway and wireless client . As long as t he passwords m at ch, a wireless client will be grant ed access t o a WLAN. I f t he AP or t he wireless client s do not support WPA2, j ust use WPA or WPA- PSK depending on whet her you have an ext ernal RADI US server or not . Select WEP only when t he AP and/ or wireless client s do not support WPA or WPA2. WEP is less secure t han WPA or WPA2. Encryption WPA im proves dat a encrypt ion by using Tem poral Key I nt egrit y Prot ocol ( TKI P) , Message I nt egrit y Check ( MI C) and I EEE 802.1x. WPA2 also uses TKI P when required for com pat ibilit y reasons, but offers st ronger encrypt ion t han TKI P wit h Advanced Encrypt ion St andard ( AES) in t he Count er m ode wit h Cipher block chaining Message aut hent icat ion code Prot ocol ( CCMP) . TKI P uses 128- bit keys t hat are dynam ically generat ed and dist ribut ed by t he aut hent icat ion server. AES ( Advanced Encrypt ion St andard) is a block cipher t hat uses a 256- bit m at hem at ical algorit hm NWA1121-NI User’s Guide 189 Appendix D Wireless LANs called Rij ndael. They bot h include a per- packet key m ixing funct ion, a Message I nt egrit y Check ( MI C) nam ed Michael, an ext ended init ializat ion vect or ( I V) wit h sequencing rules, and a re- keying m echanism . WPA and WPA2 regularly change and rot at e t he encrypt ion keys so t hat t he sam e encrypt ion key is never used t wice. The RADI US server dist ribut es a Pairwise Mast er Key ( PMK) key t o t he AP t hat t hen set s up a key hierarchy and m anagem ent syst em , using t he PMK t o dynam ically generat e unique dat a encrypt ion keys t o encrypt every dat a packet t hat is wirelessly com m unicat ed bet ween t he AP and t he wireless client s. This all happens in t he background aut om at ically. The Message I nt egrit y Check ( MI C) is designed t o prevent an at t acker from capt uring dat a packet s, alt ering t hem and resending t hem . The MI C provides a st rong m at hem at ical funct ion in which t he receiver and t he t ransm it t er each com put e and t hen com pare t he MI C. I f t hey do not m at ch, it is assum ed t hat t he dat a has been t am pered wit h and t he packet is dropped. By generat ing unique dat a encrypt ion keys for every dat a packet and by creat ing an int egrit y checking m echanism ( MI C) , wit h TKI P and AES it is m ore difficult t o decrypt dat a on a Wi- Fi net work t han WEP and difficult for an int ruder t o break int o t he net work. The encrypt ion m echanism s used for WPA( 2) and WPA( 2) - PSK are t he sam e. The only difference bet ween t he t wo is t hat WPA( 2) - PSK uses a sim ple com m on password, inst ead of user- specific credent ials. The com m on- password approach m akes WPA( 2) - PSK suscept ible t o brut e- force password- guessing at t acks but it ’s st ill an im provem ent over WEP as it em ploys a consist ent , single, alphanum eric password t o derive a PMK which is used t o generat e unique t em poral encrypt ion keys. This prevent all wireless devices sharing t he sam e encrypt ion keys. ( a weakness of WEP) User Authentication WPA and WPA2 apply I EEE 802.1x and Ext ensible Aut hent icat ion Prot ocol ( EAP) t o aut hent icat e wireless client s using an ext ernal RADI US dat abase. WPA2 reduces t he num ber of key exchange m essages from six t o four ( CCMP 4- way handshake) and short ens t he t im e required t o connect t o a net work. Ot her WPA2 aut hent icat ion feat ures t hat are different from WPA include key caching and pre- aut hent icat ion. These t wo feat ures are opt ional and m ay not be support ed in all wireless devices. Key caching allows a wireless client t o st ore t he PMK it derived t hrough a successful aut hent icat ion wit h an AP. The wireless client uses t he PMK when it t ries t o connect t o t he sam e AP and does not need t o go wit h t he aut hent icat ion process again. Pre- aut hent icat ion enables fast roam ing by allowing t he wireless client ( already connect ing t o an AP) t o perform I EEE 802.1x aut hent icat ion wit h anot her AP before connect ing t o it . Wireless Client WPA Supplicants A wireless client supplicant is t he soft ware t hat runs on an operat ing syst em inst ruct ing t he wireless client how t o use WPA. At t he t im e of writ ing, t he m ost widely available supplicant is t he WPA pat ch for Windows XP, Funk Soft ware's Odyssey client . The Windows XP pat ch is a free download t hat adds WPA capabilit y t o Windows XP's built- in " Zero Configurat ion" wireless client . However, you m ust run Windows XP t o use it . 190 NWA1121-NI User’s Guide Appendix D Wireless LANs WPA(2) with RADIUS Application Example To set up WPA( 2) , you need t he I P address of t he RADI US server, it s port num ber ( default is 1812) , and t he RADI US shared secret . A WPA( 2) applicat ion exam ple wit h an ext ernal RADI US server looks as follows. " A" is t he RADI US server. " DS" is t he dist ribut ion syst em . The AP passes t he wireless client 's aut hent icat ion request t o t he RADI US server. The RADI US server t hen checks t he user's ident ificat ion against it s dat abase and grant s or denies net work access accordingly. A 256- bit Pairwise Mast er Key ( PMK) is derived from t he aut hent icat ion process by t he RADI US server and t he client . The RADI US server dist ribut es t he PMK t o t he AP. The AP t hen set s up a key hierarchy and m anagem ent syst em , using t he PMK t o dynam ically generat e unique dat a encrypt ion keys. The keys are used t o encrypt every dat a packet t hat is wirelessly com m unicat ed bet ween t he AP and t he wireless client s. Figure 99 WPA( 2) wit h RADI US Applicat ion Exam ple WPA(2)-PSK Application Example A WPA( 2) - PSK applicat ion looks as follows. First ent er ident ical passwords int o t he AP and all wireless client s. The Pre- Shared Key ( PSK) m ust consist of bet ween 8 and 63 ASCI I charact ers or 64 hexadecim al charact ers ( including spaces and sym bols) . The AP checks each wireless client 's password and allows it t o j oin t he net work only if t he password m at ches. The AP and wireless client s generat e a com m on PMK ( Pairwise Mast er Key) . The key it self is not sent over t he net work, but is derived from t he PSK and t he SSI D. NWA1121-NI User’s Guide 191 Appendix D Wireless LANs The AP and wireless client s use t he TKI P or AES encrypt ion process, t he PMK and inform at ion exchanged in a handshake t o creat e t em poral encrypt ion keys. They use t hese keys t o encrypt dat a exchanged bet ween t hem . Figure 100 WPA( 2) - PSK Aut hent icat ion Security Parameters Summary Refer t o t his t able t o see what ot her securit y param et ers you should configure for each aut hent icat ion m et hod or key m anagem ent prot ocol t ype. MAC address filt ers are not dependent on how you configure t hese securit y feat ures. Table 56 Wireless Securit y Relat ional Mat rix AUTHENTICATION ENCRYPTIO METHOD/ KEY MANAGEMENT PROTOCOL N METHOD ENTER MANUAL KEY IEEE 802.1X Open No Disable None Enable wit hout Dynam ic WEP Key Open Shared WEP WEP No Enable wit h Dynam ic WEP Key Yes Enable wit hout Dynam ic WEP Key Yes Disable No Enable wit h Dynam ic WEP Key Yes Enable wit hout Dynam ic WEP Key Yes Disable WPA TKI P/ AES No Enable WPA- PSK TKI P/ AES Yes Disable WPA2 TKI P/ AES No Enable WPA2- PSK TKI P/ AES Yes Disable Antenna Overview An ant enna couples RF signals ont o air. A t ransm it t er wit hin a wireless device sends an RF signal t o t he ant enna, which propagat es t he signal t hrough t he air. The ant enna also operat es in reverse by capt uring RF signals from t he air. 192 NWA1121-NI User’s Guide Appendix D Wireless LANs Posit ioning t he ant ennas properly increases t he range and coverage area of a wireless LAN. Antenna Characteristics Frequency An ant enna in t he frequency of 2.4GHz or 5GHz is needed t o com m unicat e efficient ly in a wireless LAN Radiation Pattern A radiat ion pat t ern is a diagram t hat allows you t o visualize t he shape of t he ant enna’s coverage area. Antenna Gain Ant enna gain, m easured in dB ( decibel) , is t he increase in coverage wit hin t he RF beam widt h. Higher ant enna gain im proves t he range of t he signal for bet t er com m unicat ions. For an indoor sit e, each 1 dB increase in ant enna gain result s in a range increase of approxim at ely 2.5% . For an unobst ruct ed out door sit e, each 1dB increase in gain result s in a range increase of approxim at ely 5% . Act ual result s m ay vary depending on t he net work environm ent . Ant enna gain is som et im es specified in dBi, which is how m uch t he ant enna increases t he signal power com pared t o using an isot ropic ant enna. An isot ropic ant enna is a t heoret ical perfect ant enna t hat sends out radio signals equally well in all direct ions. dBi represent s t he t rue gain t hat t he ant enna provides. Types of Antennas for WLAN There are t wo t ypes of ant ennas used for wireless LAN applicat ions. • Om ni- direct ional ant ennas send t he RF signal out in all direct ions on a horizont al plane. The coverage area is t orus- shaped ( like a donut ) which m akes t hese ant ennas ideal for a room environm ent . Wit h a wide coverage area, it is possible t o m ake circular overlapping coverage areas wit h m ult iple access point s. • Direct ional ant ennas concent rat e t he RF signal in a beam , like a flashlight does wit h t he light from it s bulb. The angle of t he beam det erm ines t he widt h of t he coverage pat t ern. Angles t ypically range from 20 degrees ( very direct ional) t o 120 degrees ( less direct ional) . Direct ional ant ennas are ideal for hallways and out door point- t o- point applicat ions. Positioning Antennas I n general, ant ennas should be m ount ed as high as pract ically possible and free of obst ruct ions. I n point- t o–point applicat ion, posit ion bot h ant ennas at t he sam e height and in a direct line of sight t o each ot her t o at t ain t he best perform ance. For om ni- direct ional ant ennas m ount ed on a t able, desk, and so on, point t he ant enna up. For om ni- direct ional ant ennas m ount ed on a wall or ceiling, point t he ant enna down. For a single AP applicat ion, place om ni- direct ional ant ennas as close t o t he cent er of t he coverage area as possible. NWA1121-NI User’s Guide 193 Appendix D Wireless LANs For direct ional ant ennas, point t he ant enna in t he direct ion of t he desired coverage area. 194 NWA1121-NI User’s Guide A PPENDIX Legal Information Copyright Copyright © 2012 by ZyXEL Com m unicat ions Corporat ion. The cont ent s of t his publicat ion m ay not be reproduced in any part or as a whole, t ranscribed, st ored in a ret rieval syst em , t ranslat ed int o any language, or t ransm it t ed in any form or by any m eans, elect ronic, m echanical, m agnet ic, opt ical, chem ical, phot ocopying, m anual, or ot herwise, wit hout t he prior writ t en perm ission of ZyXEL Com m unicat ions Corporat ion. Published by ZyXEL Com m unicat ions Corporat ion. All right s reserved. Disclaimers ZyXEL does not assum e any liabilit y arising out of t he applicat ion or use of any product s, or soft ware described herein. Neit her does it convey any license under it s pat ent right s nor t he pat ent right s of ot hers. ZyXEL furt her reserves t he right t o m ake changes in any product s described herein wit hout not ice. This publicat ion is subj ect t o change wit hout not ice. Your use of t he NWA1121- NI is subj ect t o t he t erm s and condit ions of any relat ed service providers. Use wit h product s t hat have NAT, and/ or 3G. Do not use t he NWA1121- NI for illegal purposes. I llegal downloading or sharing of files can result in severe civil and crim inal penalt ies. You are subj ect t o t he rest rict ions of copyright laws and any ot her applicable laws, and will bear t he consequences of any infringem ent s t hereof. ZyXEL bears NO responsibilit y or liabilit y for your use of t he download service feat ure. Use for product s t hat have a download service. Make sure all dat a and program s on t he NWA1121- NI are also st ored elsewhere. ZyXEL is not responsible for any loss of or dam age t o any dat a, program s, or st orage m edia result ing from t he use, m isuse, or disuse of t his or any ot her ZyXEL product . Use for st orage/ backup devices. Trademarks Tradem arks m ent ioned in t his publicat ion are used for ident ificat ion purposes only and m ay be propert ies of t heir respect ive owners. Certifications Federal Communications Commission (FCC) Interference Statement The device com plies wit h Part 15 of FCC rules. Operat ion is subj ect t o t he following t wo condit ions: • This device m ay not cause harm ful int erference. NWA1121-NI User’s Guide 195 Appendix E Legal Information • This device m ust accept any int erference received, including int erference t hat m ay cause undesired operat ions. This device has been t est ed and found t o com ply wit h t he lim it s for a Class B digit al device pursuant t o Part 15 of t he FCC Rules. These lim it s are designed t o provide reasonable prot ect ion against harm ful int erference in a resident ial inst allat ion. This device generat es, uses, and can radiat e radio frequency energy, and if not inst alled and used in accordance wit h t he inst ruct ions, m ay cause harm ful int erference t o radio com m unicat ions. However, t here is no guarant ee t hat int erference will not occur in a part icular inst allat ion. I f t his device does cause harm ful int erference t o radio/ t elevision recept ion, which can be det erm ined by t urning t he device off and on, t he user is encouraged t o t ry t o correct t he int erference by one or m ore of t he following m easures: Reorient or relocat e t he receiving ant enna. I ncrease t he separat ion bet ween t he equipm ent and t he receiver. Connect t he equipm ent int o an out let on a circuit different from t hat t o which t he receiver is connect ed. Consult t he dealer or an experienced radio/ TV t echnician for help. FCC Caut ion: Any changes or m odificat ions not expressly approved by t he part y responsible for com pliance could void t he user's aut horit y t o operat e t his equipm ent . FCC Radiation Exposure Statement • This t ransm it t er m ust not be co- locat ed or operat ing in conj unct ion wit h any ot her ant enna or t ransm it t er. • I EEE 802.11b, 802.11g or 802.11n ( 20MHz) operat ion of t his product in t he U.S.A. is firm warelim it ed t o channels 1 t hrough 11. I EEE 802.11n ( 40MHz) operat ion of t his product in t he U.S.A. is firm ware- lim it ed t o channels 3 t hrough 9. • To com ply wit h FCC RF exposure com pliance requirem ent s, a separat ion dist ance of at least 20 cm m ust be m aint ained bet ween t he ant enna of t his device and all persons. Industry Canada Statement (For all products) This device com plies wit h RSS- 210 of t he I ndust ry Canada Rules. Operat ion is subj ect t o t he following t wo condit ions: 1) t his device m ay not cause int erference and 2) t his device m ust accept any int erference, including int erference t hat m ay cause undesired operat ion of t he device This device has been designed t o operat e wit h an ant enna having a m axim um gain of 2dBi. 196 NWA1121-NI User’s Guide Appendix E Legal Information Ant enna having a higher gain is st rict ly prohibit ed per regulat ions of I ndust ry Canada. The required ant enna im pedance is 50 ohm s. To reduce pot ent ial radio int erference t o ot her users, t he ant enna t ype and it s gain should be so chosen t hat t he EI RP is not m ore t han required for successful com m unicat ion. IMPORTANT NOTE Device for t he band 5150- 5250 MHz is only for indoor usage t o reduce pot ent ial for harm ful int erference t o co- channel m obile sat ellit e syst em s; users should also be caut ioned t o t ake not e t hat high- power radars are allocat ed as prim ary users ( m eaning t hey have priorit y) of t he bands 5250- 5350 MHz and 5650- 5850 MHz and t hese radars could cause int erference and/ or dam age t o LE- LAN devices. IC Radiation Exposure Statement This equipm ent com plies wit h I C radiat ion exposure lim it s set fort h for an uncont rolled environm ent . End users m ust follow t he specific operat ing inst ruct ions for sat isfying RF exposure com pliance. 注意 ! 依據 低功率電波輻射性電機管理辦法 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用 者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現 有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。 減少電磁波影響,請妥適使用。 Notices Changes or m odificat ions not expressly approved by t he part y responsible for com pliance could void t he user's aut horit y t o operat e t he equipm ent . This device is designed for t he WLAN 2.4 GHz and/ or 5 GHz net works t hroughout t he EC region and Swit zerland, wit h rest rict ions in France. Ce produit est conçu pour les bandes de fréquences 2,4 GHz et / ou 5 GHz conform ém ent à la législat ion Européenne. En France m ét ropolit aine, suivant les décisions n° 03- 908 et 03- 909 de l’ARCEP, la puissance d’ém ission ne devra pas dépasser 10 m W ( 10 dB) dans le cadre d’une inst allat ion WiFi en ext érieur pour les fréquences com prises ent re 2454 MHz et 2483,5 MHz. This Class B digit al apparat us com plies wit h Canadian I CES- 003. Cet appareil num érique de la classe B est conform e à la norm e NMB- 003 du Canada. CLASS 1 LASER PRODUCT APPAREI L A LASER DE CLASS 1 NWA1121-NI User’s Guide 197 Appendix E Legal Information PRODUCT COMPLI ES WI TH 21 CFR 1040.10 AND 1040.11. PRODUI T CONFORME SELON 21 CFR 1040.10 ET 1040.11. Viewing Certifications Go t o ht t p: / / www.zyxel.com . Select your product on t he ZyXEL hom e page t o go t o t hat product 's page. Select t he cert ificat ion you wish t o view from t his page. ZyXEL Limited Warranty ZyXEL warrant s t o t he original end user ( purchaser) t hat t his product is free from any defect s in m at erial or workm anship for a specific period ( t he Warrant y Period) from t he dat e of purchase. The Warrant y Period varies by region. Check wit h your vendor and/ or t he aut horized ZyXEL local dist ribut or for det ails about t he Warrant y Period of t his product . During t he warrant y period, and upon proof of purchase, should t he product have indicat ions of failure due t o fault y workm anship and/ or m at erials, ZyXEL will, at it s discret ion, repair or replace t he defect ive product s or com ponent s wit hout charge for eit her part s or labor, and t o what ever ext ent it shall deem necessary t o rest ore t he product or com ponent s t o proper operat ing condit ion. Any replacem ent will consist of a new or re- m anufact ured funct ionally equivalent product of equal or higher value, and will be solely at t he discret ion of ZyXEL. This warrant y shall not apply if t he product has been m odified, m isused, t am pered wit h, dam aged by an act of God, or subj ect ed t o abnorm al working condit ions. Note Repair or replacem ent , as provided under t his warrant y, is t he exclusive rem edy of t he purchaser. This warrant y is in lieu of all ot her warrant ies, express or im plied, including any im plied warrant y of m erchant abilit y or fit ness for a part icular use or purpose. ZyXEL shall in no event be held liable for indirect or consequent ial dam ages of any kind t o t he purchaser. To obt ain t he services of t his warrant y, cont act your vendor. You m ay also refer t o t he warrant y policy for t he region in which you bought t he device at ht t p: / / www.zyxel.com / web/ support _warrant y_info.php. Registration Regist er your product online t o receive e- m ail not ices of firm ware upgrades and inform at ion at www.zyxel.com . Open Source Licenses This product cont ains in part som e free soft ware dist ribut ed under GPL license t erm s and/ or GPL like licenses. Open source licenses are provided wit h t he firm ware package. You can download t he lat est firm ware at www.zyxel.com . To obt ain t he source code covered under t hose Licenses, please cont act support @zyxel.com .t w t o get it . 198 NWA1121-NI User’s Guide Appendix E Legal Information Regulatory Information European Union The following inform at ion applies if you use t he product wit hin t he European Union. Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Com pliance I nform at ion for 2.4GHz and 5GHz Wireless Product s Relevant t o t he EU and Ot her Count ries Following t he EU Direct ive 1999/ 5/ EC ( R&TTE Direct ive) [ Czech] ZyXEL t ím t o prohlašuj e, že t ent o zařízení j e ve shodě se základním i požadavky a dalším i příslušným i ust anovením i sm ěrnice 1999/ 5/ EC. [ Danish] Undert egnede ZyXEL erklærer herved, at følgende udst yr udst yr overholder de væsent lige krav og øvrige relevant e krav i direkt iv 1999/ 5/ EF. [ Germ an] Hierm it erklärt ZyXEL, dass sich das Gerät Ausst at t ung in Übereinst im m ung m it den grundlegenden Anforderungen und den übrigen einschlägigen Best im m ungen der Richt linie 1999/ 5/ EU befindet . [ Est onian] Käesolevaga kinnit ab ZyXEL seadm e seadm ed vast avust direkt iivi 1999/ 5/ EÜ põhinõuet ele j a nim et at ud direkt iivist t ulenevat ele t eist ele asj akohast ele sät et ele. English Hereby, ZyXEL declares t hat t his equipm ent is in com pliance wit h t he essent ial requirem ent s and ot her relevant provisions of Direct ive 1999/ 5/ EC. [ Spanish] Por m edio de la present e ZyXEL declara que el equipo cum ple con los requisit os esenciales y cualesquiera ot ras disposiciones aplicables o exigibles de la Direct iva 1999/ 5/ CE. [ Greek] Η Ω Α Α Α Α ZyXEL Η Ω Η Α ε π ισ ός Χ ΦΩ Α Α Α Η ΗΓ Α 1999/ 5/ C. [ French] Par la présent e ZyXEL déclare que l'appareil équipem ent s est conform e aux exigences essent ielles et aux aut res disposit ions pert inent es de la direct ive 1999/ 5/ EC. [ I t alian] Con la present e ZyXEL dichiara che quest o at t rezzat ura è conform e ai requisit i essenziali ed alle alt re disposizioni pert inent i st abilit e dalla diret t iva 1999/ 5/ CE. [ Lat vian] Ar šo ZyXEL deklarē, ka iekārt as at bilst Direkt īvas 1999/ 5/ EK būt iskaj ām prasībām un cit iem ar t o saist īt aj iem not eikum iem . [ Lit huanian] Šiuo ZyXEL deklaruoj a, kad šis įranga at it inka esm inius reikalavim us ir kit as 1999/ 5/ EB Direkt yvos nuost at as. [ Dut ch] Hierbij verklaart ZyXEL dat het t oest el uit rust ing in overeenst em m ing is m et de essent iële eisen en de andere relevant e bepalingen van richt lij n 1999/ 5/ EC. [ Malt ese] Hawnhekk, ZyXEL, j iddikj ara li dan t agħm ir j ikkonform a m al- ħt iġij iet essenzj ali u m a provvedim ent i oħraj n relevant i li hem m fid- Dirret t iva 1999/ 5/ EC. [ Hungarian] Alulírot t , ZyXEL nyilat kozom , hogy a berendezés m egfelel a vonat kozó alapvet õ követ elm ényeknek és az 1999/ 5/ EK irányelv egyéb elõírásainak. [ Polish] Niniej szym ZyXEL oświadcza, że sprzęt j est zgodny z zasadniczym i wym ogam i oraz pozost ałym i st osownym i post anowieniam i Dyrekt ywy 1999/ 5/ EC. [ Port uguese] ZyXEL declara que est e equipam ent o est á conform e com os requisit os essenciais e out ras disposições da Direct iva 1999/ 5/ EC. [ Slovenian] ZyXEL izj avlj a, da j e t a oprem a v skladu z bist venim i zaht evam i in ost alim i relevant nim i določili direkt ive 1999/ 5/ EC. [ Slovak] ZyXEL t ým t o vyhlasuj e, že zariadenia spĺňa základné požiadavky a všet ky príslušné ust anovenia Sm ernice 1999/ 5/ EC. NWA1121-NI User’s Guide 199 Appendix E Legal Information [ Finnish] ZyXEL vakuut t aa t ät en et t ä lait t eet t yyppinen lait e on direkt iivin 1999/ 5/ EY oleellist en vaat im ust en j a sit ä koskevien direkt iivin m uiden eht oj en m ukainen. [ Swedish] Härm ed int ygar ZyXEL at t denna ut rust ning st år I överensst äm m else m ed de väsent liga egenskapskrav och övriga relevant a best äm m elser som fram går av direkt iv 1999/ 5/ EC. [ Bulgarian] С я ZyXEL ,ч я 1999/ 5/ C. [ I celandic] Hér m eð lýsir, ZyXEL því yfir að þessi búnaður er í sam ræm i við grunnkröfur og önnur viðeigandi ákvæði t ilskipunar 1999/ 5/ EC. [ Norwegian] Erklærer herved ZyXEL at det t e ut st yret er I sam svar m ed de grunnleggende kravene og andre relevant e best em m elser I direkt iv 1999/ 5/ EF. [ Rom anian] Prin prezent a, ZyXEL declară că acest echipam ent est e în conform it at e cu cerinţele esenţiale şi alt e prevederi relevant e ale Direct ivei 1999/ 5/ EC. National Restrictions This product m ay be used in all EU count ries ( and ot her count ries following t he EU direct ive 1999/ 5/ EC) wit hout any lim it at ion except for t he count ries m ent ioned below: Ce produit peut êt re ut ilisé dans t ous les pays de l’UE ( et dans t ous les pays ayant t ransposés la direct ive 1999/ 5/ CE) sans aucune lim it at ion, except é pour les pays m ent ionnés ci- dessous: Quest o prodot t o è ut ilizzabile in t ut t e i paesi EU ( ed in t ut t i gli alt ri paesi che seguono le diret t ive EU 1999/ 5/ EC) senza nessuna lim it azione, eccet t o per i paesii m enzionat i di seguit o: Das Produkt kann in allen EU St aat en ohne Einschränkungen eingeset zt werden ( sowie in anderen St aat en die der EU Direkt ive 1995/ 5/ CE folgen) m it Außnahm e der folgenden aufgeführt en St aat en: I n t he m aj orit y of t he EU and ot her European count ries, t he 2, 4- and 5- GHz bands have been m ade available for t he use of wireless local area net works ( LANs) . Lat er in t his docum ent you will find an overview of count ries inwhich addit ional rest rict ions or requirem ent s or bot h are applicable. The requirem ent s for any count ry m ay evolve. ZyXEL recom m ends t hat you check wit h t he local aut horit ies for t he lat est st at us of t heir nat ional regulat ions for bot h t he 2,4- and 5- GHz wireless LANs. The following count ries have rest rict ions and/ or requirem ent s in addit ion t o t hose given in t he t able labeled “ Overview of Regulat ory Requirem ent s for Wireless LANs” : . Overview of Regulat ory Requirem ent s for Wireless LANs Frequency Band ( MHz) Max Power Level I ndoor ONLY I ndoor and Out door ( EI RP) 1 ( m W) 2400- 2483.5 100 5150- 5350 200 5470- 5725 1000 Belgium 200 NWA1121-NI User’s Guide Appendix E Legal Information The Belgian I nst it ut e for Post al Services and Telecom m unicat ions ( BI PT) m ust be not ified of any out door wireless link having a range exceeding 300 m et ers. Please check ht t p: / / www.bipt .be for m ore det ails. Draadloze verbindingen voor buit engebruik en m et een reikwij dt e van m eer dan 300 m et er dienen aangem eld t e worden bij het Belgisch I nst it uut voor post dienst en en t elecom m unicat ie ( BI PT) . Zie ht t p: / / www.bipt .be voor m eer gegevens. Les liaisons sans fil pour une ut ilisat ion en ext érieur d’une dist ance supérieure à 300 m èt res doivent êt re not ifiées à l’I nst it ut Belge des services Post aux et des Télécom m unicat ions ( I BPT) . Visit ez ht t p: / / www.ibpt .be pour de plus am ples dét ails. Denm ark I n Denm ark, t he band 5150 - 5350 MHz is also allowed for out door usage. I Danm ark m å frekvensbåndet 5150 - 5350 også anvendes udendørs. France For 2.4 GHz, t he out put power is rest rict ed t o 10 m W EI RP when t he product is used out doors in t he band 2454 - 2483.5 MHz. There are no rest rict ions when used indoors or in ot her part s of t he 2.4 GHz band. Check ht t p: / / www.arcep.fr/ for m ore det ails. Pour la bande 2.4 GHz, la puissance est lim it ée à 10 m W en p.i.r.e. pour les équipem ent s ut ilisés en ext érieur dans la bande 2454 - 2483.5 MHz. I l n'y a pas de rest rict ions pour des ut ilisat ions en int érieur ou dans d'aut res part ies de la bande 2.4 GHz. Consult ez ht t p: / / www.arcep.fr/ pour de plus am ples dét ails. R&TTE 1999/ 5/ EC WLAN 2.4 – 2.4835 GHz I EEE 802.11 b/ g/ n Locat ion Frequency Range( GHz) Power ( EI RP) I ndoor ( No rest rict ions) 2.4 – 2.4835 100m W ( 20dBm ) Out door 2.4 – 2.454 100m W ( 20dBm ) 2.454 – 2.4835 10m W ( 10dBm ) I t aly This product m eet s t he Nat ional Radio I nt erface and t he requirem ent s specified in t he Nat ional Frequency Allocat ion Table for I t aly. Unless t his wireless LAN product is operat ing wit hin t he boundaries of t he owner's propert y, it s use requires a “ general aut horizat ion.” Please check ht t p: / / www.sviluppoeconom ico.gov.it / for m ore det ails. Quest o prodot t o è conform e alla specifiche di I nt erfaccia Radio Nazionali e rispet t a il Piano Nazionale di ripart izione delle frequenze in I t alia. Se non viene inst allat o all 'int erno del proprio fondo, l'ut ilizzo di prodot t i Wireless LAN richiede una “Aut orizzazione Generale”. Consult are ht t p: / / www.sviluppoeconom ico.gov.it / per m aggiori det t agli. Lat via The out door usage of t he 2.4 GHz band requires an aut horizat ion from t he Elect ronic Com m unicat ions Office. Please check ht t p: / / www.esd.lv for m ore det ails. NWA1121-NI User’s Guide 201 Appendix E Legal Information 2.4 GHz frekvenèu j oslas izm ant oðanai ârpus t elpâm nepiecieðam a at ïauj a no Elekt ronisko sakaru direkcij as. Vairâk inform âcij as: ht t p: / / www.esd.lv. Not es: 1. Alt hough Norway, Swit zerland and Liecht enst ein are not EU m em ber st at es, t he EU Direct ive 1999/ 5/ EC has also been im plem ent ed in t hose count ries. 2. The regulat ory lim it s for m axim um out put power are specified in EI RP. The EI RP level ( in dBm ) of a device can be calculat ed by adding t he gain of t he ant enna used( specified in dBi) t o t he out put power available at t he connect or ( specified in dBm ) . 202 NWA1121-NI User’s Guide Index Index Numbers BSS 12, 56, 181 802.1x- Only 58 802.1x- St at ic128 58 802.1x- St at ic64 58 CA 188 access privileges 12 Account ing Server 88 Cert ificat e aut hent icat ion 104 file form at 104 Cert ificat e Aut horit y See CA. Alert s 116 Cert ificat es Fingerprint 113 MD5 113 public key 104 SHA1 113 Alt ernat ive subnet m ask not at ion 176 Cert ificat ion Aut horit y 113 Ant enna 92 cert ificat ions 195 not ices 197 viewing 198 Advanced Encrypt ion St andard See AES. AES 189 ant enna direct ional 193 gain 193 om ni- direct ional 193 AP ( access point ) 183 Applicat ions Access Point 14 AP + Bridge 14 applicat ions MBSSI D 12 Repeat er 14 Channel 56 channel 183 int erference 183 com m and int erface 15 Cont rolling net work access, Ways of 11 copyright 195 CTS ( Clear t o Send) 184 ATC 73 ATC+ WMM 73 disclaim er 195 Basic Service Set 56 see BSS Dist ribut ion Syst em 56 DNS 97, 119 Dom ain Nam e Server ( DNS) 119 DS 56 Basic Service Set , See BSS 181 DTI M I nt erval 63, 65, 70 beacon 56 dynam ic WEP key exchange 188 Beacon I nt erval 63, 65, 70 NWA1121-NI User’s Guide 203 Index I m port Cert ificat e 106 EAP 59 I ndependent Basic Service Set See I BSS 181 EAP Aut hent icat ion 187 init ializat ion vect or ( I V) 190 Encrypt ion 59, 76, 80, 83, 85 I nt ernet Assigned Num bers Aut horit y See I ANA encrypt ion 14, 189 ESS 56, 182 Et hernet device 89 Ext ended Service Set 56 Ext ended Service Set , See ESS 182 Ext ensible Aut hent icat ion Prot ocol 59 Fact ory Default s 126 rest oring 21 FCC int erference st at em ent 195 Firm ware 120 I nt ernet Prot ocol version 6, see I Pv6 I nt ernet t elephony 12 I P Address 94 Gat eway I P address 94 I P Screen 94 DHCP 96 I Pv6 95 addressing 95 global address 95 link- local address 95 Neighbor Discovery Prot ocol 95 ping 95 prefix 95 prefix lengt h 95 Fragm ent at ion 63, 66, 68, 71 Fragm ent at ion t hreshold 91 fragm ent at ion t hreshold 184 FTP 103 rest rict ions 103 key 59, 77, 81, 83 Generic Token Card 59 LEAP 59 GTC 59 LEDs 17, 129 Blinking 17 Flashing 17 Off 17 Light weight Ext ensible Aut hent icat ion Prot ocol 59 Log 49 hidden node 183 Log Screens 115 Logs accessing logs 115 receiving logs via e- m ail 116 I ANA 180 I BSS 181 I EEE 802.11g 185 I EEE 802.1x 57 204 Logs Screen Mail Server 117 Mail Subj ect 117 Send Log t o 117 Syslog 118 Logs, Uses of 115 NWA1121-NI User’s Guide Index PFX PKCS# 12 104 Pream ble 91 MAC Filt er Allow Associat ion 89 Deny Associat ion 89 Maint enance 119 Associat ion List 120 Backup 124 Rest ore 125 Managem ent I nform at ion Base ( MI B) 111 m anaging t he device using Telnet . See com m and int erface. using t he com m and int erface. See com m and int erface. MBSSI D 12 pream ble m ode 185 Pream ble Type 63, 66, 68, 71 Pre- Shared Key 59 priorit ies 92 product regist rat ion 198 Prot ect ed Ext ensible Aut hent icat ion Prot ocol 59 PSK 59, 190 QoS 73 Media Access Cont rol 89 Message I nt egrit y Check ( MI C) 189 m essage relay 60 Microsoft Challenge Handshake Aut hent icat ion Prot ocol Version 2 59 MSCHAPv2 59 MSDU 63, 66, 71 NAT 180 Net work Tim e Prot ocol ( NTP) 119 NTP 119 Radio Frequency 92 RADI US 59, 186 Account ing 60 Aut hent icat ion 60 Aut horizat ion 60 m essage t ypes 187 m essages 187 shared secret key 187 RADI US Screen Account ing Server 88 Account ing Server I P Address 88 RADI US server 58 Backup 88 Prim ary 88 Rat es Configurat ion 63, 66, 68, 71 Operat ing Mode 56 Out put Power Managem ent 63, 65, 68, 70 regist rat ion product 198 Rem ot e Aut hent icat ion Dial I n User Service 59 rem ot e m anagem ent 16 rem ot e m anagem ent lim it at ions 102 Pairwise Mast er Key ( PMK) 190, 191 Root AP 14 Passphrase 59 Password 130 RTS ( Request To Send) 184 t hreshold 183, 184 PEAP 59 RTS/ CTS Threshold 63, 66, 68, 71, 91 Roam ing 92 Personal I nform at ion Exchange Synt ax St andard 104 NWA1121-NI User’s Guide 205 Index Tim e and Dat e Set up 122 Tim e Zone 122 Securit y Mode, Choosing t he 93 Securit y Modes 802.1x- St at ic64 58 I EEE 802.1x- Only 58 I EEE 802.1x- St at ic128 58 I EEE 802.1x- St at ic64 58 None 58 WEP 58 WPA 58 WPA2 58 WPA2- MI X 58 WPA2- PSK 58 syst em t im eout 104 t elnet 106 Tem poral Key I nt egrit y Prot ocol 59 Tem poral Key I nt egrit y Prot ocol ( TKI P) 189 TFTP rest rict ions 103 Thum bprint Algorit hm 114 t im eout 16 Service Set I Dent ifier 56 TKI P 59 Service Set I dent ifier see SSI D TLS 59 Sim ple Mail Transfer Prot ocol 116 SMTP 116, 118 SNMP MI Bs 111 t raps 112 Spanning Tree Prot ocol 91 SSI D 12, 56 SSI D profile pre- configured 12 SSI D profiles 12 St at us Screens 25 802.11 Mode 50 Channel I D 50 Et hernet 25 FCS Error Count Firm ware Version I nt erface St at us Poll I nt erval 50 Ret ry Count 50 St at ist ics 51 syst em st at ist ics WLAN 25 t radem arks 195 Transport Layer Securit y 59 Troubleshoot ing 129 connect ion is slow or int erm it t ent 132 DHCP 130 fact ory default s 131 firm ware 131 I nt ernet 131 LAN/ ETHERNET port 131 QoS 132 Web Configurat or 130 TTLS 59 Tunneled Transport Layer Securit y 59 Tut orial 29 50 26 27 User Aut hent icat ion 58 25 Subnet 173 Subnet Mask 94, 174 Virt ual Local Area Net work 98 subnet t ing 176 VLAN 98 int roduct ion 98 Syslog Logging 116 Syst em Screens General 120 Password 121 Tim e 206 VoI P 12, 73 NWA1121-NI User’s Guide Index RTS/ CTS Threshold 91 SSI D 56 Wireless Client Mode 67 Wireless Mode 57 WMM QoS 91 warrant y 198 not e 198 WDS 14 Web Configurat or 19 password 19 WEP 58 WEP key encrypt ing 93 Wi- Fi Mult im edia QoS 92 Wi- Fi Prot ect ed Access 58, 189 Wired Equivalent Privacy 58 Wireless Client 42 wireless client WPA supplicant s 190 Wireless Dist ribut ion Syst em ( WDS) 14 Wireless Mode 57 Wireless Mode, Choosing t he Access Point 29 Bridge 29 Wireless Client 29 Wireless Securit y 16 how t o im prove 16 Levels 58 wireless securit y 12, 185 Wireless Securit y Screen 802.1x Only 77 Access Point 77, 80 Wireless Client 78, 82 802.1x St at ic 64- bit , 802.1x St at ic 128- bit 79 WEP 76 WPA 83 Access Point 84 Wireless Client 85 WPA- PSK, WPA2- PSK, WPA2- PSK- MI X 86 Wireless Set t ings Screen 55 Access Point Mode 61 Ant enna 92 AP + Bridge Mode 67 Bridge Mode 64 BSS 56 Channel 56 ESS 56 Fragm ent at ion Threshold 91 I nt ra- BSS Traffic 91 Operat ing Mode 56 Pream ble 91 Roam ing 92 NWA1121-NI User’s Guide WLAN int erference 183 securit y param et ers 192 WMM 73 WMM QoS 91 WPA 58, 189 key caching 190 pre- aut hent icat ion 190 user aut hent icat ion 190 vs WPA- PSK 190 wireless client supplicant 190 wit h RADI US applicat ion exam ple 191 WPA2 58, 189 user aut hent icat ion 190 vs WPA2- PSK 190 wireless client supplicant 190 wit h RADI US applicat ion exam ple 191 WPA2- MI X 58 WPA2- Pre- Shared Key 189 WPA2- PSK 189, 190 applicat ion exam ple 191 WPA2- PSK- MI X 58 WPA- PSK 189, 190 applicat ion exam ple 191 ZyXEL Device Et hernet param et ers 94 good habit s 16 I nt roduct ion 11 m anaging 15 reset t ing 20, 126 Securit y Feat ures 16 207 Index 208 NWA1121-NI User’s Guide
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : Yes Encryption : Standard V4.4 (128-bit) User Access : Print, Copy, Extract, Print high-res Author : ZT01651 Create Date : 2012:02:13 14:54:38Z Modify Date : 2013:08:06 06:30:34-07:00 Has XFA : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04 Format : application/pdf Title : Book.book Creator : ZT01651 Creator Tool : FrameMaker 9.0 Metadata Date : 2013:08:06 06:30:34-07:00 Producer : Acrobat Distiller 9.5.0 (Windows) Document ID : uuid:5e91a4e7-6a89-4bbe-ae27-c7219c1f3b1c Instance ID : uuid:6a8634ca-2001-4b13-b63f-7a576738c40d Page Mode : UseOutlines Page Count : 206EXIF Metadata provided by EXIF.tools