ZyXEL Communications NWA1123-NI 802.11a/b/g/n Dual-Radio PoE Access Point User Manual

ZyXEL Communications Corporation 802.11a/b/g/n Dual-Radio PoE Access Point

Contents

User Manual.pdf

Download: ZyXEL Communications NWA1123-NI 802.11a/b/g/n Dual-Radio PoE Access Point User Manual
Mirror Download [FCC.gov]ZyXEL Communications NWA1123-NI 802.11a/b/g/n Dual-Radio PoE Access Point User Manual
Document ID2298643
Application IDHu8QrdEjyoZOTQVLC+pbow==
Document DescriptionUser Manual.pdf
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize388.14kB (4851734 bits)
Date Submitted2014-06-18 00:00:00
Date Available2014-06-18 00:00:00
Creation Date2017-10-22 08:53:05
Producing SoftwareGPL Ghostscript 9.18
Document Lastmod2017-10-22 08:53:05
Document TitleUser Manual.pdf
Document CreatorPDFTechLib by PDF Technologies, Inc. http://www.pdf-technologies.com

N W A1 1 2 0 Se r ie s
Wireless LAN Ceiling Mount able PoE Access Point
Version 1.00
Edit ion 1, 12/ 2012
Quick Start Guide
Use r ’s Gu ide
D e fa u lt Login D e t a ils
LAN I P Address
ht t p: / / 192.168.1.2
User Nam e
adm in
Passwordwww.zyxel.com
1234
Copyright © 2012 ZyXEL Com m unicat ions Corporat ion
IMPORTANT!
READ CAREFULLY BEFORE USE.
KEEP THIS GUIDE FOR FUTURE REFERENCE.
This is a User ’s Guide for a series of product s. Not all product s support all firm ware feat ures.
Screenshot s and graphics in t his book m ay differ slight ly from your product due t o differences in
your product firm ware or your com put er operat ing syst em . Every effort has been m ade t o ensure
t hat t he inform at ion in t his m anual is accurat e.
Related Documentation
• Quick St art Guide
The Quick St art Guide shows how t o connect t he NWA and access t he Web Configurat or.
NWA1120 Series User’s Guide
Contents Overview
Contents Overview
User’s Guide .........................................................................................................................................9
Introducing the NWA ............................................................................................................................... 11
Introducing the Web Configurator ...........................................................................................................19
Dashboard ...............................................................................................................................................25
Tutorial ....................................................................................................................................................29
Technical Reference ..........................................................................................................................47
Monitor ....................................................................................................................................................49
Wireless LAN ..........................................................................................................................................55
LAN .........................................................................................................................................................91
VLAN .......................................................................................................................................................95
System ....................................................................................................................................................97
Log Settings .......................................................................................................................................... 111
Maintenance .......................................................................................................................................... 115
Troubleshooting ....................................................................................................................................123
NWA1120 Series User’s Guide
Contents Overview
NWA1120 Series User’s Guide
Table of Contents
Table of Contents
Contents Overview ..............................................................................................................................3
Table of Contents .................................................................................................................................5
Part I: User’s Guide ........................................................................................... 9
Chapter 1
Introducing the NWA .......................................................................................................................... 11
1.1 Introducing the NWA ......................................................................................................................... 11
1.1.1 Dual-Band ................................................................................................................................12
1.2 Wireless Modes .................................................................................................................................12
1.2.1 MBSSID ...................................................................................................................................12
1.2.2 Wireless Client .........................................................................................................................13
1.2.3 Root AP ...................................................................................................................................15
1.2.4 Repeater ..................................................................................................................................15
1.3 Ways to Manage the NWA ................................................................................................................16
1.4 Configuring Your NWA’s Security Features .......................................................................................17
1.4.1 Control Access to Your Device ................................................................................................17
1.4.2 Wireless Security .....................................................................................................................17
1.5 Good Habits for Managing the NWA .................................................................................................17
1.6 Hardware Connections ......................................................................................................................18
1.7 LED ...................................................................................................................................................18
Chapter 2
Introducing the Web Configurator ....................................................................................................19
2.1 Accessing the Web Configurator .......................................................................................................19
2.2 Resetting the NWA ............................................................................................................................20
2.2.1 Methods of Restoring Factory-Defaults ...................................................................................21
2.3 Navigating the Web Configurator ......................................................................................................22
2.3.1 Title Bar ...................................................................................................................................22
2.3.2 Navigation Panel .....................................................................................................................23
2.3.3 Main Window ...........................................................................................................................24
Chapter 3
Dashboard ...........................................................................................................................................25
3.1 The Dashboard Screen .....................................................................................................................25
NWA1120 Series User’s Guide
Table of Contents
Chapter 4
Tutorial .................................................................................................................................................29
4.1 How to Configure the Wireless LAN ..................................................................................................29
4.1.1 Choosing the Wireless Mode ...................................................................................................29
4.1.2 Further Reading .......................................................................................................................29
4.2 How to Configure Multiple Wireless Networks ..................................................................................29
4.2.1 Configure the SSID Profiles .....................................................................................................31
4.2.2 Configure the Standard Network .............................................................................................33
4.2.3 Configure the VoIP Network ....................................................................................................34
4.2.4 Configure the Guest Network ..................................................................................................36
4.2.5 Testing the Wireless Networks ................................................................................................38
4.3 NWA Setup in AP and Wireless Client Modes ..................................................................................38
4.3.1 Scenario ..................................................................................................................................38
4.3.2 Configuring the NWA in MBSSID or Root AP Mode ................................................................39
4.3.3 Configuring the NWA in Wireless Client Mode ........................................................................42
4.3.4 MAC Filter Setup .....................................................................................................................44
4.3.5 Testing the Connection and Troubleshooting ..........................................................................45
Part II: Technical Reference............................................................................ 47
Chapter 5
Monitor.................................................................................................................................................49
5.1 Overview ...........................................................................................................................................49
5.2 What You Can Do .............................................................................................................................49
5.3 View Logs .........................................................................................................................................49
5.4 Statistics ............................................................................................................................................50
5.5 Association List .................................................................................................................................51
5.6 Channel Usage .................................................................................................................................52
Chapter 6
Wireless LAN.......................................................................................................................................55
6.1 Overview ...........................................................................................................................................55
6.2 What You Can Do in this Chapter .....................................................................................................55
6.3 What You Need To Know ..................................................................................................................56
6.4 Wireless Settings Screen ..................................................................................................................60
6.4.1 Root AP Mode .........................................................................................................................61
6.4.2 Repeater Mode ........................................................................................................................65
6.4.3 Wireless Client Mode ...............................................................................................................68
6.4.4 MBSSID Mode .........................................................................................................................71
6.5 SSID Screen .....................................................................................................................................74
6.5.1 Configuring SSID .....................................................................................................................75
NWA1120 Series User’s Guide
Table of Contents
6.6 Wireless Security Screen ..................................................................................................................76
6.6.1 Security: WEP .........................................................................................................................78
6.6.2 Security: WPA, WPA2, WPA2-MIX ..........................................................................................79
6.6.3 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX .................................................................81
6.7 RADIUS Screen ................................................................................................................................82
6.8 Layer-2 Isolation ................................................................................................................................84
6.8.1 Layer-2 Isolation Screen ..........................................................................................................85
6.9 MAC Filter Screen .............................................................................................................................86
6.10 Technical Reference ........................................................................................................................88
6.10.1 Additional Wireless Terms .....................................................................................................89
6.10.2 WMM QoS .............................................................................................................................89
6.10.3 Security Mode Guideline .......................................................................................................90
Chapter 7
LAN ......................................................................................................................................................91
7.1 Overview ...........................................................................................................................................91
7.2 What You Can Do in this Chapter .....................................................................................................91
7.3 What You Need to Know ...................................................................................................................91
7.4 LAN IP Screen ..................................................................................................................................93
Chapter 8
VLAN ....................................................................................................................................................95
8.1 Overview ...........................................................................................................................................95
8.1.1 What You Can Do in This Chapter ...........................................................................................95
8.2 What You Need to Know ...................................................................................................................95
8.3 VLAN Screen ....................................................................................................................................96
Chapter 9
System .................................................................................................................................................97
9.1 Overview ...........................................................................................................................................97
9.2 What You Can Do in this Chapter .....................................................................................................97
9.3 What You Need To Know ..................................................................................................................98
9.4 WWW Screen ..................................................................................................................................100
9.5 Certificates Screen ..........................................................................................................................101
9.6 Telnet Screen ..................................................................................................................................102
9.7 SNMP Screen .................................................................................................................................104
9.8 FTP Screen .....................................................................................................................................106
9.9 Technical Reference ........................................................................................................................107
9.9.1 MIB ........................................................................................................................................107
9.9.2 Supported MIBs .....................................................................................................................108
9.9.3 Private-Public Certificates .....................................................................................................108
9.9.4 Certification Authorities ..........................................................................................................108
9.9.5 Checking the Fingerprint of a Certificate on Your Computer .................................................109
NWA1120 Series User’s Guide
Table of Contents
Chapter 10
Log Settings ...................................................................................................................................... 111
10.1 Overview ....................................................................................................................................... 111
10.2 What You Can Do in this Chapter ................................................................................................. 111
10.3 What You Need To Know .............................................................................................................. 112
10.4 Log Settings Screen ...................................................................................................................... 112
Chapter 11
Maintenance ...................................................................................................................................... 115
11.1 Overview ....................................................................................................................................... 115
11.2 What You Can Do in this Chapter .................................................................................................. 115
11.3 What You Need To Know ............................................................................................................... 116
11.4 General Screen ............................................................................................................................. 116
11.5 Password Screen .......................................................................................................................... 117
11.6 Time Screen .................................................................................................................................. 118
11.7 Firmware Upgrade Screen ............................................................................................................ 119
11.8 Configuration File Screen ..............................................................................................................120
11.8.1 Backup Configuration ...........................................................................................................120
11.8.2 Restore Configuration ..........................................................................................................120
11.8.3 Back to Factory Defaults ......................................................................................................121
11.9 Restart Screen ..............................................................................................................................121
Chapter 12
Troubleshooting................................................................................................................................123
12.1 Power, Hardware Connections, and LEDs ....................................................................................123
12.2 NWA Access and Login ................................................................................................................124
12.3 Internet Access .............................................................................................................................125
12.4 Wireless LAN ................................................................................................................................126
Appendix A Setting Up Your Computer’s IP Address ......................................................................129
Appendix B Pop-up Windows, JavaScript and Java Permissions ...................................................157
Appendix C IP Addresses and Subnetting.......................................................................................169
Appendix D IPv6 ..............................................................................................................................177
Appendix E Wireless LANs..............................................................................................................187
Appendix F Legal Information..........................................................................................................201
Index ..................................................................................................................................................207
NWA1120 Series User’s Guide
P ART I
User’s Guide
10
C HAPT ER
Introducing the NWA
This chapt er int roduces t he m ain applicat ions and feat ures of t he NWA. I t also discusses t he ways
you can m anage your NWA.
1.1 Introducing the NWA
This User ’s Guide covers t he following m odels: NWA1121- NI , and NWA1123- NI . Your NWA is an
I Pv6 wireless AP ( Access Point ) t hat can funct ion in several wireless m odes. I t ext ends t he range of
your exist ing wired net work wit hout addit ional wiring, providing easy net work access t o m obile
users.
Table 1 NWA Series Com parison Table
FEATURES
NWA1121-NI
NWA1123-NI
I EEE 802.11b
I EEE 802.11g
I EEE 802.11n
I EEE 802.11a
I EEE 802.11b
I EEE 802.11g
I EEE 802.11n
2.4 GHz
2.4 GHz
5 GHz
Available Securit y Modes
None
WEP
WPA
WPA2
WPA2- MI X
WPA- PSK
WPA2- PSK
WPA2- PSK- MI X
None
WEP
WPA
WPA2
WPA2- MI X
WPA- PSK
WPA2- PSK
WPA2- PSK- MI X
Num ber of SSI D Profiles
32
Yes
Yes
Support ed Wireless St andards
Support ed Frequency Bands
Layer- 2 I solat ion
The NWA cont rols net work access wit h MAC address filt ering and RADI US server aut hent icat ion. I t
also provides a high level of net work t raffic securit y, support ing I EEE 802.1x, Wi- Fi Prot ect ed
Access ( WPA) , WPA2 and WEP dat a encrypt ion. I t s Qualit y of Service ( QoS) feat ures allow you t o
priorit ize t im e- sensit ive or highly im port ant applicat ions such as VoI P.
Your NWA is easy t o inst all, configure and use. The em bedded Web- based configurat or enables
sim ple, st raight forward m anagem ent and m aint enance.
See t he Quick St art Guide for inst ruct ions on how t o m ake hardware connect ions.
NWA1120 Series User’s Guide
11
Chapter 1 Introducing the NWA
1.1.1 Dual-Band
The NWA1123- NI is a dual- band AP and able t o funct ion bot h 2.4G and 5G net works at t he sam e
t im e. You could use t he 2.4 GHz band for regular I nt ernet surfing and downloading while using t he
5 GHz band for t im e sensit ive t raffic like high- definit ion video, m usic, and gam ing.
Figure 1 Dual- Band Applicat ion
1.2 Wireless Modes
The NWA can be configured t o use t he following WLAN operat ing m odes:
OPERATING MODE
NUMBER OF
SUPPORTED SSID
UNIVERSAL
REPEATER FUNCTION
AP FUNCTION
MBSSI D
No
Yes
Client
No
No
Root AP
Yes
Yes
Repeat er
Yes
Yes
Applicat ions for each operat ing m ode are shown below.
1.2.1 MBSSID
A Basic Service Set ( BSS) is t he set of devices form ing a single wireless net work ( usually an access
point and one or m ore wireless client s) . The Service Set I Dent ifier ( SSI D) is t he nam e of a BSS. I n
Mult iple BSS ( MBSSI D) m ode, t he NWA provides m ult iple virt ual APs, each form ing it s own BSS and
using it s own individual SSI D profile.
You can configure m ult iple SSI D profiles, and have all of t hem act ive at any one t im e.
12
NWA1120 Series User’s Guide
Chapter 1 Introducing the NWA
You can assign different wireless and securit y set t ings t o each SSI D profile. This allows you t o
com part m ent alize groups of users, set varying access privileges, and priorit ize net work t raffic t o
and from cert ain BSSs.
To t he wireless client s in t he net work, each SSI D appears t o be a different access point . As in any
wireless net work, client s can associat e only wit h t he SSI Ds for which t hey have t he correct securit y
set t ings.
For exam ple, you m ight want t o set up a wireless net work in your office where I nt ernet t elephony
( VoI P) users have priorit y. You also want a regular wireless net work for st andard users, as well as a
‘guest ’ wireless net work for visit ors. I n t he following figure, VoI P_ SSI D users have QoS priorit y,
SSI D 0 1 is t he wireless net work for st andard users, and Gu e st _ SSI D is t he wireless net work for
guest users. I n t his exam ple, t he guest user is forbidden access t o t he wired Land Area Net work
( LAN) behind t he AP and can access only t he I nt ernet .
Figure 2 Mult iple BSSs
1.2.2 Wireless Client
The NWA can be used as a wireless client t o com m unicat e wit h an exist ing net work.
Not e: The NWA1123- NI is a dual- band AP which cont ains t w o different t ypes of wireless
radios t o t ransm it at 2.4 GHz and 5 GHz bands separat ely and sim ult aneously. I f
one of t he NWA1123- NI wireless radio is set t o work in client m ode, t he ot her radio
will be disabled aut om at ically.
NWA1120 Series User’s Guide
13
Chapter 1 Introducing the NWA
I n t he figure below, t he print er can receive request s from t he wired com put er client s A and B via
t he NWA in Client m ode ( Z) using only t he 2.4 GHz band.
Figure 3 Wireless Client Applicat ion
14
NWA1120 Series User’s Guide
Chapter 1 Introducing the NWA
1.2.3 Root AP
I n Root AP m ode, t he NWA ( Z) can act as t he root AP in a wireless net work and also allow repeat ers
( X and Y) t o ext end t he range of it s wireless net work at t he sam e t im e. I n t he figure below, bot h
client s A, B and C can access t he wired net work t hrough t he root AP.
Figure 4 Root AP Applicat ion
On t he NWA in Root AP m ode, you can have m ult iple SSI Ds act ive for reqular wireless connect ions
and one SSI D for t he connect ion wit h a repeat er ( universal repeat er SSI D) . Wireless client s can use
eit her SSI D t o associat e wit h t he NWA in Root AP m ode. A repeat er m ust use t he universal repeat er
SSI D t o connect t o t he NWA in Root AP m ode.
When t he NWA is in Root AP m ode, universal repeat er securit y bet ween t he NWA and ot her
repeat er is independent of t he securit y bet ween t he wireless client s and t he AP or repeat er. I f you
do not enable universal repeat er securit y, t raffic bet ween APs is not encrypt ed. When universal
repeat er securit y is enabled, bot h APs and repeat ers m ust use t he sam e pre- shared key. See
Sect ion 6.6 on page 76 for m ore det ails.
Unless specified, t he t erm “ securit y set t ings” refers t o t he t raffic bet ween t he wireless client s and
t he AP. At t he t im e of writ ing, universal repeat er securit y is com pat ible wit h t he NWA only.
1.2.4 Repeater
The NWA can act as a wireless net work repeat er t o ext end a root AP’s wireless net work range, and
also est ablish wireless connect ions wit h wireless client s.
Using Repeat er m ode, your NWA can ext end t he range of t he WLAN. I n t he figure below, t he NWA
in Repeat er m ode ( Z) has a wireless connect ion t o t he NWA in Root AP m ode ( X) which is
connect ed t o a wired net work and also has a wireless connect ion t o anot her NWA in Repeat er m ode
( Y) at t he sam e t im e. Z and Y act as repeat ers t hat forward t raffic bet ween associat ed wireless
NWA1120 Series User’s Guide
15
Chapter 1 Introducing the NWA
client s and t he wired LAN. Client s A and B access t he AP and t he wired net work behind t he AP
t hrought repeat ers Z and Y.
Figure 5 Repeat er Applicat ion
When t he NWA is in Repeat er m ode, universal repeat er securit y bet ween t he NWA and ot her
repeat er is independent of t he securit y bet ween t he wireless client s and t he AP or repeat er. I f you
do not enable universal repeat er securit y, t raffic bet ween APs is not encrypt ed. When universal
repeat er securit y is enabled, bot h APs and repeat ers m ust use t he sam e pre- shared key. See
Sect ion 6.6 on page 76 for m ore det ails.
Once t he securit y set t ings of peer sides m at ch one anot her, t he connect ion bet ween devices is
m ade.
At t he t im e of writ ing, universal repeat er securit y is com pat ible wit h t he NWA only.
1.3 Ways to Manage the NWA
Use any of t he following m et hods t o m anage t he NWA.
• Web Configurat or. This is recom m ended for everyday m anagem ent of t he NWA using a
( support ed) web browser.
• FTP ( File Transfer Prot ocol) for firm ware upgrades and configurat ion backup and rest ore.
• SNMP ( Sim ple Net work Managem ent Prot ocol) . The device can be m onit ored by an SNMP
m anager.
16
NWA1120 Series User’s Guide
Chapter 1 Introducing the NWA
1.4 Configuring Your NWA’s Security Features
Your NWA com es wit h a variet y of securit y feat ures. This sect ion sum m arizes t hese feat ures and
provides links t o sect ions in t he User ’s Guide t o configure securit y set t ings on your NWA. Follow t he
suggest ions below t o im prove securit y on your NWA and net work.
1.4.1 Control Access to Your Device
Ensure only people wit h perm ission can access your NWA.
• Cont rol physical access by locat ing devices in secure areas, such as locked room s. Most NWAs
have a reset but t on. I f an unaut horized person has access t o t he reset but t on, t hey can t hen
reset t he device’s password t o it s default password, log in and reconfigure it s set t ings.
• Change any default passwords on t he NWA, such as t he password used for accessing t he NWA’s
web configurat or ( if it has a web configurat or) . Use a password wit h a com binat ion of let t ers and
num bers and change your password regularly. Writ e down t he password and put it in a safe
place.
• See Sect ion 11.5 on page 117 for inst ruct ions on changing your password.
• Configure rem ot e m anagem ent t o cont rol who can m anage your NWA. See Chapt er 9 on page 97
for m ore inform at ion. I f you enable rem ot e m anagem ent , ensure you have enabled rem ot e
m anagem ent only on t he I P addresses, services or int erfaces you int ended and t hat ot her rem ot e
m anagem ent set t ings are disabled.
1.4.2 Wireless Security
Wireless devices are especially vulnerable t o at t ack. Take t he following m easures t o im prove
wireless securit y.
• Enable wireless securit y on your NWA. Choose t he m ost secure encrypt ion m et hod t hat all
devices on your net work support . See Sect ion 6.6 on page 76 for direct ions on configuring
encrypt ion. I f you have a RADI US server, enable I EEE 802.1x or WPA( 2) user ident ificat ion on
your net work so users m ust log in. This m et hod is m ore com m on in business environm ent s.
• Hide your wireless net work nam e ( SSI D) . The SSI D can be regularly broadcast and unaut horized
users m ay use t his inform at ion t o access your net work. See Sect ion 6.5 on page 74 for direct ions
on using t he web configurat or t o hide t he SSI D.
• Enable t he MAC filt er t o allow only t rust ed users t o access your wireless net work or deny
unwant ed users access based on t heir MAC address. See Sect ion 6.9 on page 86 for direct ions on
configuring t he MAC filt er.
1.5 Good Habits for Managing the NWA
Do t he following t hings regularly t o m ake t he NWA m ore secure and t o m anage it m ore effect ively.
• Change t he password. Use a password t hat ’s not easy t o guess and t hat consist s of different
t ypes of charact ers, such as num bers and let t ers.
• Writ e down t he password and put it in a safe place.
NWA1120 Series User’s Guide
17
Chapter 1 Introducing the NWA
• Back up t he configurat ion ( and m ake sure you know how t o rest ore it ) . Rest oring an earlier
working configurat ion m ay be useful if t he device becom es unst able or even crashes. I f you
forget your password, you will have t o reset t he NWA t o it s fact ory default set t ings. I f you backed
up an earlier configurat ion file, you would not have t o t ot ally re- configure t he NWA. You could
sim ply rest ore your last configurat ion.
1.6 Hardware Connections
See your Quick St art Guide for inform at ion on m aking hardware connect ions.
1.7 LED
Figure 6 LED
Table 2 LED
COLOR
STATUS
DESCRIPTION
Am ber
On
There is syst em error and t he NWA cannot boot up, or t he NWA doesn’t
have an Et hernet connect ion wit h t he LAN.
Flashing
The NWA is st art ing up.
Off
The NWA is receiving power and ready for use.
On
The WLAN is act ive.
Green
18
Blinking
The WLAN is act ive, and t ransm it t ing or receiving dat a.
Off
The WLAN is not act ive.
NWA1120 Series User’s Guide
C HAPT ER
Introducing the Web Configurator
This chapt er describes how t o access t he NWA’s web configurat or and provides an overview of it s
screens.
2.1 Accessing the Web Configurator
Make sure your hardware is properly connect ed and prepare your com put er or com put er net work t o
connect t o t he NWA ( refer t o t he Quick St art Guide) .
Launch your web browser.
Type " 192.168.1.2" as t he URL ( default ) . The login screen appears.
Figure 7 The Login Screen
Type “ adm in” as t he ( default ) usernam e and “ 1234” as t he ( default ) password. Click Login.
You should see a screen asking you t o change your password ( highly recom m ended) as shown
next . Type a new password ( and ret ype it t o confirm ) t hen click Apply. Alt ernat ively, click I gnor e .
NWA1120 Series User’s Guide
19
Chapter 2 Introducing the Web Configurator
Not e: I f you do not change t he password, t he following screen appears every t im e you
login.
Figure 8 Change Password Screen
You should now see t he D a sh boa r d screen. See Chapt er 2 on page 19 for det ails about t he
D a shboa r d screen.
2.2 Resetting the NWA
I f you forget your password or cannot access t he web configurat or, you will need t o use t he RESET
but t on at t he rear panel of t he NWA. This replaces t he current configurat ion file wit h t he fact ory-
20
NWA1120 Series User’s Guide
Chapter 2 Introducing the Web Configurator
default configurat ion file. This m eans t hat you will lose all t he set t ings you previously configured.
The password will be reset t o “ 1234”.
Figure 9 The RESET But t on
2.2.1 Methods of Restoring Factory-Defaults
You can erase t he current configurat ion and rest ore fact ory default s in t wo ways:
Use t he RESET but t on t o upload t he default configurat ion file. Hold t his but t on in for about 3
seconds ( t he light will begin t o blink) . Use t his m et hod for cases when t he password or I P address
of t he NWA is not known.
Use t he web configurat or t o rest ore default s ( refer t o Sect ion 11.8 on page 120) .
NWA1120 Series User’s Guide
21
Chapter 2 Introducing the Web Configurator
2.3 Navigating the Web Configurator
The following sum m arizes how t o navigat e t he web configurat or from t he D a shboa r d screen. This
guide uses t he NWA1121- NI screens as an exam ple. The screens m ay vary slight ly for different
m odels.
Figure 10 St at us Screen of t he Web Configurat or
As illust rat ed above, t he Web Configurat or screen is divided int o t hese part s:
• A - t it le bar
• B - navigat ion panel
• C - m ain window
2.3.1 Title Bar
Click Logou t at any t im e t o exit t he Web Configurat or.
Click ZAbout t o open t he about window, which provides inform at ion of t he boot m odule and driver
versions.
22
NWA1120 Series User’s Guide
Chapter 2 Introducing the Web Configurator
2.3.2 Navigation Panel
Use t he m enu it em s on t he navigat ion panel t o open screens t o configure NWA feat ures. The
following t ables describe each m enu it em .
Table 3 Navigat ion Panel Sum m ary
LINK
TAB
Dashboard
FUNCTION
This screen shows t he NWA’s general device and net work st at us
inform at ion. Use t his screen t o access t he st at ist ics and client list .
Monit or
Logs
View Log
Use t his screen t o view t he logs for t he cat egories t hat you select ed.
St at ist ics
Use t his screen t o view port st at us, packet specific st at ist ics, t he
" syst em up t im e" and so on.
Associat ion List
Use t his screen t o view t he wireless st at ions t hat are current ly
associat ed t o t he NWA.
Channel Usage
Use t his screen t o know whet her a channel is used by anot her
wireless net work or not .
Configurat ion
Net work
Wireless LAN
Wireless
Set t ings
Use t his screen t o configure t he wireless LAN set t ings and NWA’s
operat ion m ode.
Wireless
Set t ings - 2.4G
Wireless
Set t ings - 5G
SSI D
Use t his screen t o configure up t o eight SSI D profiles for your NWA.
Securit y
Use t his screen t o configure wireless securit y profiles on t he NWA.
RADI US
Use t his screen t o configure up t o four RADI US profiles.
Layer- 2 I solat ion
Use t his screen t o configure t he MAC addresses of t he devices t hat
you want t o allow t he associat ed wireless client s t o have access t o
when layer- 2 isolat ion is enabled
MAC Filt er
Use t his screen t o configure MAC filt ering profiles.
LAN
Use t his screen t o configure t he NWA’s LAN I P address.
VLAN
Use t his screen t o configure t he NWA’s VLAN set t ings.
Syst em
Log Set t ings
WWW
Use t his screen t o configure t hrough which int erface( s) and from
w hich I P address( es) users can use HTTP t o m anage t he NWA.
Cert ificat es
Use t his screen t o im port or rem ove a cert ificat e from t he NWA.
Telent
Use t his screen t o configure t hrough which int erface( s) and from
w hich I P address( es) users can use Telnet t o m anage t he NWA.
SNMP
Use t his screen t o configure t he NWA for SNMP m anagem ent .
FTP
Use t his screen t o configure t hrough which int erface( s) and from
w hich I P address( es) users can use FTP t o access t he NWA.
Use t his screen t o change your log set t ings.
Maint enance
General
Use t his screen t o configure your device’s nam e.
Password
Use t his screen t o configure your device’s password.
Tim e
Use t his screen t o change your NWA’s t im e and dat e.
Firm ware Upgrade
Use t his screen t o upload firm ware t o your device.
NWA1120 Series User’s Guide
23
Chapter 2 Introducing the Web Configurator
Table 3 Navigat ion Panel Sum m ary
LINK
TAB
FUNCTION
Configurat ion File
Use t his screen t o backup and rest ore your device’s configurat ion
( set t ings) or reset t he fact ory default set t ings.
Rest art
Use t his screen t o reboot t he NWA wit hout t urning t he power off.
2.3.3 Main Window
The m ain window displays inform at ion and configurat ion fields. I t is discussed in t he rest of t his
docum ent .
24
NWA1120 Series User’s Guide
C HAPT ER
Dashboard
The D a sh boa r d screens display when you log int o t he NWA, or click D a shboa r d in t he navigat ion
m enu.
Use t he D a shboa r d screen t o look at t he current st at us of t he device, syst em resources, and
int erfaces. The D a shboa r d screens also provide det ailed inform at ion about syst em st at ist ics,
associat ed wireless client s, and logs.
3.1 The Dashboard Screen
Use t his screen t o get a quick view of syst em , Et hernet , WLAN and ot her inform at ion regarding
your NWA.
NWA1120 Series User’s Guide
25
Chapter 3 Dashboard
Click D a shboa r d. The following screen displays.
Figure 11 The Dashboard Screen ( NWA1121- NI )
Figure 12 The Dashboard Screen ( NWA1123- NI )
26
NWA1120 Series User’s Guide
Chapter 3 Dashboard
The following t able describes t he labels in t his screen.
Table 4 The Dashboard Screen
LABEL
DESCRIPTION
Refresh I nt erval
Select how oft en you want t he NWA t o updat e t his screen.
Refresh Now
Click t his t o updat e t his screen im m ediat ely.
Syst em I nform at ion
Syst em Nam e
This field displays t he NWA syst em nam e. I t is used for ident ificat ion. You can
change t his in t he M a in t e na nce > Ge ne r a l screen’s Syst e m N a m e field.
WLAN Operat ing
Mode
This field displays t he current operat ing m ode of t he wireless m odule ( Root AP,
Re pe a t e r, Clie n t , or M BSSI D ) . You can change t he operat ing m ode in t he
Configur a t ion > W ir e le ss LAN > W ir e le ss Se t t in gs screen.
2.4G
This field displays t he current operat ing m ode of t he 2.4G wireless m odule ( Root
AP, Re pe a t e r, Clie n t , or M BSSI D ) . You can change t he operat ing m ode in t he
Configur a t ion > W ir e le ss LAN > W ir e le ss Se t t in gs - 2 .4 G screen.
5G
This field displays t he current operat ing m ode of t he 5G wireless m odule ( Root AP,
Re pe a t e r, Clie n t , or M BSSI D ) . You can change t he operat ing m ode in t he
Configur a t ion > W ir e le ss LAN > W ir e le ss Se t t in gs - 5 G screen.
Firm ware Version
This field displays t he current version of t he firm ware inside t he device. I t also
shows t he dat e t he firm ware version was creat ed. You can change t he firm ware
version by uploading new firm ware in M a in t e n a n ce > Fir m w a r e Upgr a de .
Serial Num ber
This field displays t he serial num ber of t he NWA.
Et hernet I nform at ion
LAN MAC Address
This displays t he MAC ( Media Access Cont rol) address of t he NWA on t he LAN.
Every net work device has a unique MAC address which ident ifies it across t he
net work.
I Pv4 Address
This field displays t he current I Pv4 address of t he NWA on t he net work.
Subnet Mask
Subnet m asks det erm ine t he m axim um num ber of possible host s on a net work.
You can also use subnet m asks t o divide one net work int o m ult iple sub- net works.
Gat eway I P Address
This is t he I P address of t he gat eway. The gat eway is a rout er or swit ch on t he
sam e net work segm ent as t he device's LAN port . The gat eway helps forward
packet s t o t heir dest inat ions.
I Pv6 Address
This field displays t he current I Pv6 address( es) of t he NWA on t he net work.
Link Local
This is t he I Pv6 link- local address t hat t he NWA generat es aut om at ically.
Global
This is t he NWA’s I Pv6 global address t hat you specify m anually in t he
Configur a t ion > LAN screen.
WLAN I nform at ion
SSI D
This field displays t he SSI D ( Service Set I dent ifier) . This is available only when t he
WLAN operat ion m ode is Clie n t .
Channel
The channel or frequency used by t he NWA t o send and receive inform at ion ( in t he
2.4G or 5G wireless net work) .
St at us
This shows t he current st at us of t he wireless LAN. This is available only when t he
WLAN operat ion m ode is Clie n t .
Securit y Mode
This displays t he securit y m ode t he NWA is using. This is available only when t he
WLAN operat ion m ode is Clie n t .
Sum m ary
St at ist ics
Click t his link t o view port st at us and packet specific st at ist ics. See Sect ion 5.4 on
page 50.
Associat ion List
Click t his t o see a list of wireless client s current ly associat ed t o each of t he NWA’s
wireless m odules. See Sect ion 5.5 on page 51.
NWA1120 Series User’s Guide
27
Chapter 3 Dashboard
Table 4 The Dashboard Screen ( cont inued)
LABEL
View Log
DESCRIPTION
Click t his t o see a list of logs produced by t he NWA. See Sect ion 5.3 on page 49.
Syst em St at us
Syst em Up Tim e
This field displays t he elapsed t im e since t he NWA was t urned on.
Current Dat e/ Tim e
This field displays t he dat e and t im e configured on t he NWA. You can change t his in
t he M a in t e n a n ce > Tim e screen.
Syst em Resource
CPU Usage
This field displays what percent age of t he NWA’s processing abilit y is current ly
being used. The higher t he CPU usage, t he m ore likely t he NWA is t o slow down.
Mem ory Usage
This field displays what percent age of t he NWA’s volat ile m em ory is current ly in
use. The higher t he m em ory usage, t he m ore likely t he NWA is t o slow down. Som e
m em ory is required j ust t o st art t he NWA and t o run t he web configurat or.
I nt erface St at us
I nt erface
This colum n displays each int erface of t he NWA.
St at us
This field indicat es whet her or not t he NWA is using t he int erface.
For each int erface, t his field displays Up when t he NWA is using t he int erface and
D ow n when t he NWA is not using t he int erface.
Channel
Rat e
This shows t he channel num ber which t he NWA is current ly using over t he wireless
LAN.
For t he LAN port t his displays t he port speed and duplex set t ing.
For t he WLAN int erface, it displays t he downst ream and upst ream t ransm ission
rat e or N / A if t he int erface is not in use.
SSI D St at us
28
This sect ion is not available when t he WLAN operat ion m ode is Clie n t .
I nt erface
This colum n displays each of t he NWA’s wireless int erfaces.
SSI D
This field displays t he SSI D( s) current ly used by each wireless m odule.
BSSI D
This field displays t he MAC address of t he wireless m odule.
Securit y
This field displays t he t ype of wireless securit y used by each SSI D.
VLAN
This field displays t he VLAN I D of each SSI D in use, or D isa ble d if t he SSI D does
not use VLAN.
NWA1120 Series User’s Guide
C HAPT ER
Tutorial
This chapt er first provides an overview of how t o configure t he wireless LAN on your NWA, and t hen
gives st ep- by- st ep guidelines showing how t o configure your NWA for som e exam ple scenarios.
4.1 How to Configure the Wireless LAN
This sect ion illust rat es how t o choose which wireless operat ing m ode t o use on t he NWA and how t o
set up t he wireless LAN in each wireless m ode. See Sect ion 4.1.2 on page 29 for links t o m ore
inform at ion on each st ep.
4.1.1 Choosing the Wireless Mode
• Use M BSSI D ( Mult iple Basic Service Set I dent ifier) operat ing m ode if you want t o use t he NWA
as an access point wit h som e groups of users having different securit y or QoS set t ings from ot her
groups of users. See Sect ion 1.2.1 on page 12 for det ails.
• Use Clie nt operat ing m ode if you want t o use t he NWA t o access a wireless net work. See Sect ion
1.2.2 on page 13 for det ails.
• Use Root AP operat ing m ode if you want t o allow wireless client s t o access your wired net work
t hrough t he NWA and also have repeat ers com m unicat e wit h t he NWA t o expand wireleass
coverage. See Sect ion 1.2.3 on page 15 for det ails.
• Use Re pe a t e r operat ing m ode if you want t o use t he NWA t o com m unicat e wit h t he root AP or
ot her repeat ers. See Sect ion 1.2.4 on page 15 for det ails.
4.1.2 Further Reading
Use t hese links t o find m ore inform at ion on t he st eps:
• Choosing 8 0 2 .1 1 M ode : see Sect ion 6.4 on page 60.
• Choosing a wireless Cha nne l I D : see Sect ion 6.4 on page 60.
• Choosing a Se cur it y m ode: see Sect ion 6.6 on page 76.
• Configuring an ext ernal RAD I US server: see Sect ion 6.7 on page 82.
• Configuring M AC Filt e r in g: see Sect ion 6.9 on page 86.
4.2 How to Configure Multiple Wireless Networks
I n t his exam ple, you have been using your NWA as an access point for your office net work. Now
your net work is expanding and you want t o m ake use of t he MBSSI D feat ure ( see Sect ion 6.4.4 on
NWA1120 Series User’s Guide
29
Chapter 4 Tutorial
page 71) t o provide m ult iple wireless net works. Each wireless net work will cat er t o a different t ype
of user.
You want t o m ake t hree wireless net works: one st andard office wireless net work wit h all t he sam e
set t ings you already have, anot her wireless net work wit h high priorit y QoS set t ings for Voice over
I P ( VoI P) users, and a guest net work t hat allows visit ors t o access only t he I nt ernet and t he
net work print er.
To do t his, you will t ake t he following st eps:
Edit t he SSI D profiles.
Change t he operat ing m ode from Root AP t o M BSSI D and react ivat e t he st andard net work.
Configure different securit y m odes for t he net works.
Configure a wireless net work for st andard office use.
Configure a wireless net work for VoI P users.
Configure a wireless net work for guest s t o your office.
The following figure shows t he m ult iple net works you want t o set up. Your NWA is m arked Z, t he
m ain net work rout er is m arked A, and your net work print er is m arked B.
The st andard net work ( SSI D 0 1 ) has access t o all resources. The VoI P net work ( VoI P_ SSI D ) has
access t o all resources and a high QoS priorit y. The guest net work ( Gu e st _ SSI D ) has access t o t he
I nt ernet and t he net work print er only, and a low QoS priorit y.
30
NWA1120 Series User’s Guide
Chapter 4 Tutorial
To configure t hese set t ings, you need t o know t he Media Access Cont rol ( MAC) addresses of t he
devices you want t o allow users of t he guest net work t o access. The following t able shows t he
addresses used in t his exam ple.
Table 5 Tut orial: Exam ple I nform at ion
Net work rout er ( A) MAC address
00: AA: 00: AA: 00: AA
Net work print er ( B) MAC address
AA: 00: AA: 00: AA: 00
4.2.1 Configure the SSID Profiles
Log in t o t he NWA ( see Sect ion 2.1 on page 19) . Click W ir e le ss LAN > SSI D. The SSI D screen
appears.
Click t he Edit icon next t o t he Pr ofile 1 .
Renam e t he Pr ofile N a m e and SSI D as SSI D 0 1 . Click Apply.
Repeat St ep 2 and 3 t o change Pr ofile 2 and Pr ofile 3 t o VoI P_ SSI D and Gu e st _ SSI D.
NWA1120 Series User’s Guide
31
Chapter 4 Tutorial
4.2.1.1 MBSSID
32
Go t o W ir e le ss LAN > W ir e le ss Se t t ings. Select M BSSI D from t he Ope r a t ion M ode drop- down
list box.
SSI D 0 1 is t he st andard net work, so select SSI D 0 1 as t he first profile. I t is always act ive.
Select VoI P_ SSI D as t he second profile, and Gu e st _ SSI D as t he t hird profile. Select t he
corresponding Act ive check- boxes.
Click Apply t o save your set t ings. Now t he t hree SSI Ds are act ivat ed.
NWA1120 Series User’s Guide
Chapter 4 Tutorial
4.2.2 Configure the Standard Network
Click W ir e le ss LAN > SSI D. Click t he Edit icon next t o SSI D 0 1 .
Select Se cPr ofile 1 as SSI D 0 1 ’s securit y profile. Select t he H idde n SSI D checkbox as you want
only aut horized com pany em ployees t o use t his net work, so t here is no need t o broadcast t he SSI D
t o wireless client s scanning t he area.
Also, t he client s on SSI D 0 1 m ight need t o access ot her client s on t he sam e wireless net work. Do
not select t he I nt r a - BSS Tr a ffic block ing check- box.
Click Apply.
NWA1120 Series User’s Guide
33
Chapter 4 Tutorial
Next , click W ir e le ss LAN > Se cu r it y. Click t he Edit icon next t o Se cPr ofile 1 .
Since SSI D 0 1 is t he st andard net work t hat has access t o all resources, assign a m ore secure
securit y m ode. Select W PA2 - PSK- M I X as t he Se cur it y M ode , and ent er t he Pr e - Sha r e d Ke y. I n
t his exam ple, use ThisisSSI D 0 1 Pr e Sha r e dKe y. Click Apply.
You have finished configuring t he st andard net work, SSI D 0 1 .
4.2.3 Configure the VoIP Network
34
Go t o W ir e le ss LAN > SSI D. Click t he Edit icon next t o VoI P_ SSI D.
Select Se cPr ofile 2 as t he Se cur it y Pr ofile for t he VoI P net work. Select t he H idde n SSI D checkbox.
NWA1120 Series User’s Guide
Chapter 4 Tutorial
Select W M M _ VOI CE in t he QoS field t o give VoI P t he highest priorit y in t he wireless net work. Click
Apply.
Next , click W ir e le ss LAN > Se cu r it y. Click t he Edit icon next t o Se cPr ofile 2 .
NWA1120 Series User’s Guide
35
Chapter 4 Tutorial
Select W PA2 - PSK as t he Se cur it y M ode , and ent er t he Pr e - Sha r e d Ke y. I n t his exam ple, use
Th isisVoI PPr e Sh a r e dKe y. Click Apply.
Your VoI P wireless net work is now ready t o use. Any t raffic using t he VoI P_ SSI D profile will be
given t he highest priorit y across t he wireless net work.
4.2.4 Configure the Guest Network
When you are set t ing up t he wireless net work for guest s t o your office, your prim ary concern is t o
keep your net work secure while allowing access t o cert ain resources ( such as a net work print er, or
t he I nt ernet ) . For t his reason, t he pre- configured Gu e st _ SSI D profile has int ra- BSS t raffic blocking
enabled by default . “ I nt ra- BSS t raffic blocking” m eans t hat t he client cannot access ot her client s on
t he sam e wireless net work.
36
Click W ir e le ss LAN > SSI D. Click t he Edit icon next t o Gu e st _ SSI D.
Select Se cPr ofile 3 in t he Se cur it y field. Do not select t he H idde n SSI D check- box so t he guest s
can easily find t he wireless net work.
Select W M M _ BESTEFFORT in t he QoS field t o give t he guest a lower QoS priorit y.
NWA1120 Series User’s Guide
Chapter 4 Tutorial
Select t he check- box of I nt r a - BSS Tr a ffic block ing Ena ble d. Click Apply.
Next , click W ir e le ss LAN > Se cu r it y. Click t he Edit icon next t o Se cPr ofile 3 .
Select W PA- PSK in t he Se cu r it y M ode field. WPA- PSK provides st rong securit y t hat is support ed
by m ost wireless client s. Even t hough your Gue st _ SSI D client s do not have access t o sensit ive
inform at ion on t he net work, you should not leave t he net work wit hout securit y. An at t acker could
st ill cause dam age t o t he net work or int ercept unsecured com m unicat ions or use your I nt ernet
access for illegal act ivit ies.
NWA1120 Series User’s Guide
37
Chapter 4 Tutorial
Ent er t he PSK you want t o use in your net work in t he Pr e Sha r e d Ke y field. I n t his exam ple, t he
PSK is Thisism yGue st W PApr e - sh a r e dk e y. Click Apply.
Your guest wireless net work is now ready t o use.
4.2.5 Testing the Wireless Networks
To m ake sure t hat t he t hree net works are correct ly configured, do t he following.
• On a com put er wit h a wireless client , scan for access point s. You should see t he Gu e st _ SSI D
net work, but not t he SSI D 0 1 and VoI P_ SSI D net works. I f you can see t he SSI D 0 1 and
VoI P_ SSI D net works, go t o it s SSI D Edit screen and m ake sure t o select t he H idde n SSI D
check- box and click Apply.
• Try t o access each net work using t he correct securit y set t ings, and t hen using incorrect securit y
set t ings, such as t he WPA- PSK for anot her act ive net work. I f t he behavior is different from
expect ed ( for exam ple, if you can access t he SSI D 0 1 or VoI P_ SSI D wireless net work using t he
securit y set t ings for t he Gue st _ SSI D wireless net work) check t hat t he SSI D profile is set t o use
t he correct securit y profile, and t hat t he set t ings of t he securit y profile are correct .
4.3 NWA Setup in AP and Wireless Client Modes
This exam ple shows you how t o rest rict wireless access t o your NWA.
4.3.1 Scenario
I n t he figure below, t here are t wo NWAs ( A and B) in t he net work. A is in MBSSI D or root AP m ode
while st at ion B is in wireless client m ode. St at ion B is connect ed t o a File Transfer Prot ocol ( FTP)
server. You want only specified wireless client s t o be able t o access st at ion B. You also want t o allow
38
NWA1120 Series User’s Guide
Chapter 4 Tutorial
wireless t raffic bet ween B and wireless client s connect ed t o A ( W, Y and Z) . Ot her wireless devices
( X) m ust not be able t o connect t o t he FTP server.
Figure 13 FTP Server Connect ed t o a Wireless Client
4.3.2 Configuring the NWA in MBSSID or Root AP Mode
Before set t ing up t he NWA as a wireless client ( B) , you need t o m ake sure t here is an access point
t o connect t o. Use t he Et hernet port on NWA ( A) t o configure it via a wired connect ion.
NWA1120 Series User’s Guide
39
Chapter 4 Tutorial
Log int o t he Web Configurat or on NWA ( A) and go t o t he W ir e le ss LAN > W ir e le ss Se t t ings
screen.
40
Set t he Ope r a t ion M ode t o Root AP.
Select t he W ir e le ss M ode . I n t his exam ple, select 8 0 2 .1 1 b/ g/ n .
Select Pr ofile 1 as t he SSI D Pr ofile .
Choose t he Cha nne l you want NWA ( A) t o use.
Click Apply.
NWA1120 Series User’s Guide
Chapter 4 Tutorial
Go t o W ir e le ss LAN > SSI D. Click t he Edit icon next t o Pr ofile 1 .
Change t he SSI D t o AP- A.
Select Se cPr ofile 1 in t he Se cur it y field.
Select t he check- box for I nt r a - BSS Tr a ffic block ing Ena ble d so t he client cannot access ot her
client s on t he sam e wireless net work.
10 Click Apply.
NWA1120 Series User’s Guide
41
Chapter 4 Tutorial
11 Go t o W ir e le ss LAN > Se cur it y. Click t he Edit icon next t o Se cPr ofile 1 .
12 Configure W PA- PSK as t he Se cur it y M ode and ent er Th isisM yPr e Sh a r e dKe y in t he Pr e Sha r e d Ke y field.
13 Click Apply t o finish configurat ion for NWA ( A) .
4.3.3 Configuring the NWA in Wireless Client Mode
The NWA ( B) should have a wired connect ion before it can be set t o wireless client operat ing m ode.
Connect your NWA t o t he FTP server. Login t o NWA ( B) ’s Web Configurat or and go t o t he W ir e le ss
LAN > W ir e le ss Se t t ings screen. Follow t hese st eps t o configure st at ion B.
42
NWA1120 Series User’s Guide
Chapter 4 Tutorial
Select Clie n t as Ope r a t ion M ode. Click Apply.
Click on t he Sit e Su r ve y but t on. A window should pop up which cont ains a list of all available
wireless devices wit hin your NWA’s range.
Find and select NWA ( A) ’s SSI D: AP- A.
NWA1120 Series User’s Guide
43
Chapter 4 Tutorial
Go t o W ir e le ss LAN > Se cur it y t o configure t he NWA t o use t he sam e securit y m ode and PreShared Key as NWA ( A) : W PA- PSK/ ThisisM yPr e Sha r e dKe y. Click Apply.
Figure 14
4.3.4 MAC Filter Setup
One way t o ensure t hat only specified wireless client s can access t he FTP server is by enabling MAC
filt ering on NWA ( B) ( See Sect ion 6.9 on page 86 for m ore inform at ion on MAC Filt er) .
Go t o W ir e le ss LAN > M AC Filt e r. Click t he Edit icon next t o M a cPr ofile 1 .
Select Allow in t he Acce ss Cont r ol M ode field. Ent er t he MAC addresses of t he wireless client s
( W , Y and Z) you want t o associat e wit h t he NWA. Click Apply.
Now, only t he aut horized wireless client s ( W , Y and Z) can access t he FTP server.
44
NWA1120 Series User’s Guide
Chapter 4 Tutorial
4.3.5 Testing the Connection and Troubleshooting
This sect ion discusses how you can check if you have correct ly configured your net work set up as
described in t his t ut orial.
• Try accessing t he FTP server from wireless client s W , Y or Z. Test if you can send or ret rieve a
file. I f you cannot est ablish a connect ion wit h t he FTP server, do t he following st eps.
Make sure W , Y and Z use t he sam e wireless securit y set t ings as A and can access A.
Make sure B uses t he sam e wireless and wireless securit y set t ings as A and can access A.
Make sure int ra- BSS t raffic is enabled on A.
• Try accessing t he FTP server from X. I f you are able t o access t he FTP server, do t he following.
Make sure MAC filt ering is enabled.
Make sure X’s MAC address is not ent ered in t he list of allowed devices.
NWA1120 Series User’s Guide
45
Chapter 4 Tutorial
46
NWA1120 Series User’s Guide
P ART II
Technical Reference
The appendices provide general inform at ion. Som e det ails m ay not apply t o your NWA.
47
48
C HAPT ER
Monitor
5.1 Overview
This chapt er discusses read- only inform at ion relat ed t o t he device st at e of t he NWA.
Not e: To access t he M on it or screens, you can also click t he links in t he Sum m ary t able of
t he D a sh boa r d screen t o view t he wireless packet s sent / r eceived as well as t he
st at us of client s connect ed t o t he NWA.
5.2 What You Can Do
• Use t he Logs screen t o see t he logs for t he cat egories t hat you select ed in t he Configur a t ion >
Log Se t t ings screen ( see Sect ion 5.3 on page 49) . You can view logs in t his page. Once t he log
ent ries are all used, t he log will wrap around and t he old logs will be delet ed.
• use t he St a t ist ics screen t o view 802.11 m ode, channel num ber, wireless packet specific
st at ist ics and so on ( see Sect ion 5.4 on page 50) .
• Use t he Associa t ion List screen t o view t he wireless devices t hat are current ly associat ed t o t he
NWA ( see Sect ion 5.5 on page 51) .
• Use t he Cha nn e l Usa ge screen t o view whet her a channel is used by anot her wireless net work
or not . I f a channel is being used, you should select a channel rem oved from it by five channels
t o com plet ely avoid overlap ( see Sect ion 5.6 on page 52) .
5.3 View Logs
Use t he Logs screen t o see t he logged m essages for t he NWA.
Log ent ries in red indicat e syst em error logs. The log wraps around and delet es t he old ent ries aft er
it fills.
NWA1120 Series User’s Guide
49
Chapter 5 Monitor
Click M onit or > Logs.
Figure 15 Logs
The following t able describes t he labels in t his screen.
Table 6 Logs
LABEL
DESCRIPTION
Display
Select a cat egory of logs t o view. Select All Log t o view logs from all of t he log
cat egories t hat you select ed in t he Con figu r a t ion > Log Se t t in gs screen.
E- Mail Log Now
Click E- M a il Log N ow t o send t he log screen t o t he e- m ail address specified in t he Log
Set t ings page ( m ake sure t hat you have first filled in t he E- m ail Log Set t ings fields in
Configur a t ion > Log Se t t ings) .
Refresh
Click Re fr e sh t o renew t he log screen.
Clear Log
Click Cle a r Log t o delet e all t he logs.
This field is a sequent ial value and is not associat ed wit h a specific ent ry.
Tim e
This field displays t he t im e t he log was recorded.
Message
This field st at es t he reason for t he log.
Source
This field list s t he source I P address and t he port num ber of t he incom ing packet .
5.4 Statistics
Use t his screen t o view read- only inform at ion, including 802.11 Mode, Channel I D, Ret ry Count and
FCS Error Count . Also provided is t he " poll int erval" . The Poll I nt e r va l field is configurable and is
used for refreshing t he screen.
50
NWA1120 Series User’s Guide
Chapter 5 Monitor
Click M onit or > St a t ist ics. The following screen pops up.
Figure 16 St at ist ics
The following t able describes t he labels in t his screen.
Table 7 St at ist ics
LABEL
DESCRIPTION
Descript ion
This is t he wireless int erface on t he NWA.
802.11 Mode
This field shows which 802.11 m ode t he NWA is using.
Channel I D
This shows t he channel num ber which t he NWA is current ly using over t he wireless
LAN.
RX Pkt s
This is t he num ber of received packet s on t his port .
TX Pkt s
This is t he num ber of t ransm it t ed packet s on t his port .
Ret ry Count
This is t he t ot al num ber of ret ries for t ransm it t ed packet s ( TX) .
FCS Error Count
This is t he t ot al num ber of checksum error of received packet s ( RX) .
Poll I nt erval
Ent er t he t im e int erval for refreshing st at ist ics.
Set I nt erval
Click t his but t on t o apply t he new poll int erval you ent ered above.
St op
Click t his but t on t o st op refreshing st at ist ics.
5.5 Association List
View t he wireless devices t hat are current ly associat ed wit h t he NWA in t he Associa t ion List
screen. Associat ion m eans t hat a wireless client ( for exam ple, your net work or com put er wit h a
wireless net work card) has connect ed successfully t o t he AP ( or wireless rout er) using t he sam e
SSI D, channel and securit y set t ings.
NWA1120 Series User’s Guide
51
Chapter 5 Monitor
Click M onit or > Associa t ion List t o display t he screen as shown next .
Figure 17 Associat ion List
The following t able describes t he labels in t his screen.
Table 8 Associat ion List
LABEL
DESCRIPTION
This is t he index num ber of an associat ed wireless device.
MAC Address
This field displays t he MAC address of an associat ed wireless device.
SSI D
This field displays t he SSI D t o which t he wireless device is associat ed.
Associat ion Tim e
This field displays t he t im e a wireless device first associat ed wit h t he NWA’s wireless
net work.
Signal St rengt h
This field displays t he RSSI ( Received Signal St rengt h I ndicat or) of t he wireless
connect ion.
Refresh
Click Re fr e sh t o reload t he list .
5.6 Channel Usage
Use t his screen t o know whet her a channel is used by anot her wireless net work or not . I f a channel
is being used, you should select a channel rem oved from it by five channels t o com plet ely avoid
overlap.
Click M onit or > Cha nn e l Usa ge t o display t he screen shown next .
52
NWA1120 Series User’s Guide
Chapter 5 Monitor
Wait a m om ent while t he NWA com piles t he inform at ion.
Figure 18 Channel Usage
The following t able describes t he labels in t his screen.
Table 9 Channel Usage
LABEL
DESCRIPTION
SSI D
This is t he Service Set I Dent ificat ion ( SSI D) nam e of t he AP in an I nfrast ruct ure
wireless net work or wireless st at ion in an Ad- Hoc wireless net work. For our purposes,
we define an I nfrast ruct ure net work as a wireless net work t hat uses an AP and an AdHoc net work ( also known as I ndependent Basic Service Set ( I BSS) ) as one t hat
doesn’t . See t he chapt er on wireless configurat ion for m ore inform at ion on basic
service set s ( BSS) and ext ended service set s ( ESS) .
Channel
This is t he index num ber of t he channel current ly used by t he associat ed AP in an
I nfrast ruct ure wireless net work or wireless st at ion in an Ad- Hoc wireless net work.
MAC Address
This field displays t he MAC address of t he AP in an I nfrast ruct ure wireless net work. I t
is random ly generat ed ( so ignore it ) in an Ad- Hoc wireless net work.
Wireless Mode
This is t he I EEE 802.1x st andard used by t he wireless net work.
Signal St rengt h
This field displays t he st rengt h of t he AP’s signal. I f you m ust choose a channel t hat is
current ly in use, choose one wit h low signal st rengt h for m inim um int erference.
Securit y
This is t he wireless securit y m et hod used by t he wireless net work t o prot ect wireless
com m unicat ion bet ween wireless st at ions, access point s and t he wired net work.
Refresh
Click Re fr e sh t o reload t he screen.
NWA1120 Series User’s Guide
53
Chapter 5 Monitor
54
NWA1120 Series User’s Guide
C HAPT ER
Wireless LAN
6.1 Overview
This chapt er discusses t he st eps t o configure t he Wireless Set t ings screen on t he NWA. I t also
int roduces t he wireless LAN ( WLAN) and som e basic scenarios.
Figure 19 Wireless Mode
I n t he figure above, t he NWA allows access t o anot her bridge device ( A) and a not ebook com put er
( B) upon verifying t heir set t ings and credent ials. I t denies access t o ot her devices ( C and D ) wit h
configurat ions t hat do not m at ch t hose specified in your NWA.
6.2 What You Can Do in this Chapter
• Use t he W ir e le ss Se t t ings screen t o configure t he NWA’s operat ion m ode ( see Sect ion 6.4 on
page 60) .
• Uee t he SSI D screen t o configure up t o eight SSI D profiles for your NWA ( see Sect ion 6.5 on
page 74) .
• Use t he Se cu r it y screen t o choose t he wireless securit y m ode for your NWA ( see Sect ion 6.6 on
page 76) .
• Use t he RAD I US screen if you want t o aut hent icat e wireless users using a RADI US Server and/ or
account ing server ( see Sect ion 6.7 on page 82) .
• Use t he La ye r - 2 I sola t ion screen t o configure t he MAC addresses of t he devices t hat you want
t o allow t he associat ed wireless client s t o have access t o when layer- 2 isolat ion is enabled. ( see
Sect ion 6.8 on page 84) .
NWA1120 Series User’s Guide
55
Chapter 6 Wireless LAN
• Use t he M AC Filt e r screen t o specify which wireless st at ion is allowed or denied access t o t he
NWA ( see Sect ion 6.9 on page 86) .
6.3 What You Need To Know
BSS
A Basic Service Set ( BSS) exist s when all com m unicat ions bet ween wireless client s or bet ween a
wireless client and a wired net work client go t hrough one access point ( AP) . I nt ra- BSS t raffic is
t raffic bet ween wireless client s in t he BSS.
ESS
An Ext ended Service Set ( ESS) consist s of a series of overlapping BSSs, each cont aining an access
point , wit h each access point connect ed t oget her by a wired net work. This wired connect ion
bet ween APs is called a Dist ribut ion Syst em ( DS) .
Operating Mode
The NWA can run in four operat ing m odes as follows:
• Root AP. The NWA is a wireless access point t hat allows wireless com m unicat ion t o ot her
devices in t he net work.
• Re pe a t e r. The NWA act s as a wireless repeat er and increase a root AP’s wireless coverage
area.
• Clie nt . The NWA act s as a wireless client t o access a wireless net work.
• M BSSI D. The Mult iple Basic Service Set I dent ifier ( MBSSI D) m ode allows you t o use one
access point t o provide several BSSs sim ult aneously.
Refer t o Chapt er 1 on page 11 for illust rat ions of t hese wireless applicat ions.
SSID
The SSI D ( Service Set I Dent ifier) is t he nam e t hat ident ifies t he Service Set wit h which a wireless
st at ion is associat ed. Wireless st at ions associat ing t o t he access point ( AP) m ust have t he sam e
SSI D. I n ot her words, it is t he nam e of t he wireless net work t hat client s use t o connect t o it .
Norm ally, t he NWA act s like a beacon and regularly broadcast s t he SSI D in t he area. You can hide
t he SSI D inst ead, in which case t he NWA does not broadcast t he SSI D. I n addit ion, you should
change t he default SSI D t o som et hing t hat is difficult t o guess.
This t ype of securit y is fairly weak, however, because t here are ways for unaut horized wireless
devices t o get t he SSI D. I n addit ion, unaut horized wireless devices can st ill see t he inform at ion t hat
is sent in t he wireless net work.
56
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Channel
A channel is t he radio frequency( ies) used by wireless devices. Channels available depend on your
geographical area. You m ay have a choice of channels ( for your region) so you should use a
different channel t han an adj acent AP ( access point ) t o reduce int erference.
Wireless Mode
The I EEE 802.1x st andard was designed t o ext end t he feat ures of I EEE 802.11 t o support ext ended
aut hent icat ion as well as providing addit ional account ing and cont rol feat ures.
MBSSID
Tradit ionally, you needed t o use different APs t o configure different Basic Service Set s ( BSSs) . As
well as t he cost of buying ext ra APs, t here was also t he possibilit y of channel int erference. The
NWA’s MBSSI D ( Mult iple Basic Service Set I Dent ifier) funct ion allows you t o use one access point t o
provide several BSSs sim ult aneously. You can t hen assign varying levels of privilege t o different
SSI Ds.
Wireless st at ions can use different BSSI Ds t o associat e wit h t he sam e AP.
The following are som e not es on m ult iple BSS.
• A m axim um of four BSSs are allowed on one AP sim ult aneously.
• You m ust use different WEP keys for different BSSs. I f t wo st at ions have different BSSI Ds ( t hey
are in different BSSs) , but have t he sam e WEP keys, t hey m ay hear each ot her ’s com m unicat ions
( but not com m unicat e wit h each ot her) .
• MBSSI D should not replace but rat her be used in conj unct ion wit h 802.1x securit y.
Wireless Security
Wireless securit y is vit al t o your net work. I t prot ect s com m unicat ions bet ween wireless st at ions,
access point s and t he wired net work.
Figure 20 Securing t he Wireless Net work
I n t he figure above, t he NWA checks t he ident it y of devices before giving t hem access t o t he
net work. I n t his scenario, Com put er A is denied access t o t he net work, while Com put er B is
grant ed connect ivit y.
NWA1120 Series User’s Guide
57
Chapter 6 Wireless LAN
The NWA secure com m unicat ions via dat a encrypt ion, wireless client aut hent icat ion and MAC
address filt ering. I t can also hide it s ident it y in t he net work.
User Authentication
Aut hent icat ion is t he process of verifying whet her a wireless device is allowed t o use t he wireless
net work. You can m ake every user log in t o t he wireless net work before t hey can use it . However,
every device in t he wireless net work has t o support I EEE 802.1x t o do t his.
For wireless net works, you can st ore t he user nam es and passwords for each user in a RADI US
server. This is a server used in businesses m ore t han in hom es. I f you do not have a RADI US server,
you cannot set up user nam es and passwords for your users.
Unaut horized wireless devices can st ill see t he inform at ion t hat is sent in t he wireless net work,
even if t hey cannot use t he wireless net work. Furt herm ore, t here are ways for unaut horized
wireless users t o get a valid user nam e and password. Then, t hey can use t hat user nam e and
password t o use t he wireless net work.
The following t able shows t he relat ive effect iveness of wireless securit y m et hods: .
Table 10 Wireless Securit y Levels
SECURITY
LEVEL
Least
Secure
SECURITY TYPE
Unique SSI D ( Default )
Unique SSI D wit h Hide SSI D Enabled
MAC Address Filt ering
WEP Encrypt ion
I EEE802.1x EAP wit h RADI US Server Aut hent icat ion
Wi- Fi Prot ect ed Access ( WPA)
Most Secure
WPA2
The available securit y m odes in your NWA are as follows:
• N one . No dat a encrypt ion.
• W EP. Wired Equivalent Privacy ( WEP) encrypt ion scram bles t he dat a t ransm it t ed bet ween t he
wireless st at ions and t he access point s t o keep net work com m unicat ions privat e.
• W PA. Wi- Fi Prot ect ed Access ( WPA) is a subset of t he I EEE 802.11i st andard.
• W PA2 . WPA2 ( I EEE 802.11i) is a wireless securit y st andard t hat defines st ronger encrypt ion,
aut hent icat ion and key m anagem ent t han WPA.
• W PA2 - M I X. This com m ands t he NWA t o use eit her WPA2 or WPA depending on which securit y
m ode t he wireless client uses.
• W PA- PSK. This adds a pre- shared key on t op of WPA st andard.
• W PA2 - PSK. This adds a pre- shared key on t op of WPA2 st andard.
• W PA2 - PSK- M I X. This com m ands t he NWA t o use eit her WPA- PSK or WPA2- PSK depending on
which securit y m ode t he wireless client uses.
Not e: To guarant ee 802.11n wireless speed, please only use WPA2 or WPA2- PSK securit y
m ode. Ot her securit y m odes m ay degrat e t he w ireless speed perform ance t o
802.11g.
58
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Passphrase
A passphrase funct ions like a password. I n WEP securit y m ode, it is furt her convert ed by t he NWA
int o a com plicat ed st ring t hat is referred t o as t he “ key”. This key is request ed from all devices
wishing t o connect t o a wireless net work.
PSK
The Pre- Shared Key ( PSK) is a password shared by a wireless access point and a client during a
previous secure connect ion. The key can t hen be used t o est ablish a connect ion bet ween t he t wo
part ies.
Encryption
Wireless net works can use encrypt ion t o prot ect t he inform at ion t hat is sent in t he wireless
net work. Encrypt ion is like a secret code. I f you do not know t he secret code, you cannot
underst and t he m essage. Encrypt ion is t he process of convert ing dat a int o unreadable t ext . This
secures inform at ion in net work com m unicat ions. The int ended recipient of t he dat a can “ unlock” it
wit h a pre- assigned key, m aking t he inform at ion readable only t o him . The NWA when used as a
wireless client em ploys Tem poral Key I nt egrit y Prot ocol ( TKI P) dat a encrypt ion.
EAP
Ext ensible Aut hent icat ion Prot ocol ( EAP) is a prot ocol used by a wireless client , an access point and
an aut hent icat ion server t o negot iat e a connect ion.
The EAP m et hods em ployed by t he NWA when in Wireless Client operat ing m ode are Transport
Layer Securit y ( TLS) , Prot ect ed Ext ensible Aut hent icat ion Prot ocol ( PEAP) , Light weight Ext ensible
Aut hent icat ion Prot ocol ( LEAP) and Tunneled Transport Layer Securit y ( TTLS) . The aut hent icat ion
prot ocol m ay eit her be Microsoft Challenge Handshake Aut hent icat ion Prot ocol Version 2
( MSCHAPv2) or Generic Token Card ( GTC) .
Furt her inform at ion on t hese t erm s can be found in Appendix E on page 187.
RADIUS
Rem ot e Aut hent icat ion Dial I n User Service ( RADI US) is a prot ocol t hat can be used t o m anage user
access t o large net works. I t is based on a client- server m odel t hat support s aut hent icat ion,
aut horizat ion and account ing. The access point is t he client and t he server is t he RADI US server.
Figure 21 RADI US Server Set up
NWA1120 Series User’s Guide
59
Chapter 6 Wireless LAN
I n t he figure above, wireless client s A and B are t rying t o access t he I nt ernet via t he NWA. The
NWA in t urn queries t he RADI US server if t he ident it y of client s A and U are allowed access t o t he
I nt ernet . I n t his scenario, only client U’s ident it y is verified by t he RADI US server and allowed
access t o t he I nt ernet .
The RADI US server handles t he following t asks:
• Aut he nt ica t ion which det erm ines t he ident it y of t he users.
• Au t h or iza t ion which det erm ines t he net work services available t o aut hent icat ed users once
t hey are connect ed t o t he net work.
• Accou nt in g which keeps t rack of t he client ’s net work act ivit y.
RADI US is a sim ple package exchange in which your AP act s as a m essage relay bet ween t he
wireless client and t he net work RADI US server.
You should know t he I P addresses, port s and share secret s of t he ext ernal RADI US server and/ or
t he ext ernal RADI US account ing server you want t o use wit h your NWA. You can configure a
prim ary and backup RADI US and RADI US account ing server for your NWA.
6.4 Wireless Settings Screen
Use t his screen t o choose t he operat ing m ode for your NWA. Click N e t w or k > W ir e le ss LAN >
W ir e le ss Se t t ings, N e t w or k > W ir e le ss LAN > W ir e le ss Se t t ings- 2 .4 G or N e t w or k >
W ir e le ss LAN > W ir e le ss Se t t ings - 5 G. The screen varies depending upon t he operat ing m ode
you select .
60
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
6.4.1 Root AP Mode
Use t his screen t o use your NWA as an access point . Select Root AP as t he Ope r a t ion M ode . The
following screen displays.
Figure 22 Wireless LAN > Wireless Set t ings: Root AP
NWA1120 Series User’s Guide
61
Chapter 6 Wireless LAN
The following t able describes t he general wireless LAN labels in t his screen.
Table 11 Wireless LAN > Wireless Set t ings: Root AP
LABEL
DESCRIPTION
Basic Set t ings
Wireless LAN
I nt erface
Select t he check box t o t urn on t he wireless LAN on t he NWA.
Operat ion Mode
Select Root AP from t he drop- down list .
Wireless Mode
I f you are in t he W ir e le ss LAN > W ir e le ss Se t t in gs or W ir e le ss LAN > W ir e le ss
Se t t in gs- 2 .4 G screen, you can select from t he following:
•
•
•
8 0 2 .1 1 b/ g t o allow bot h I EEE802.11b and I EEE802.11g com pliant WLAN devices t o
associat e wit h t he NWA. The t ransm ission rat e of your NWA m ight be reduced.
8 0 2 .1 1 b/ g/ n t o allow I EEE802.11b, I EEE802.11g and I EEE802.11n com pliant WLAN
devices t o associat e wit h t he NWA. The t ransm ission rat e of t he NWA m ight be
reduced.
8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he
NWA.
I f you are in t he W ir e le ss LAN > W ir e le ss Se t t in gs- 5 G screen, you can select from
t he following:
•
•
•
8 0 2 .1 1 a / n t o allow I EEE802.11a and I EEE802.11n com pliant WLAN devices t o
associat e wit h t he NWA.
8 0 2 .1 1 a t o allow only I EEE802.11a com pliant WLAN devices t o associat e wit h t he
NWA.
8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he
NWA.
Channel
Select t he operat ing frequency/ channel depending on your part icular region from t he
drop- down list box.
Channel Widt h
This field displays only when you select 8 0 2 .1 1 n, 8 0 2 .1 1 a / n or 8 0 2 .1 1 b/ g/ n in t he
W ir e le ss M ode field.
A st andard 20MHz channel offers t ransfer speeds of up t o 150Mbps whereas a 40MHz
channel uses t wo st andard channels and offers speeds of up t o 300Mbps. However, not all
devices support 40MHz channels.
Select t he channel bandwidt h you want t o use for your wireless net work.
I t is recom m ended t hat you select 2 0 / 4 0 M H z. This allows t he NWA t o adj ust t he channel
bandw idt h depending on net work condit ions.
Select 2 0 M H z if you want t o lessen radio int erference wit h ot her wireless devices in your
neighborhood or t he wireless client s do not support channel bonding.
Select SSI D
Profile
The SSI D ( Service Set I Dent ifier) ident ifies t he Service Set wit h which a wireless st at ion is
associat ed. Wireless st at ions associat ing t o t he access point ( AP) m ust have t he sam e
SSI D. You can have up t o four SSI Ds act ive at t he sam e t im e.
Note: If you are configuring the NWA from a computer connected to the wireless LAN and
you change the NWA’s SSID or security settings, you will lose your wireless
connection when you press Apply to confirm. You must then change the wireless
settings of your computer to match the NWA’s new settings.
62
This is t he index num ber of each SSI D profile.
Act ivve
Select t he check box t o enable an SSI D profile. Ot herwise, clear t he check box.
Profile
Select an SSI D Pr ofile from t he drop- down list box.
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Table 11 Wireless LAN > Wireless Set t ings: Root AP ( cont inued)
LABEL
DESCRIPTION
Universal Repeat er Set t ings
The Universal repeat er funct ion allows t he NWA in root AP or repeat er m ode t o set up a wireless connect ion
bet ween it and anot her NWA in root AP or repeat er m ode.
Note: Universal repeater security is independent of the security settings between the NWA and any wireless
clients.
Local MAC
Address
Loca l M AC Addr e ss is t he MAC address of your NWA.
Universal
Repeat er SSI D
Profile
Select t he SSI D profile you want t o use for universal repeat er connect ions.
Note: You can only configure None, WPA-PSK or WPA2-PSK security mode for the SSID
used by a universal repeater connection.
Advanced Set t ings
Beacon I nt erval
When a wirelessly net work device sends a beacon, it includes wit h it a beacon int erval.
This specifies t he t im e period before t he device sends t he beacon again. The int erval t ells
receiving devices on t he net work how long t hey can wait in lowpower m ode before waking
up t o handle t he beacon. A high value helps save current consum pt ion of t he access point .
DTI M I nt erval
Delivery Traffic I ndicat ion Message ( DTI M) is t he t im e period aft er which broadcast and
m ult icast packet s are t ransm it t ed t o m obile client s in t he Act ive Pow er Managem ent
m ode. A high DTI M value can cause client s t o lose connect ivit y wit h t he net work.
Out put Pow er
Set t he out put power of t he NWA in t his field. I f t here is a high densit y of APs in an area,
decrease t he out put power of t he NWA t o reduce int erference wit h ot her APs. Select one
of t he following Full ( Full Power) , 5 0 % , 2 5 % , or 1 2 .5 % . See t he product specificat ions
for m ore inform at ion on your NWA’s out put power.
Pream ble Type
Select D yn a m ic t o have t he AP aut om at ically use short pream ble when wireless adapt ers
support it , ot herwise t he AP uses long pream ble.
Select Lon g if you are unsure what pream ble m ode t he wireless adapt ers support , and t o
provide m ore reliable com m unicat ions in busy wireless net works.
RTS/ CTS
Threshold
( Request To Send) The t hreshold ( num ber of byt es) for enabling RTS/ CTS handshake.
Dat a wit h it s fram e size larger t han t his value will perform t he RTS/ CTS handshake.
Set t ing t his at t ribut e t o be larger t han t he m axim um MSDU ( MAC service dat a unit ) size
t urns off t he RTS/ CTS handshake. Set t ing t his at t ribut e t o it s sm allest value ( 1) t urns on
t he RTS/ CTS handshake.
Fragm ent at ion
The t hreshold ( num ber of byt es) for t he fragm ent at ion boundary for direct ed m essages. I t
is t he m axim um dat a fragm ent size t hat can be sent .
Ext ension
Channel
Prot ect ion Mode
You can use CTS t o se lf or RTS- CTS prot ect ion m echanism t o reduce conflict s wit h ot her
wireless net works or hidden wireless client s. The t hroughput of RTS- CTS is m uch lower
t han CTS t o se lf. Using t his m ode m ay decrease your wireless perform ance.
A- MPDU
Aggregat ion
This field is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is select ed as
t he W ir e le ss M ode .
Select t o enable A- MPDU aggregat ion.
Message Prot ocol Dat a Unit ( MPDU) aggregat ion collect s Et hernet fram es along wit h t heir
802.11n headers and wraps t hem in a 802.11n MAC header. This m et hod is useful for
increasing bandwidt h t hroughput in environm ent s t hat are prone t o high error rat es.
Short GI
This field is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is select ed as
t he W ir e le ss M ode .
Select En a ble d t o use Sh or t GI ( Guard I nt erval) . The guard int erval is t he gap
int roduced bet ween dat a t ransm ission from users in order t o reduce int erference.
Reducing t he GI increases dat a t ransfer rat es but also increases int erference. I ncreasing
t he GI reduces dat a t ransfer rat es but also reduces int erference.
NWA1120 Series User’s Guide
63
Chapter 6 Wireless LAN
Table 11 Wireless LAN > Wireless Set t ings: Root AP ( cont inued)
LABEL
DESCRIPTION
MCS Rat e
The M CS Ra t e t able is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is
select ed in t he W ir e le ss M ode field.
I EEE 802.11n support s m any different dat a rat es which are called MCS rat es. MCS st ands
for Modulat ion and Coding Schem e. This is an 802.11n feat ure t hat increases t he wireless
net work perform ance in t erm s of t hroughput .
For each MCS Rat e ( 0- 15) , select eit her Ena ble d t o have t he NWA use t he dat a rat e.
Clear t he En a ble d check box if you do not want t he NWA t o use t he dat a rat e.
Turn on t he Aut o opt ion t o have t he NWA set t he dat a rat es aut om at ically t o opt im ize t he
t hroughput .
Note: You can set the NWA to use up to four MCS rates at a time.
64
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
6.4.2 Repeater Mode
Use t his screen t o have t he NWA act as a wireless repeat er. You need t o know t he MAC address of
t he peer device, which also m ust be in Repeat er or Root AP m ode.
Figure 23 Wireless LAN > Wireless Set t ings: Repeat er
The following t able describes t he bridge labels in t his screen.
Table 12 Wireless LAN > Wireless Set t ings: Repeat er
LABEL
DESCRIPTION
Basic Set t ings
Wireless LAN
I nt erface
Select t he check box t o t urn on t he wireless LAN on t he NWA.
Operat ion Mode
Select Re pe a t e r from t he drop- down list .
NWA1120 Series User’s Guide
65
Chapter 6 Wireless LAN
Table 12 Wireless LAN > Wireless Set t ings: Repeat er ( cont inued)
LABEL
DESCRIPTION
Wireless Mode
I f you are in t he W ir e le ss LAN > W ir e le ss Se t t in gs or W ir e le ss LAN > W ir e le ss
Se t t in gs- 2 .4 G screen, you can select from t he following:
•
•
•
8 0 2 .1 1 b/ g t o allow bot h I EEE802.11b and I EEE802.11g com pliant WLAN devices t o
associat e wit h t he NWA. The t ransm ission rat e of your NWA m ight be reduced.
8 0 2 .1 1 b/ g/ n t o allow I EEE802.11b, I EEE802.11g and I EEE802.11n com pliant WLAN
devices t o associat e wit h t he NWA. The t ransm ission rat e of t he NWA m ight be
reduced.
8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he
NWA.
I f you are in t he W ir e le ss LAN > W ir e le ss Se t t in gs- 5 G screen, you can select from
t he following:
•
•
•
8 0 2 .1 1 a / n t o allow I EEE802.11a and I EEE802.11n com pliant WLAN devices t o
associat e wit h t he NWA.
8 0 2 .1 1 a t o allow only I EEE802.11a com pliant WLAN devices t o associat e wit h t he
NWA.
8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he
NWA.
Channel
Select t he operat ing frequency/ channel depending on your part icular region from t he
drop- down list box.
Channel Widt h
This field displays only when you select 8 0 2 .1 1 n, 8 0 2 .1 1 a / n or 8 0 2 .1 1 b/ g/ n in t he
W ir e le ss M ode field.
A st andard 20MHz channel offers t ransfer speeds of up t o 150Mbps whereas a 40MHz
channel uses t wo st andard channels and offers speeds of up t o 300Mbps. However, not all
devices support 40MHz channels.
Select t he channel bandwidt h you want t o use for your wireless net work.
I t is recom m ended t hat you select 2 0 / 4 0 M H z. This allows t he NWA t o adj ust t he channel
bandw idt h depending on net work condit ions.
Select 2 0 M H z if you want t o lessen radio int erference wit h ot her wireless devices in your
neighborhood or t he wireless client s do not support channel bonding.
Universal Repeat er Set t ings
The Universal repeat er funct ion allows t he NWA in root AP or repeat er m ode t o set up a wireless connect ion
bet ween it and anot her NWA in root AP or repeat er m ode.
Note: Universal repeater security is independent of the security settings between the NWA and any wireless
clients.
Local MAC
Address
Loca l M AC Addr e ss is t he MAC address of your NWA.
Universal
Repeat er SSI D
Profile
Select t he SSI D profile you want t o use for universal repeat er connect ions wit h an AP or
repeat er or regular wireless connect ions wit h wireless client s.
Note: You can only configure None, WPA-PSK or WPA2-PSK security mode for the SSID
used by a universal repeater connection.
Root MAC
Address
Specify t he peer device’s MAC address. The peer device can be a NWA in eit her root AP
m ode or repeat er m ode.
Advanced Set t ings
66
Beacon I nt erval
When a wirelessly net work device sends a beacon, it includes wit h it a beacon int erval.
This specifies t he t im e period before t he device sends t he beacon again. The int erval t ells
receiving devices on t he net work how long t hey can wait in lowpower m ode before waking
up t o handle t he beacon. A high value helps save current consum pt ion of t he access point .
DTI M I nt erval
Delivery Traffic I ndicat ion Message ( DTI M) is t he t im e period aft er which broadcast and
m ult icast packet s are t ransm it t ed t o m obile client s in t he Act ive Pow er Managem ent
m ode. A high DTI M value can cause client s t o lose connect ivit y wit h t he net work.
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Table 12 Wireless LAN > Wireless Set t ings: Repeat er ( cont inued)
LABEL
DESCRIPTION
Out put Pow er
Set t he out put power of t he NWA in t his field. I f t here is a high densit y of APs in an area,
decrease t he out put power of t he NWA t o reduce int erference wit h ot her APs. Select one
of t he following Fu ll ( Full Power) , 5 0 % , 2 5 % or 1 2 .5 % . See t he product specificat ions
for m ore inform at ion on your NWA’s out put power.
Pream ble Type
Select D yn a m ic t o have t he AP aut om at ically use short pream ble when wireless adapt ers
support it , ot herwise t he AP uses long pream ble.
Select Lon g if you are unsure what pream ble m ode t he wireless adapt ers support , and t o
provide m ore reliable com m unicat ions in busy wireless net works.
RTS/ CTS
Threshold
( Request To Send) The t hreshold ( num ber of byt es) for enabling RTS/ CTS handshake.
Dat a wit h it s fram e size larger t han t his value will perform t he RTS/ CTS handshake.
Set t ing t his at t ribut e t o be larger t han t he m axim um MSDU ( MAC service dat a unit ) size
t urns off t he RTS/ CTS handshake. Set t ing t his at t ribut e t o it s sm allest value ( 1) t urns on
t he RTS/ CTS handshake.
Fragm ent at ion
The t hreshold ( num ber of byt es) for t he fragm ent at ion boundary for direct ed m essages. I t
is t he m axim um dat a fragm ent size t hat can be sent .
Ext ension
Channel
Prot ect ion Mode
You can use CTS t o se lf or RTS- CTS prot ect ion m echanism t o reduce conflict s wit h ot her
wireless net works or hidden wireless client s. The t hroughput of RTS- CTS is m uch lower
t han CTS t o se lf. Using t his m ode m ay decrease your wireless perform ance.
A- MPDU
Aggregat ion
This field is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is select ed as
t he W ir e le ss M ode .
Select t o enable A- MPDU aggregat ion.
Message Prot ocol Dat a Unit ( MPDU) aggregat ion collect s Et hernet fram es along wit h t heir
802.11n headers and wraps t hem in a 802.11n MAC header. This m et hod is useful for
increasing bandwidt h t hroughput in environm ent s t hat are prone t o high error rat es.
Short GI
This field is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is select ed as
t he W ir e le ss M ode .
Select En a ble d t o use Sh or t GI ( Guard I nt erval) . The guard int erval is t he gap
int roduced bet ween dat a t ransm ission from users in order t o reduce int erference.
Reducing t he GI increases dat a t ransfer rat es but also increases int erference. I ncreasing
t he GI reduces dat a t ransfer rat es but also reduces int erference.
MCS Rat e
The M CS Ra t e t able is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is
select ed in t he W ir e le ss M ode field.
I EEE 802.11n support s m any different dat a rat es which are called MCS rat es. MCS st ands
for Modulat ion and Coding Schem e. This is an 802.11n feat ure t hat increases t he wireless
net work perform ance in t erm s of t hroughput .
For each MCS Rat e ( 0- 15) , select eit her Ena ble d t o have t he NWA use t he dat a rat e.
Clear t he En a ble d check box if you do not want t he NWA t o use t he dat a rat e.
Turn on t he Aut o opt ion t o have t he NWA set t he dat a rat es aut om at ically t o opt im ize t he
t hroughput .
Note: You can set the NWA to use up to four MCS rates at a time.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
NWA1120 Series User’s Guide
67
Chapter 6 Wireless LAN
6.4.3 Wireless Client Mode
Use t his screen t o t urn your NWA int o a wireless client . Select Clie n t as t he Ope r a t ion M ode . The
following screen displays.
Figure 24 Wireless LAN > Wireless Set t ings: Wireless Client
The following t able describes t he general wireless LAN labels in t his screen.
Table 13 Wireless LAN > Wireless Set t ings: Wireless Client
LABEL
DESCRIPTION
Basic Set t ings
Wireless LAN
I nt erface
Select t he check box t o t urn on t he wireless LAN on t he NWA.
Operat ion Mode
Select Clie n t in t his field.
Sit e Survey
Click t his t o view a list of available wireless access point s wit hin t he range. Select t he AP
you want t o use.
Note: After selecting Client as the Operation Mode in the Basic Settings section, you must
click Apply to be able to select from the AP list.
68
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Table 13 Wireless LAN > Wireless Set t ings: Wireless Client ( cont inued)
LABEL
DESCRIPTION
SSI D Profile
The SSI D ( Service Set I Dent ifier) ident ifies t he Service Set wit h which a wireless st at ion is
associat ed. Wireless st at ions associat ing t o t he access point ( AP) m ust have t he sam e
SSI D.
I n t his field, select t he SSI D profile of t he AP you want t o use. Click Apply.
The SSI D used in t he select ed SSI D profile aut om at ically changes t o be t he one you select
in t he Sit e Sur ve y screen.
Set t he securit y configurat ion for t his operat ing m ode in t he W ir e le ss LAN > Se cu r it y
screen. Check t he D a sh boa r d screen t o check if t he set t ings you set show in t he WLAN
inform at ion.
Note: If you are configuring the NWA from a computer connected to the wireless LAN and you
change the NWA’s SSID or security settings, you will lose your wireless connection
when you press Apply to confirm. You must then change the wireless settings of your
computer to match the NWA’s new settings.
Channel
This shows t he operat ing frequency/ channel in use. This field is read- only when you select
Clie n t as your operat ion m ode.
Channel Widt h
This field is not available in t he NWA1123- NI .
A st andard 20MHz channel offers t ransfer speeds of up t o 150Mbps whereas a 40MHz
channel uses t wo st andard channels and offers speeds of up t o 300Mbps. However, not all
devices support 40MHz channels.
Select t he channel bandwidt h you want t o use for your wireless net work.
I t is recom m ended t hat you select 2 0 / 4 0 M H z . This allows t he NWA t o adj ust t he channel
bandwidt h depending on net work condit ions.
Select 2 0 M H z if you want t o lessen radio int erference wit h ot her wireless devices in your
neighborhood or t he AP do not support channel bonding.
Advanced Set t ings
Out put Pow er
Set t he out put power of t he NWA in t his field. I f t here is a high densit y of APs in an area,
decrease t he out put power of t he NWA t o reduce int erference wit h ot her APs. Select one of
t he following Fu ll ( Full Power) , 5 0 % , 2 5 % or 1 2 .5 % . See t he product specificat ions for
m ore inform at ion on your NWA’s out put power.
Pream ble Type
Select D yn a m ic t o have t he NWA aut om at ically use short pream ble when t he wireless
net work your NWA is connect ed t o support s it , ot herwise t he NWA uses long pream ble.
Select Lon g pream ble if you are unsure what pream ble m ode t he wireless device your NWA
is connect ed t o support s, and t o provide m ore reliable com m unicat ions in busy wireless
net works.
RTS/ CTS
Threshold
( Request To Send) The t hreshold ( num ber of byt es) for enabling RTS/ CTS handshake. Dat a
wit h it s fram e size larger t han t his value will perform t he RTS/ CTS handshake. Set t ing t his
at t ribut e t o be larger t han t he m axim um MSDU ( MAC service dat a unit ) size t urns off t he
RTS/ CTS handshake. Set t ing t his at t ribut e t o it s sm allest value ( 1) t urns on t he RTS/ CTS
handshake.
Fragm ent at ion
This field is not available in t he NWA1123- NI .
The t hreshold ( num ber of byt es) for t he fragm ent at ion boundary for direct ed m essages. I t
is t he m axim um dat a fragm ent size t hat can be sent .
Ext ension
channel
prot ect ion m ode
You can use CTS t o se lf or RTS- CTS prot ect ion m echanism t o reduce conflict s wit h ot her
wireless net works or hidden wireless client s. The t hroughput of RTS- CTS is m uch lower
t han CTS t o se lf. Using t his m ode m ay decrease your wireless perform ance.
NWA1120 Series User’s Guide
69
Chapter 6 Wireless LAN
Table 13 Wireless LAN > Wireless Set t ings: Wireless Client ( cont inued)
LABEL
DESCRIPTION
A- MPDU
Aggregat ion
This field is not available in t he NWA1123- NI .
Select t o enable A- MPDU aggregat ion.
Message Prot ocol Dat a Unit ( MPDU) aggregat ion collect s Et hernet fram es along wit h t heir
802.11n headers and wraps t hem in a 802.11n MAC header. This m et hod is useful for
increasing bandwidt h t hroughput in environm ent s t hat are prone t o high error rat es.
Short GI
This field is not available in t he NWA1123- NI .
Select Ena ble d t o use Sh or t GI ( Guard I nt erval) . The guard int erval is t he gap int roduced
bet ween dat a t ransm ission from users in order t o reduce int erference. Reducing t he GI
increases dat a t ransfer rat es but also increases int erference. I ncreasing t he GI reduces dat a
t ransfer rat es but also reduces int erference.
70
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
6.4.4 MBSSID Mode
Use t his screen t o have t he NWA funct ion in MBSSI D m ode. Select M BSSI D as t he Ope r a t ion
M ode . The following screen diplays.
Figure 25 Wireless LAN > Wireless Set t ings: MBSSI D
The following t able describes t he labels in t his screen.
Table 14 Wireless LAN > Wireless Set t ings: MBSSI D
LABEL
DESCRIPTION
Basic Set t ings
Wireless LAN
I nt erface
Select t he check box t o t urn on t he wireless LAN on t he NWA.
Operat ion Mode
Select M BSSI D from t he drop- down list .
NWA1120 Series User’s Guide
71
Chapter 6 Wireless LAN
Table 14 Wireless LAN > Wireless Set t ings: MBSSI D ( cont inued)
LABEL
DESCRIPTION
Wireless Mode
I f you are in t he W ir e le ss LAN > W ir e le ss Se t t in gs or W ir e le ss LAN > W ir e le ss
Se t t in gs- 2 .4 G screen, you can select from t he following:
•
•
•
8 0 2 .1 1 b/ g t o allow bot h I EEE802.11b and I EEE802.11g com pliant WLAN devices t o
associat e wit h t he NWA. The t ransm ission rat e of your NWA m ight be reduced.
8 0 2 .1 1 b/ g/ n t o allow I EEE802.11b, I EEE802.11g and I EEE802.11n com pliant WLAN
devices t o associat e wit h t he NWA. The t ransm ission rat e of t he NWA m ight be
reduced.
8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he
NWA.
I f you are in t he W ir e le ss LAN > W ir e le ss Se t t in gs- 5 G screen, you can select from
t he following:
•
•
•
8 0 2 .1 1 a / n t o allow I EEE802.11a and I EEE802.11n com pliant WLAN devices t o
associat e wit h t he NWA.
8 0 2 .1 1 a t o allow only I EEE802.11a com pliant WLAN devices t o associat e wit h t he
NWA.
8 0 2 .1 1 n t o allow only I EEE802.11n com pliant WLAN devices t o associat e wit h t he
NWA.
Channel
Select t he operat ing frequency/ channel depending on your part icular region from t he
drop- down list box.
Channel Widt h
This field displays only when you select 8 0 2 .1 1 n, 8 0 2 .1 1 a / n or 8 0 2 .1 1 b/ g/ n in t he
W ir e le ss M ode field.
A st andard 20MHz channel offers t ransfer speeds of up t o 150Mbps whereas a 40MHz
channel uses t wo st andard channels and offers speeds of up t o 300Mbps. However, not all
devices support 40MHz channels.
Select t he channel bandwidt h you want t o use for your wireless net work.
Select 2 0 M H z if you want t o lessen radio int erference wit h ot her wireless devices in your
neighborhood or t he wireless client s do not support channel bonding.
Select SSI D
Profile
The SSI D ( Service Set I Dent ifier) ident ifies t he Service Set wit h which a wireless st at ion is
associat ed. Wireless st at ions associat ing t o t he access point ( AP) m ust have t he sam e
SSI D. You can have up t o eight SSI Ds act ive at t he sam e t im e.
Note: If you are configuring the NWA from a computer connected to the wireless LAN and
you change the NWA’s SSID or security settings, you will lose your wireless
connection when you press Apply to confirm. You must then change the wireless
settings of your computer to match the NWA’s new settings.
This is t he index num ber of each SSI D profile.
Act ivve
Select t he check box t o enable an SSI D profile. Ot herwise, clear t he check box.
Profile
Select an SSI D Pr ofile from t he drop- down list box.
Advanced Set t ings
72
Beacon I nt erval
When a wirelessly net work device sends a beacon, it includes wit h it a beacon int erval.
This specifies t he t im e period before t he device sends t he beacon again. The int erval t ells
receiving devices on t he net work how long t hey can wait in lowpower m ode before waking
up t o handle t he beacon. A high value helps save current consum pt ion of t he access point .
DTI M I nt erval
Delivery Traffic I ndicat ion Message ( DTI M) is t he t im e period aft er which broadcast and
m ult icast packet s are t ransm it t ed t o m obile client s in t he Act ive Pow er Managem ent
m ode. A high DTI M value can cause client s t o lose connect ivit y wit h t he net work.
Out put Pow er
Set t he out put power of t he NWA in t his field. I f t here is a high densit y of APs in an area,
decrease t he out put power of t he NWA t o reduce int erference wit h ot her APs. Select one
of t he following Fu ll ( Full Power) , 5 0 % , 2 5 % or 1 2 .5 % . See t he product specificat ions
for m ore inform at ion on your NWA’s out put power.
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Table 14 Wireless LAN > Wireless Set t ings: MBSSI D ( cont inued)
LABEL
DESCRIPTION
Pream ble Type
Select D yn a m ic t o have t he AP aut om at ically use short pream ble when wireless adapt ers
support it , ot herwise t he AP uses long pream ble.
Select Lon g if you are unsure what pream ble m ode t he wireless adapt ers support , and t o
provide m ore reliable com m unicat ions in busy wireless net works.
RTS/ CTS
Threshold
( Request To Send) The t hreshold ( num ber of byt es) for enabling RTS/ CTS handshake.
Dat a wit h it s fram e size larger t han t his value will perform t he RTS/ CTS handshake.
Set t ing t his at t ribut e t o be larger t han t he m axim um MSDU ( MAC service dat a unit ) size
t urns off t he RTS/ CTS handshake. Set t ing t his at t ribut e t o it s sm allest value ( 1) t urns on
t he RTS/ CTS handshake.
Ext ension
Channel
Prot ect ion Mode
You can use CTS t o se lf or RTS- CTS prot ect ion m echanism t o reduce conflict s wit h ot her
wireless net works or hidden wireless client s. The t hroughput of RTS- CTS is m uch lower
t han CTS t o se lf. Using t his m ode m ay decrease your wireless perform ance.
A- MPDU
Aggregat ion
This field is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is select ed as
t he W ir e le ss M ode .
Select t o enable A- MPDU aggregat ion.
Message Prot ocol Dat a Unit ( MPDU) aggregat ion collect s Et hernet fram es along wit h t heir
802.11n headers and wraps t hem in a 802.11n MAC header. This m et hod is useful for
increasing bandwidt h t hroughput in environm ent s t hat are prone t o high error rat es.
Short GI
This field is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is select ed as
t he W ir e le ss M ode .
Select En a ble d t o use Sh or t GI ( Guard I nt erval) . The guard int erval is t he gap
int roduced bet ween dat a t ransm ission from users in order t o reduce int erference.
Reducing t he GI increases dat a t ransfer rat es but also increases int erference. I ncreasing
t he GI reduces dat a t ransfer rat es but also reduces int erference.
MCS Rat e
The M CS Ra t e t able is available only when 8 0 2 .1 1 n , 8 0 2 .1 1 b/ g/ n or 8 0 2 .1 1 a / n is
select ed in t he W ir e le ss M ode field.
I EEE 802.11n support s m any different dat a rat es which are called MCS rat es. MCS st ands
for Modulat ion and Coding Schem e. This is an 802.11n feat ure t hat increases t he wireless
net work perform ance in t erm s of t hroughput .
For each MCS Rat e ( 0- 15) , select eit her Ena ble d t o have t he NWA use t he dat a rat e.
Clear t he En a ble d check box if you do not want t he NWA t o use t he dat a rat e.
Turn on t he Aut o opt ion t o have t he NWA set t he dat a rat es aut om at ically t o opt im ize t he
t hroughput .
Note: You can set the NWA to use up to four MCS rates at a time.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
NWA1120 Series User’s Guide
73
Chapter 6 Wireless LAN
6.5 SSID Screen
Use t his screen t o view and m odify t he set t ings of t he SSI D profiles on t he NWA. Click W ir e le ss
LAN > SSI D t o display t he screen as shown.
Figure 26 Wireless LAN > SSI D
The following t able describes t he labels in t his screen.
Table 15 Wireless LAN > SSI D
LABEL
DESCRI PTI ON
Profile Set t ings
74
This field displays t he index num ber of each SSI D profile.
Profile Nam e
This field displays t he ident ificat ion nam e of each SSI D profile on t he NWA.
SSI D
This field displays t he SSI D ( Service Set I Dent ifier) , t hat is, t he nam e of t he wireless
net work t o which a wireless client can connect . When a wireless client scans for an AP
t o associat e wit h, t his is t he nam e t hat is broadcast and seen in t he wireless client
ut ilit y.
Securit y
This field indicat es which securit y profile is current ly associat ed wit h each SSI D
profile. See Sect ion 6.6 on page 76 for m ore inform at ion.
RADI US
This field displays which RADI US profile is current ly associat ed wit h each SSI D
profile, if you have a RADI US server configured.
QoS
This field displays t he Qualit y of Service set t ing for t his profile or N ON E if QoS is not
configured on a profile.
MAC Filt er
This field displays which MAC filt er profile is current ly associat ed wit h each SSI D
profile, or D isa ble if MAC filt ering is not configured on an SSI D profile.
Modify
Click Edit t o go t o t he SSI D configurat ion screen where you can m odify set t ings in an
SSI D profile.
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
6.5.1 Configuring SSID
Use t his screen t o configure an SSI D profile. I n t he W ir e le ss LAN > SSI D screen, click Edit next
t o t he SSI D profile you want t o configure t o display t he following screen.
Figure 27 SSI D: Edit
The following t able describes t he labels in t his screen.
Table 16 SSI D: Edit
LABEL
DESCRI PTI ON
Profile Nam e
This is t he nam e t hat ident ifying t his profile.
SSI D
When a wireless client scans for an AP t o associat e wit h, t his is t he nam e t hat is
broadcast and seen in t he wireless client ut ilit y.
Securit y
Select a securit y profile t o use wit h t his SSI D profile. See Sect ion 6.6 on page 76 for
m ore inform at ion. I f you do not want t his profile t o use wireless securit y, select
D isa ble d.
RADI US
Select a RADI US profile from t he drop- down list box, if you have a RADI US server
configured. I f you do not need t o use RADI US aut hent icat ion, ignore t his field. See
Sect ion 6.7 on page 82 for m ore inform at ion.
MAC Filt ering
Select a MAC filt er profile from t he drop- down list box. I f you do not want t o use MAC
filt ering on t his profile, select D isa ble d.
NWA1120 Series User’s Guide
75
Chapter 6 Wireless LAN
Table 16 SSI D: Edit ( cont inued)
LABEL
DESCRI PTI ON
QoS
Select t he Qualit y of Service priorit y for t his BSS’s t raffic.
•
•
•
I f you select W M M from t he QoS list , t he priorit y of a dat a packet depends on t he
packet ’s I EEE 802.1q or DSCP header. I f a packet has no WMM value assigned t o
it , it is assigned t he default priorit y.
I f you select W M M _ VOI CE, W M M _ VI D EO, W M M _ BESTEFFORT or
W M M _ BACKGROUN D, t he NWA applies t hat QoS set t ing t o all of t hat SSI D’s
t raffic.
I f you select N on e , t he NWA applies no priorit y t o t raffic on t his SSI D.
Note: When you configure an SSID profile’s QoS settings, the NWA applies the same
QoS setting to all of the profile’s traffic.
BSSI D VLAN I D
Ent er a VLAN I D for t he SSI D profile.
Packet s com ing from t he WLAN using t his SSI D profile are t agged wit h t he VLAN I D
num ber by t he NWA.
Num ber of Wireless
St at ions Allowed t o
Associat e
Use t his field t o set a m axim um num ber of wireless st at ions t hat m ay connect t o t he
device.
Hidden SSI D
I f you do not select t he checkbox, t he NWA broadcast s t his SSI D ( a wireless client
scanning for an AP will find t his SSI D) . Alt ernat ively, if you select t he checkbox, t he
NWA hides t his SSI D ( a wireless client scanning for an AP will not find t his SSI D) .
I nt ra- BSS Traffic
Blocking
Select t his t o prevent wireless client s in t his profile’s BSS from com m unicat ing wit h
one anot her.
Enable Layer- 2
I solat ion
Select t his t o enable layer- 2 isolat ion for t his profile. Wireless client s t hat connect t o
t he WLAN using t his SSI D can access only cert ain pre- defined devices. See Sect ion
6.8 on page 84.
Back
Click Ba ck t o ret urn t o t he previous screen.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
I nt ra- BSS t raffic blocking is enabled aut om at ically when you enable layer- 2 isolat ion.
6.6 Wireless Security Screen
Use t his screen t o choose t he securit y m ode for your NWA.
76
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Click W ir e le ss LAN > Se cu r it y. Select t he profile t hat you want t o configure and click Edit .
Figure 28 Wireless > Securit y
The Se cur it y Se t t in gs screen varies depending upon t he securit y m ode you select .
Figure 29 Securit y: None
Not e t hat som e screens display different ly depending on t he operat ing m ode select ed in t he
W ir e le ss LAN > W ir e le ss Se t t ings, N e t w or k > W ir e le ss LAN > W ir e le ss Se t t ings- 2 .4 G or
N e t w or k > W ir e le ss LAN > W ir e le ss Se t t ings - 5 G screen.
Not e: You m ust enable t he sam e wireless securit y set t ings on t he NWA and on all w ireless
client s t hat you want t o associat e wit h it .
NWA1120 Series User’s Guide
77
Chapter 6 Wireless LAN
6.6.1 Security: WEP
Use t his screen t o use WEP as t he securit y m ode for your NWA. Select W EP in t he Se cur it y M ode
field t o display t he following screen.
Figure 30 Securit y: WEP
The following t able describes t he labels in t his screen.
Table 17 Securit y: WEP
78
LABEL
DESCRIPTION
Profile Nam e
This is t he nam e t hat ident ifying t his profile.
Securit y Mode
Choose W EP in t his field.
Aut hent icat ion
Type
Select Ope n or Sh a r e d from t he drop- down list box.
Dat a Encrypt ion
Select 6 4 - bit W EP or 1 2 8 - bit W EP t o enable dat a encrypt ion.
Passphrase
Ent er t he passphrase or st ring of t ext used for aut om at ic WEP key generat ion on wireless
client adapt ers.
Generat e
Click t his t o get t he keys from t he Pa ssph r a se you ent ered.
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Table 17 Securit y: WEP ( cont inued)
LABEL
DESCRIPTION
Key 1 t o
The WEP keys are used t o encrypt dat a. Bot h t he NWA and t he wireless st at ions m ust use
t he sam e WEP key for dat a t ransm ission.
Key 4
I f you chose 6 4 - bit W EP, t hen ent er any 5 ASCI I charact ers or 10 hexadecim al
charact ers ( " 0- 9" , " A- F" ) .
I f you chose 1 2 8 - bit W EP, t hen ent er 13 ASCI I charact ers or 26 hexadecim al charact ers
( " 0- 9" , " A- F" ) .
You can configure up t o four keys, but only one key can be act ivat ed at any one t im e.
Back
Click Ba ck t o ret urn t o t he previous screen.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
6.6.2 Security: WPA, WPA2, WPA2-MIX
This screen varies depending on t he operat ing m ode you select in t he W ir e le ss LAN > W ir e le ss
Se t t in gs screen.
6.6.2.1 Access Point
Use t his screen t o em ploy WPA or WPA2 as t he securit y m ode for your NWA t hat is in root AP,
MBSSI D or repeat er operat ing m ode. Select W PA, W PA2 or W PA2 - M I X in t he Se cur it y M ode
field t o display t he following screen.
Figure 31 Securit y: WPA/ WPA2 for Access Point
The following t able describes t he labels in t his screen.
Table 18 Securit y: WPA/ WPA2 for Access Point
LABEL
DESCRIPTION
Securit y Set t ings
Profile Nam e
This is t he nam e t hat ident ifying t his profile.
Securit y Mode
Choose W PA, W PA2 or W PA- M I X in t his field.
Rekey Opt ions
NWA1120 Series User’s Guide
79
Chapter 6 Wireless LAN
Table 18 Securit y: WPA/ WPA2 for Access Point ( cont inued)
LABEL
DESCRIPTION
Reaut hent icat ion
Tim e
Specify how oft en wireless st at ions have t o resend user nam es and passwords in order t o
st ay connect ed.
Ent er a t im e int erval bet ween 100 and 3600 seconds. Alt ernat ively, ent er “ 0” t o t urn
reaut hent icat ion off.
Note: If wireless station authentication is done using a RADIUS server, the reauthentication
timer on the RADIUS server has priority.
Enable Group- Key
Updat e
Select t his opt ion t o have t he NWA aut om at ically disconnect a wireless st at ion from t he
wired net work aft er a period of inact ivit y. The wireless st at ion needs t o ent er t he user
nam e and password again before access t o t he wired net work is allowed.
Ent er a t im e int erval bet ween 100 and 3600 seconds.
Back
Click Ba ck t o ret urn t o t he previous screen.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
6.6.2.2 Wireless Client
Use t his screen t o em ploy WPA or WPA2 as t he securit y m ode for your NWA t hat is in wireless client
operat ing m ode. Select W PA or W PA2 in t he Se cur it y M ode field t o display t he following screen.
Figure 32 Securit y: WPA for Wireless Client
80
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
The following t able describes t he labels in t his screen.
Table 19 Securit y: WPA/ WPA2 for Wireless Client
LABEL
DESCRIPTION
Securit y Set t ings
Profile Nam e
This is t he nam e t hat ident ifying t his profile.
Securit y Mode
Choose t he sam e securit y m ode used by t he AP.
Dat a Encrypt ion
This shows t he encrypt ion m et hod used by t he NWA.
I EEE802.1x Aut hent icat ion
Eap Type
The opt ions on t he left refer t o EAP m et hods. You can choose eit her TLS, LEAP, PEAP or
TTLS.
I f you select TTLS or PEAP, t he opt ions on t he right refer t o aut hent icat ion prot ocols. You
can choose bet ween PAP, CH AP, M SCH AP, M SCH APv2 and/ or GTC.
User I nform at ion
Usernam e
Supply t he user nam e of t he account creat ed in t he RADI US server.
Login Nam e
Password
Supply t he password of t he account creat ed in t he RADI US server.
Cert ificat e
User Cert ificat e
I f you select TLS, ent er t he nam e of t he cert ificat e used t o t o verify t he ident it y of client s.
Back
Click Ba ck t o ret urn t o t he previous screen.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
6.6.3 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX
Use t his screen t o em ploy WPA- PSK, WPA2- PSK or WPA2- PSK- MI X as t he securit y m ode of your
NWA. Select W PA- PSK, W PA2 - PSK or W PA2 - PSK- M I X in t he Se cur it y M ode field t o display t he
following screen.
Figure 33 Securit y: WPA- PSK, WPA2- PSK or WPA2- PSK- MI X
NWA1120 Series User’s Guide
81
Chapter 6 Wireless LAN
The following t able describes t he labels not previously discussed
Table 20 Securit y: WPA- PSK, WPA2- PSK or WPA2- PSK- MI X
LABEL
DESCRIPTION
Profile Nam e
This is t he nam e t hat ident ifying t his profile.
Securit y Mode
Choose W PA- PSK, W PA2 - PSK or W PA2 - PSK- M I X in t his field.
Pre- Shared Key
The encrypt ion m echanism s used for W PA and W PA- PSK are t he sam e. The only
difference bet ween t he t wo is t hat W PA- PSK uses a sim ple com m on password, inst ead
of user- specific credent ials.
Type a pre- shared key from 8 t o 63 case- sensit ive ASCI I charact ers ( including spaces
and sym bols) .
Back
Click Ba ck t o ret urn t o t he previous screen.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
6.7 RADIUS Screen
Use t his screen t o set up your NWA’s RADI US server set t ings. Click W ir e le ss LAN > RAD I US. The
screen appears as shown.
Figure 34 Wireless LAN > RADI US
82
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
Select a profile you want t o configure and click Edit .
Figure 35 Wireless LAN > RADI US
The following t able describes t he labels in t his screen.
Table 21 Wireless LAN > RADI US
LABEL
DESCRIPTION
Profile Nam e
This is t he nam e t hat ident ifying t his RADI US profile.
Prim ary RADI US
Server
Select t he check box t o enable user aut hent icat ion t hrough an ext ernal aut hent icat ion
server.
Prim ary Server I P
Address
Ent er t he I P address of t he RADI US server t o be used for aut hent icat ion.
Prim ary Server
Port
Ent er t he port num ber of t he RADI US server t o be used for aut hent icat ion.
Prim ary Share
Secret
Ent er a password ( up t o 64 alphanum eric charact ers) as t he key t o be shared
bet ween t he ext ernal aut hent icat ion server and t he NWA. The key m ust be t he sam e
on t he ext ernal aut hent icat ion server and your NWA. The key is not sent over t he
net work.
NWA1120 Series User’s Guide
83
Chapter 6 Wireless LAN
Table 21 Wireless LAN > RADI US ( cont inued)
LABEL
DESCRIPTION
Backup RADI US
Server
I f t he NWA cannot com m unicat e wit h t he prim ary RADI US server, you can have t he
NWA use a backup RADI US server. Make sure t he check boxe is select ed if you want
t o use t he backup server.
The NWA will at t em pt t o com m unicat e t hree t im es before using t he backup server.
Request s can be issued from t he client int erface t o use t he backup server. The lengt h
of t im e for each aut hent icat ion is decided by t he wireless client or based on t he
configurat ion of t he Re a u t h e n t ica t ion Tim e field in t he W ir e le ss LAN > Se cu r it y
screen.
Backup Server I P
Address
Ent er t he I P address of t he RADI US server t o be used for aut hent icat ion.
Backup Server
Port
Ent er t he port num ber of t he RADI US server t o be used for aut hent icat ion.
Backup Share
Secret
Ent er a password ( up t o 64 alphanum eric charact ers) as t he key t o be shared
bet ween t he ext ernal aut hent icat ion server and t he NWA. The key m ust be t he sam e
on t he ext ernal aut hent icat ion server and your NWA. The key is not sent over t he
net work.
Prim ary Account ing
Server
Select t he check box t o enable user account ing t hrough an ext ernal aut hent icat ion
server.
Prim ary Server I P
Address
Ent er t he I P address of t he ext ernal account ing server in dot t ed decim al not at ion.
Prim ary Server
Port
Ent er t he port num ber of t he ext ernal account ing server.
Prim ary Share
Secret
Ent er a password ( up t o 64 alphanum eric charact ers) as t he key t o be shared
bet ween t he ext ernal account ing server and t he NWA. The key m ust be t he sam e on
t he ext ernal account ing server and your NWA. The key is not sent over t he net work.
Backup Account ing
Server
I f t he NWA cannot com m unicat e wit h t he prim ary account ing server, you can have
t he NWA use a backup account ing server. Make sure t he check boxe is select ed if you
want t o use t he backup server.
The NWA will at t em pt t o com m unicat e t hree t im es before using t he backup server.
Backup Server I P
Address
Ent er t he I P address of t he ext ernal account ing server in dot t ed decim al not at ion.
Backup Server
Port
Ent er t he port num ber of t he ext ernal account ing server.
Backup Share
Secret
Ent er a password ( up t o 64 alphanum eric charact ers) as t he key t o be shared
bet ween t he ext ernal account ing server and t he NWA. The key m ust be t he sam e on
t he ext ernal account ing and your NWA. The key is not sent over t he net work.
Back
Click Ba ck t o ret urn t o t he previous screen.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
6.8 Layer-2 Isolation
Layer- 2 isolat ion is used t o prevent wireless client s associat ed wit h your NWA from com m unicat ing
wit h ot her wireless client s, APs, com put ers or rout ers in a net work.
I n t he following exam ple, layer- 2 isolat ion is enabled on t he NWA t o allow a guest wireless client
( A) t o access t he m ain net work rout er ( B) . The rout er provides access t o t he I nt ernet and t he
net work print er ( C) while prevent ing t he client from accessing ot her com put ers and servers on t he
84
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
net work. The client can com m unicat e wit h ot her wireless client s only if I nt ra- BSS Traffic blocking is
disabled.
Not e: I n t r a - BSS Tr a ffic Block in g is act ivat ed when you enable layer- 2 isolat ion.
Figure 36 Layer- 2 I solat ion Applicat ion
MAC addresses t hat are not list ed in t he layer- 2 isolat ion t able are blocked from com m unicat ing
wit h t he NWA’s wireless client s except for broadcast packet s. Layer- 2 isolat ion does not check t he
t raffic bet ween wireless client s t hat are associat ed wit h t he sam e AP. I nt ra- BSS Traffic allows
wireless client s associat ed wit h t he sam e AP t o com m unicat e wit h each ot her.
6.8.1 Layer-2 Isolation Screen
Use t his screen t o specify devices you want t he users on your wireless net works t o access. Click
W ir e le ss LAN > La ye r - 2 I sola t ion . The screen displays as shown.
NWA1120 Series User’s Guide
85
Chapter 6 Wireless LAN
Not e: You need t o know t he MAC address of each wireless client , AP, com put er or rout er
t hat you want t o allow t o com m unicat e wit h t he NWA's wireless client s.
Figure 37 Wireless LAN > Layer- 2 I solat ion
The following t able describes t he labels in t his screen.
Table 22 Wireless LAN > Layer- 2 I solat ion
LABEL
DESCRIPTION
I ndex
This is t he index num ber of t he MAC address list ed.
MAC Address
Ent er t he MAC addresses of t he wireless client , AP, com put er or rout er t hat you want t o
allow t he associat ed wireless client s t o have access t o in t hese address fields. Ent er t he
MAC address in a valid MAC address form at ( six hexadecim al charact er pairs, for
exam ple 12: 34: 56: 78: 9a: bc) .
Descript ion
Ent er a nam e t o ident ify t his device.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
6.9 MAC Filter Screen
Every Et hernet device has a unique MAC ( Media Access Cont rol) address. The MAC address is
assigned at t he fact ory and consist s of six pairs of hexadecim al charact ers, for exam ple,
86
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
00: A0: C5: 00: 00: 02. You need t o know t he MAC address of each device t o configure MAC filt ering
on t he NWA.
The MAC filt er funct ion allows you t o configure t he NWA t o grant access t o t he NWA from ot her
wireless devices ( Allow Associat ion) or exclude devices from accessing t he NWA ( Deny Associat ion) .
Figure 38 MAC Filt ering
I n t he figure above, wireless client U is able t o connect t o t he I nt ernet because it s MAC address is
in t he allowed associat ion list specified in t he NWA. The MAC address of client A is eit her denied
associat ion or is not in t he list of allowed wireless client s specified in t he NWA.
Use t his screen t o enable MAC address filt ering in your NWA. You can specify MAC addresses t o
eit her allow or deny associat ion wit h your NWA. Click W ir e le ss LAN > M AC Filt e r. The screen
displays as shown.
Figure 39 Wireless LAN > MAC Filt er
NWA1120 Series User’s Guide
87
Chapter 6 Wireless LAN
Select a profile you want t o configure and click Edit .
Figure 40 MAC Filt er: Edit
The following t able describes t he labels in t his screen.
Table 23 Wireless LAN > MAC Filt er
LABEL
DESCRIPTION
Profile Nam e
This is t he nam e t hat ident ifying t his profile.
Access Cont rol Mode
Select D isa ble d if you do not want t o use t his feat ure.
Select Allow t o perm it access t o t he NWA. MAC addresses not list ed will be denied
access t o t he NWA.
Select D e n y t o block access t o t heNWA. MAC addresses not list ed will be allowed t o
access t he NWA.
This is t he index num ber of t he MAC address list ed.
MAC Address
Ent er t he MAC addresses ( in XX: XX: XX: XX: XX: XX form at ) of t he wireless st at ion t o be
allowed or denied access t o t he NWA.
Back
Click Ba ck t o ret urn t o t he previous screen.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
6.10 Technical Reference
This sect ion provides t echnical background inform at ion about t he t opics covered in t his chapt er.
Refer t o Appendix E on page 187 for furt her readings on Wireless LAN.
88
NWA1120 Series User’s Guide
Chapter 6 Wireless LAN
6.10.1 Additional Wireless Terms
Table 24 Addit ional Wireless Term s
TERM
DESCRIPTION
I nt ra- BSS Traffic
This describes direct com m unicat ion ( not t hrough t he NWA) bet ween t wo wireless
devices wit hin a wireless net work. You m ight disable t his kind of com m unicat ion t o
enhance securit y wit hin your wireless net work.
RTS/ CTS Threshold
I n a wireless net work which covers a large area, wireless devices are som et im es not
aware of each ot her ’s presence. This m ay cause t hem t o send inform at ion t o t he AP
at t he sam e t im e and result in inform at ion colliding and not get t ing t hrough.
By set t ing t his value lower t han t he default value, t he wireless devices m ust
som et im es get perm ission t o send inform at ion t o t he NWA. The lower t he value, t he
m ore oft en t he devices m ust get perm ission.
I f t his value is great er t han t he fragm ent at ion t hreshold value ( see below) , t hen
wireless devices never have t o get perm ission t o send inform at ion t o t he NWA.
Pream ble
A pream ble affect s t he t im ing in your wireless net work. There are t wo pream ble
m odes: long and short . I f a device uses a different pream ble m ode t han t he NWA
does, it cannot com m unicat e wit h t he NWA.
Fragm ent at ion
Threshold
A sm all fragm ent at ion t hreshold is recom m ended for busy net works, while a larger
t hreshold provides fast er perform ance if t he net work is not very busy.
Roam ing
I f you have t wo or m ore NWAs ( or ot her wireless access point s) on your wireless
net work, you can enable t his opt ion so t hat wireless devices can change locat ions
wit hout having t o log in again. This is useful for devices, such as not ebooks, t hat
m ove around a lot .
Ant enna
An ant enna couples Radio Frequency ( RF) signals ont o air. A t ransm it t er wit hin a
wireless device sends an RF signal t o t he ant enna, which propagat es t he signal
t hrough t he air. The ant enna also operat es in reverse by capt uring RF signals from
t he air.
Posit ioning t he ant ennas properly increases t he range and coverage area of a wireless
LAN.
6.10.2 WMM QoS
WMM ( Wi- Fi Mult iMedia) QoS ( Qualit y of Service) ensures qualit y of service in wireless net works. I t
cont rols WLAN t ransm ission priorit y on packet s t o be t ransm it t ed over t he wireless net work.
WMM QoS priorit izes wireless t raffic according t o t he delivery requirem ent s of t he individual and
applicat ions. WMM QoS is a part of t he I EEE 802.11e QoS enhancem ent t o cert ified Wi- Fi wireless
net works.
On APs wit hout WMM QoS, all t raffic st ream s are given t he sam e access priorit y t o t he wireless
net work. I f t he int roduct ion of anot her t raffic st ream creat es a dat a t ransm ission dem and t hat
exceeds t he current net work capacit y, t hen t he new t raffic st ream reduces t he t hroughput of t he
ot her t raffic st ream s.
The NWA uses WMM QoS t o priorit ize t raffic st ream s according t o t he I EEE 802.1q or DSCP
inform at ion in each packet ’s header. The NWA aut om at ically det erm ines t he priorit y t o use for an
individual t raffic st ream . This prevent s reduct ions in dat a t ransm ission for applicat ions t hat are
sensit ive t o lat ency and j it t er ( variat ions in delay) .
NWA1120 Series User’s Guide
89
Chapter 6 Wireless LAN
6.10.2.1 WMM QoS Priorities
The following t able describes t he WMM QoS priorit y levels t hat t he NWA uses.
Table 25 WMM QoS Priorit ies
Priorit y Level
descript ion
voice
Typically used for t raffic t hat is especially sensit ive t o j it t er. Use t his priorit y t o
reduce lat ency for im proved voice qualit y.
( WMM_VOI CE)
video
( WMM_VI DEO)
best effort
( WMM_BESTEFFORT)
background
( WMM_BACKGROUND)
Typically used for t raffic which has som e t olerance for j it t er but needs t o be
priorit ized over ot her dat a t raffic.
Typically used for t raffic from applicat ions or devices t hat lack QoS capabilit ies. Use
best effort priorit y for t raffic t hat is less sensit ive t o lat ency, but is affect ed by long
delays, such as I nt ernet surfing.
This is t ypically used for non- crit ical t raffic such as bulk t ransfers and print j obs
t hat are allowed but t hat should not affect ot her applicat ions and users. Use
background priorit y for applicat ions t hat do not have st rict lat ency and t hroughput
requirem ent s.
6.10.3 Security Mode Guideline
The following is a general guideline in choosing t he securit y m ode for your NWA.
• Use WPA( 2) - PSK if you have WPA( 2) - aware wireless client s but no RADI US server.
• Use WPA( 2) securit y if you have WPA( 2) - aware wireless client s and a RADI US server. WPA has
user aut hent icat ion and im proved dat a encrypt ion over WEP.
• Use WPA( 2) - PSK if you have WPA( 2) - aware wireless client s but no RADI US server.
• I f you don’t have WPA( 2) - aware wireless client s, t hen use WEP key encrypt ing. A higher bit key
offers bet t er securit y. You can m anually ent er 64- bit or 128- bit WEP keys.
More inform at ion on Wireless Securit y can be found in Appendix E on page 187.
90
NWA1120 Series User’s Guide
C HAPT ER
LAN
7.1 Overview
This chapt er describes how you can configure t he I P address of your NWA.
The I nt ernet Prot ocol ( I P) address ident ifies a device on a net work. Every net working device
( including com put ers, servers, rout ers, print ers, et c.) needs an I P address t o com m unicat e across
t he net work. These net working devices are also known as host s.
Figure 41 I Pv4 Set up
The figure above illust rat es one possible set up of your NWA. The gat eway I Pv4 address is
192.168.1.1 and t he I Pv4 address of t he NWA is 192.168.1.2 ( default ) . The gat eway and t he device
m ust belong in t he sam e subnet m ask t o be able t o com m unicat e wit h each ot her.
7.2 What You Can Do in this Chapter
Use t he LAN I P screen t o configure t he I P address of your NWA ( see Sect ion 7.4 on page 93) .
7.3 What You Need to Know
The Et hernet param et ers of t he NWA are preset in t he fact ory wit h t he following values:
I P address of 192.168.1.2
Subnet m ask of 255.255.255.0 ( 24 bit s)
NWA1120 Series User’s Guide
91
Chapter 7 LAN
IPv6
I Pv6 ( I nt ernet Prot ocol version 6) , is designed t o enhance I P address size and feat ures. The
increase in I Pv6 address size t o 128 bit s ( from t he 32- bit I Pv4 address) allows up t o 3.4 x 10 38 I P
addresses.
IPv6 Addressing
The 128- bit I Pv6 address is writ t en as eight 16- bit hexadecim al blocks separat ed by colons ( : ) . This
is an exam ple I Pv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000.
I Pv6 addresses can be abbreviat ed in t wo ways:
• Leading zeros in a block can be om it t ed. So 2001:0db8:1a2b:0015:0000:0000:1a2f:0000 can
be writ t en as 2001:db8:1a2b:15:0:0:1a2f:0.
• Any num ber of consecut ive blocks of zeros can be replaced by a double colon. A double colon can
only appear once in an I Pv6 address. So 2001:0db8:0000:0000:1a2f:0000:0000:0015 can be
writ t en as 2001:0db8::1a2f:0000:0000:0015, 2001:0db8:0000:0000:1a2f::0015,
2001:db8::1a2f:0:0:15 or 2001:db8:0:0:1a2f::15.
Prefix and Prefix Length
Sim ilar t o an I Pv4 subnet m ask, I Pv6 uses an address prefix t o represent t he net work address. An
I Pv6 prefix lengt h specifies how m any m ost significant bit s ( st art from t he left ) in t he address
com pose t he net work address. The prefix lengt h is writ t en as “ / x” where x is a num ber. For
exam ple,
2001:db8:1a2b:15::1a2f:0/32
m eans t hat t he first 32 bit s ( 2001:db8) is t he subnet prefix.
Link-local Address
A link- local address uniquely ident ifies a device on t he local net work ( t he LAN) . I t is sim ilar t o a
“ privat e I P address” in I Pv4. You can have t he sam e link- local address on m ult iple int erfaces on a
device. A link- local unicast address has a predefined prefix of fe80: : / 10. The link- local unicast
address form at is as follows.
Table 26 Link- local Unicast Address Form at
1111 1110 10
I nt erface I D
10 bit s
54 bit s
64 bit s
Global Address
A global address uniquely ident ifies a device on t he I nt ernet . I t is sim ilar t o a “ public I P address” in
I Pv4. A global unicast address st art s wit h a 2 or 3.
92
NWA1120 Series User’s Guide
Chapter 7 LAN
7.4 LAN IP Screen
Use t his screen t o configure t he I P address for your NWA. Click N e t w or k > LAN t o display t he
following screen.
Figure 42 LAN I P
The following t able describes t he labels in t his screen.
Table 27 LAN I P
LABEL
DESCRIPTION
I Pv4 Address
Assignm ent
Obt ain I P Address
Aut om at ically
Select t his opt ion if your NWA is using a dynam ically assigned I Pv4 address from a
DHCP server each t im e.
Note: You must know the IP address assigned to the NWA (by the DHCP server) to
access the NWA again.
Use Fixed I P Address
I P Address
Select t his opt ion if your NWA is using a st at ic I Pv4 address. When you select t his
opt ion, fill in t he fields below.
Ent er t he I P address of your NWA in dot t ed decim al not at ion.
Note: If you change the NWA's IP address, you must use the new IP address if you
want to access the web configurator again.
Subnet Mask
Type t he subnet m ask.
Gat eway I P
Address
Type t he I Pv4 address of t he gat eway. The gat eway is an im m ediat e neighbor of your
NWA t hat will forward t he packet t o t he dest inat ion. On t he LAN, t he gat eway m ust
be a rout er on t he sam e segm ent as your NWA; over t he WAN, t he gat eway m ust be
t he I P address of one of t he rem ot e nodes.
NWA1120 Series User’s Guide
93
Chapter 7 LAN
Table 27 LAN I P ( cont inued)
LABEL
DESCRIPTION
I Pv6 Address
Assignm ent
Enable St at eful
Address Aut oconfigurat ion
Select t his t o t urn on I Pv6 st at eful aut oconfigurat ion t o have t he NWA obt ain an I Pv6
global address from a DHCPv6 server in your net work.
I Pv6 Address/ Prefix
Lengt h
Ent er your I Pv6 address and prefix m anually.
Syst em DNS Servers
94
Prim ary DNS Server
Ent er t he I Pv4 address of t he first DNS ( Dom ain Nam e Service) server, if provided.
Secondary DNS Server
Ent er t he I Pv4 address of t he second DNS ( Dom ain Nam e Service) server address, if
provided.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
NWA1120 Series User’s Guide
C HAPT ER
VLAN
8.1 Overview
This chapt er discusses how t o configure t he NWA’s VLAN set t ings.
Figure 43 Managem ent VLAN Set up
I n t he figure above, t o access and m anage t he NWA from com put er A, t he NWA and swit ch B’s
port s t o which com put er A and t he NWA are connect ed should be in t he sam e VLAN.
8.1.1 What You Can Do in This Chapter
The VLAN screens let you set up t he NWA’s m angem ent VLAN ( Sect ion 8.3 on page 96) .
8.2 What You Need to Know
Introduction to VLANs
A Virt ual Local Area Net work ( VLAN) allows a physical net work t o be part it ioned int o m ult iple logical
net works. Devices on a logical net work belong t o one group. A device can belong t o m ore t han one
group. Wit h VLAN, a device cannot direct ly t alk t o or hear from devices t hat are not in t he sam e
group( s) ; t he t raffic m ust first go t hrough a rout er.
I n Mult i-Tenant Unit ( MTU) applicat ions, VLAN is vit al in providing isolat ion and securit y am ong t he
subscribers. When properly configured, VLAN prevent s one subscriber from accessing t he net work
resources of anot her on t he sam e LAN, t hus a user will not see t he print ers and hard disks of
anot her user in t he sam e building.
NWA1120 Series User’s Guide
95
Chapter 8 VLAN
VLAN also increases net work perform ance by lim it ing broadcast s t o a sm aller and m ore
m anageable logical broadcast dom ain. I n t radit ional swit ched environm ent s, all broadcast packet s
go t o each and every individual port . Wit h VLAN, all broadcast s are confined t o a specific broadcast
dom ain.
IEEE 802.1Q Tag
The I EEE 802.1Q st andard defines an explicit VLAN t ag in t he MAC header t o ident ify t he VLAN
m em bership of a fram e across bridges. A VLAN t ag includes t he 12- bit VLAN I D and 3- bit user
priorit y. The VLAN I D associat es a fram e wit h a specific VLAN and provides t he inform at ion t hat
devices need t o process t he fram e across t he net work.
8.3 VLAN Screen
Use t his screen t o set up t he VLAN for m anaging t he NWA. Click N e t w or k > VLAN t o display t he
screen as shown.
Figure 44 Net work > VLAN
The following t able describes t he labels in t his screen.
Figure 45 Net work > VLAN
96
LABEL
DESCRI PTI ON
802.1Q VLAN
Select t his t o enable VLAN t agging on t he NWA.
Managem ent VLAN
Select t his t o enable VLAN m anagem ent . Only t raffic t agged wit h t he m anagem ent
VLAN I D can access t he NWA. At least one device in your net work m ust belong t o t he
VLAN specified below in order t o m anage t he NWA.
Managem ent VLAN I D
Ent er a num ber from 1 t o 4094 t o define t he NWA’s m anagem ent VLAN group.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
NWA1120 Series User’s Guide
C HAPT ER
System
9.1 Overview
This chapt er shows you how t o enable rem ot e m anagem ent of your NWA. I t provides inform at ion
on det erm ining which services or prot ocols can access which of t he NWA’s int erfaces.
Rem ot e Managem ent allows a user t o adm inist rat e t he device over t he net work. You can m anage
your NWA from a rem ot e locat ion via t he following int erfaces:
• WLAN
• LAN
• Bot h WLAN and LAN
• Neit her ( Disable)
Figure 46 Rem ot e Managem ent Exam ple
I n t he figure above, t he NWA ( A) is being m anaged by a deskt op com put er ( B) connect ed via LAN
( Land Area Net work) . I t is also being accessed by a not ebook (C) connect ed via WLAN ( Wireless
LAN) .
9.2 What You Can Do in this Chapter
• Use t he W W W screen t o configure t hrough which int erface( s) and from which I P address( es) you
can use t he Web Browser t o m anage t he NWA ( see Sect ion 9.4 on page 100) .
• Use t he Ce r t ifica t e s screen t o delet e and im port cert ificat es ( seen Sect ion 9.5 on page 101) .
• Use t he Te lne t screen t o configure t hrough which int erface( s) and from which I P address( es)
you can use Telnet t o m anage t he NWA. A Telnet connect ion is priorit ized by t he NWA over ot her
rem ot e m anagem ent sessions ( see Sect ion 9.6 on page 102) .
NWA1120 Series User’s Guide
97
Chapter 9 System
• Use t he SN M P screen t o configure t hrough which int erface( s) and from which I P address( es) a
net work syst em s m anager can access t he NWA ( see Sect ion 9.7 on page 104) .
• Use t he FTP screen t o configure t hrough which int erface( s) and from which I P address( es) you
can use File Transfer Prot ocol ( FTP) t o m anage t he NWA. You can use FTP t o upload t he lat est
firm ware for exam ple ( see Sect ion 9.8 on page 106) .
9.3 What You Need To Know
WWW
The World Wide Web allows you t o access files host ed in a rem ot e server. For exam ple, you can
view t ext files ( usually referred t o as ‘pages’) using your web browser via HyperText Transfer
Prot ocol ( HTTP) .
Telnet
Telnet is short for Telecom m unicat ions Net work, which is a client- side prot ocol t hat enables you t o
access a device over t he net work.
FTP
File Transfer Prot ocol ( FTP) allows you t o upload or download a file or several files t o and from a
rem ot e locat ion using a client or t he com m and console.
SNMP
Sim ple Net work Managem ent Prot ocol ( SNMP) is a m em ber of t he TCP/ I P prot ocol suit e used for
exchanging m anagem ent inform at ion bet ween net work devices.
Your NWA support s SNMP agent funct ionalit y, which allows a m anager st at ion t o m anage and
m onit or t he NWA t hrough t he net work. The NWA support s SNMP version one ( SNMPv1) , version
t wo ( SNMPv2c) and version t hree ( SNMPv3) .
98
NWA1120 Series User’s Guide
Chapter 9 System
The next figure illust rat es an SNMP m anagem ent operat ion.
Figure 47 SNMP Managem ent Mode
An SNMP m anaged net work consist s of t wo m ain t ypes of com ponent : agent s and a m anager.
An agent is a m anagem ent soft ware m odule t hat resides in a m anaged device ( t he NWA) . An agent
t ranslat es t he local m anagem ent inform at ion from t he m anaged device int o a form com pat ible wit h
SNMP. The m anager is t he console t hrough which net work adm inist rat ors perform net work
m anagem ent funct ions. I t execut es applicat ions t hat cont rol and m onit or m anaged devices.
SNMP allows a m anager and agent s t o com m unicat e for t he purpose of accessing inform at ion such
as packet s received, node port st at us, et c.
SNMP v3 and Security
SNMP v3 enhances securit y for SNMP m anagem ent . SNMP m anagers can be required t o
aut hent icat e wit h agent s before conduct ing SNMP m anagem ent sessions.
Securit y can be furt her enhanced by encrypt ing t he SNMP m essages sent from t he m anagers.
Encrypt ion prot ect s t he cont ent s of t he SNMP m essages. When t he cont ent s of t he SNMP m essages
are encrypt ed, only t he int ended recipient s can read t hem .
Remote Management Limitations
Rem ot e m anagem ent over LAN or WLAN will not work when:
• You have disabled t hat service in one of t he rem ot e m anagem ent screens.
• The I P address in t he Se cu r e d Clie n t I P Addr e ss field does not m at ch t he client I P address. I f
it does not m at ch, t he NWA will disconnect t he session im m ediat ely.
• You m ay only
aut om at ically
m anagem ent
m anagem ent
NWA1120 Series User’s Guide
have one rem ot e m anagem ent session running at one t im e. The NWA
disconnect s a rem ot e m anagem ent session of lower priorit y when anot her rem ot e
session of higher priorit y st art s. The priorit ies for t he different t ypes of rem ot e
sessions are as follows:
99
Chapter 9 System
Telnet
HTTP
Certificate
A cert ificat e cont ains t he cert ificat e owner ’s ident it y and public key. Cert ificat es provide a way t o
exchange public keys for use in aut hent icat ion.
Figure 48 Cert ificat es Exam ple
I n t he figure above, t he NWA ( Z) checks t he ident it y of t he not ebook ( A) using a cert ificat e before
grant ing access t o t he net work.
The cert ificat ion aut horit y cert ificat e t hat you can im port t o your NWA should be in PFX PKCS# 12
file form at . This form at referred t o as t he Personal I nform at ion Exchange Synt ax St andard is
com prised of a privat e key- public cert ificat e pair t hat is furt her encrypt ed wit h a password. Before
you im port a cert ificat e int o t he NWA, you should verify t hat you have t he correct cert ificat e.
Key dist ribut ion is sim ple and very secure since you can freely dist ribut e public keys and you never
need t o t ransm it privat e keys.
9.4 WWW Screen
Use t his screen t o configure your NWA via t he World Wide Web ( W W W ) using a Web browser. This
let s you specify which I P addresses or com put ers are able t o com m unicat e wit h and access t he
NWA.
100
NWA1120 Series User’s Guide
Chapter 9 System
To change your NWA’s W W W set t ings, click Syst e m > W W W. The following screen shows.
Figure 49 Syst em > WWW
The following t able describes t he labels in t his screen.
Table 28 Syst em > WWW
LABEL
DESCRIPTION
WWW
HTTP Port
You m ay change t he server port num ber for a service if needed, however you m ust use
t he sam e port num ber in order t o use t hat service for rem ot e m anagem ent .
HTTPS Port
The HTTPS proxy server list ens on port 443 by default . I f you change t he HTTPS proxy
server port t o a different num ber on t he NWA, for exam ple 8443, t hen you m ust not ify
people who need t o access t he NWA web configurat or t o use “ ht t ps: / / NWA I P
Address: 8443” as t he URL.
Server Access
Select t he int erface( s) t hrough which a com put er m ay access t he NWA using WWW and
t o which t he I P and MAC filt ering rules you specified below are applied. Ot herwise, select
D isa ble t o allow any com put er t o access t he NWA t hrough any int erface using WWW.
Secured Client I P
Address
A secured client is a “ t rust ed” com put er t hat is allowed t o com m unicat e wit h t he NWA
using t his service.
Select All t o allow any com put er t o access t he NWA using t his service.
Choose Se le ct e d t o j ust allow t he com put er wit h t he I P address t hat you specify t o
access t he NWA using t his service.
Secured Client
MAC Address
Select All t o allow any com put er t o access t he NWA using t his service.
Apply
Click Apply t o save your cust om ized set t ings.
Cancel
Click Ca nce l t o begin configuring t his screen afresh.
Choose Se le ct e d t o j ust allow t he com put er wit h t he MAC address t hat you specify t o
access t he NWA using t his service.
9.5 Certificates Screen
Use t his screen t o delet e or im port cert ificat es.
NWA1120 Series User’s Guide
101
Chapter 9 System
Click Syst e m > Ce r t ifica t e s. The following screen shows.
Figure 50 Syst em > Cert ificat es
The following t able describes t he labels in t his screen.
Table 29 Syst em > Cert ificat es
LABEL
DESCRIPTION
I m port Cert ificat e
I m port
Cert ificat e
Ent er t he locat ion of a previously- saved cert ificat e t o upload t o t he NWA. Alt ernat ively,
click t he Br ow se but t on t o locat e a list .
Browse
Click t his but t on t o locat e a previously- saved cert ificat e t o upload t o t he NWA.
I m port
Click t his but t on t o upload t he previously- saved cert ificat e displayed in t he I m por t
Ce r t ifica t e field t o t he NWA.
Delet e Cert ificat e
You can delet e a
cert ificat e
Select t he cert ificat e from t he list t hat you want t o delet e.
Delet e
Click t his t o delet e t he select ed cert ificat e.
9.6 Telnet Screen
Use t his screen t o configure your NWA for rem ot e Telnet access. You can use Telnet t o access t he
NWA’s Com m and Line I nt erface ( CLI ) .
Click Syst e m > Te lne t . The following screen displays.
Figure 51 Syst em > Telnet
102
NWA1120 Series User’s Guide
Chapter 9 System
The following t able describes t he labels in t his screen.
Table 30 Syst em > Telnet
LABEL
DESCRIPTION
TELNET
Port
You can change t he server port num ber for a service if needed, however you m ust use
t he sam e port num ber in order t o use t hat service for rem ot e m anagem ent .
Server Access
Select t he int erface( s) t hrough which a com put er m ay access t he NWA using Telnet and
t o which t he I P and MAC filt ering rules you specified below are applied. Ot herwise, select
D isa ble t o allow any com put er t o access t he NWA t hrough any int erface using Telnet .
Secured Client I P
Address
A secured client is a “ t rust ed” com put er t hat is allowed t o com m unicat e wit h t he NWA
using t his service.
Select All t o allow any com put er t o access t he NWA using t his service.
Choose Se le ct e d t o j ust allow t he com put er wit h t he I P address t hat you specify t o
access t he NWA using t his service.
Secured Client
MAC Address
Select All t o allow any com put er t o access t he NWA using t his service.
Apply
Click Apply t o save your cust om ized set t ings.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
NWA1120 Series User’s Guide
Choose Se le ct e d t o j ust allow t he com put er wit h t he MAC address t hat you specify t o
access t he NWA using t his service.
103
Chapter 9 System
9.7 SNMP Screen
Use t his screen t o have a m anager st at ion adm inist rat e your NWA over t he net work and configure
SNMP account s on t he SNMP v3 m anager. An SNMP adm inist rat or/ user is an SNMP m anager. To
change your NWA’s SNMP set t ings, click Syst e m > SN M P. The following screen displays.
Figure 52 Syst em > SNMP
104
NWA1120 Series User’s Guide
Chapter 9 System
The following t able describes t he labels in t his screen.
Table 31 Syst em > SNMP
LABEL
DESCRIPTION
SNMP
Port
You can change t he server port num ber for a service if needed, however you m ust use
t he sam e port num ber in order t o use t hat service for rem ot e m anagem ent .
Server Access
Select t he int erface( s) t hrough which a com put er m ay access t he NWA using SNMP and
t o which t he I P and MAC filt ering rules you specified below are applied. Ot herwise,
select D isa ble t o allow any com put er t o access t he NWA t hrough any int erface using
SNMP.
Secured Client I P
Address
A secured client is a “ t rust ed” com put er t hat is allowed t o com m unicat e wit h t he NWA
using t his service.
Select All t o allow any com put er t o access t he NWA using t his service.
Choose Se le ct e d t o j ust allow t he com put er wit h t he I P address t hat you specify t o
access t he NWA using t his service.
Secured Client MAC
Address
Select All t o allow any com put er t o access t he NWA using t his service.
Choose Se le ct e d t o j ust allow t he com put er wit h t he MAC address t hat you specify t o
access t he NWA using t his service.
SNMP Configurat ion
Prot ocol Version
Select t he SNMP version for t he NWA, which you allow t he SNMP m anager t o use t o
access t he NWA.
The SNMP version on t he NWA m ust m at ch t he version on t he SNMP m anager.
Get Com m unit y
Ent er t he Ge t Com m u n it y, which is t he password for t he incom ing Get and Get Next
request s from t he m anagem ent st at ion.
Set Com m unit y
Ent er t he Se t com m u n it y, which is t he password for incom ing Set request s from t he
m anagem ent st at ion.
Trap Com m unit y
Type t he t rap com m unit y, which is t he password sent wit h each t rap t o t he SNMP
m anager.
Trap Dest inat ion
Type t he I P address of t he st at ion t o send your SNMP t raps t o.
SNMPv3 Adm in
Set t ings
SNMPv3 Adm in
Select t he check box t o enable t he SNMP adm inist rat or account for aut hent icat ion wit h
SNMP m anagers using SNMP v3.
User Nam e
Specify t he user nam e of t he SNMP adm inist rat or account .
Password
Ent er t he password for SNMP adm inist rat or aut hent icat ion.
Confirm Password
Ret ype t he password for confirm at ion.
Access Type
Specify t he SNMP adm inist rat or ’s access right s t o MI Bs.
Re a d/ W r it e - The SNMP adm inist rat or has read and writ e right s, m eaning t hat t he
user can creat e and edit t he MI Bs on t he NWA.
Re a d Only - The SNMP adm inist rat or has read right s only, m eaning t he user can collect
inform at ion from t he NWA.
Aut hent icat ion
Prot ocol
Select an aut hent icat ion algorit hm used for SNMP com m unicat ion wit h t he SNMP
adm inist rat or.
M D 5 ( Message Digest 5) and SH A ( Secure Hash Algorit hm ) are hash algorit hm s used
t o aut hent icat e SNMP dat a. SH A aut hent icat ion is generally considered st ronger t han
M D 5 , but is slower.
NWA1120 Series User’s Guide
105
Chapter 9 System
Table 31 Syst em > SNMP ( cont inued)
LABEL
DESCRIPTION
Privacy Prot ocol
Specify t he encrypt ion m et hod used for SNMP com m unicat ion wit h t he SNMP
adm inist rat or.
D ES - Dat a Encrypt ion St andard is a widely used ( but breakable) m et hod of dat a
encrypt ion. I t applies a 56- bit key t o each 64- bit block of dat a.
AES - Advanced Encrypt ion St andard is anot her m et hod for dat a encrypt ion t hat also
uses a secret key. AES applies a 128- bit key t o 128- bit blocks of dat a.
SNMPv3 User
Set t ings
SNMPv3 User
Select t he check box t o enable t he SNMP user account for aut hent icat ion wit h SNMP
m anagers using SNMP v3.
User Nam e
Specify t he user nam e of t he SNMP user account .
Password
Ent er t he password for SNMP user aut hent icat ion.
Confirm Password
Ret ype t he password for confirm at ion.
Access Type
Specify t he SNMP user ’s access right s t o MI Bs.
Re a d On ly - The SNMP user has read right s only, m eaning t he user can collect
inform at ion from t he NWA.
Re a d/ W r it e - The SNMP user has read and writ e right s, m eaning t hat t he user can
creat e and edit t he MI Bs on t he NWA.
Aut hent icat ion
Prot ocol
Privacy Prot ocol
Select an aut hent icat ion algorit hm used for SNMP com m unicat ion wit h t he SNMP user.
M D 5 ( Message Digest 5) and SH A ( Secure Hash Algorit hm ) are hash algorit hm s used
t o aut hent icat e SNMP dat a. SH A aut hent icat ion is generally considered st ronger t han
M D 5 , but is slower.
Specify t he encrypt ion m et hod used for SNMP com m unicat ion wit h t he SNMP user.
D ES - Dat a Encrypt ion St andard is a widely used ( but breakable) m et hod of dat a
encrypt ion. I t applies a 56- bit key t o each 64- bit block of dat a.
AES - Advanced Encrypt ion St andard is anot her m et hod for dat a encrypt ion t hat also
uses a secret key. AES applies a 128- bit key t o 128- bit blocks of dat a.
Apply
Click Apply t o save your cust om ized set t ings.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
9.8 FTP Screen
Use t his screen t o upload and download t he NWA’s firm ware using FTP. To use t his feat ure, your
com put er m ust have an FTP client .
106
NWA1120 Series User’s Guide
Chapter 9 System
To change your NWA’s FTP set t ings, click Syst e m > FTP. The following screen displays.
Figure 53 Syst em > FTP
The following t able describes t he labels in t his screen.
Table 32 Syst em > FTP
LABEL
DESCRIPTION
FTP
Port
You m ay change t he server port num ber for a service if needed, however you m ust use
t he sam e port num ber in order t o use t hat service for rem ot e m anagem ent .
Server Access
Select t he int erface( s) t hrough which a com put er m ay access t he NWA using t his service
and t o which t he I P and MAC filt ering rules you specified below are applied. Ot herwise,
select D isa ble t o allow any com put er t o access t he NWA t hrough any int erface using t his
service.
Secured Client I P
Address
A secured client is a “ t rust ed” com put er t hat is allowed t o com m unicat e wit h t he NWA
using t his service.
Select All t o allow any com put er t o access t he NWA using t his service.
Choose Se le ct e d t o j ust allow t he com put er wit h t he I P address t hat you specify t o access
t he NWA using t his service.
Secured Client
MAC Address
Select All t o allow any com put er t o access t he NWA using t his service.
Choose Se le ct e d t o j ust allow t he com put er wit h t he MAC address t hat you specify t o
access t he NWAe using t his service.
Apply
Click Apply t o save your cust om ized set t ings.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
9.9 Technical Reference
This sect ion provides som e t echnical background inform at ion about t he t opics covered in t his
chapt er.
9.9.1 MIB
Managed devices in an SMNP m anaged net work cont ain obj ect variables or m anaged obj ect s t hat
define each piece of inform at ion t o be collect ed about a device. Exam ples of variables include such
NWA1120 Series User’s Guide
107
Chapter 9 System
as num ber of packet s received, node port st at us et c. A Managem ent I nform at ion Base ( MI B) is a
collect ion of m anaged obj ect s.SNMP it self is a sim ple request / response prot ocol based on t he
m anager/ agent m odel. The m anager issues a request and t he agent ret urns responses using t he
following prot ocol operat ions:
• Get - Allows t he m anager t o ret rieve an obj ect variable from t he agent .
• Get Next - Allows t he m anager t o ret rieve t he next obj ect variable from a t able or list wit hin an
agent . I n SNMPv1, when a m anager want s t o ret rieve all elem ent s of a t able from an agent , it
init iat es a Get operat ion, followed by a series of Get Next operat ions.
• Set - Allows t he m anager t o set values for obj ect variables wit hin an agent .
• Trap - Used by t he agent t o inform t he m anager of som e event s.
9.9.2 Supported MIBs
The NWA support s MI B I I t hat is defined in RFC- 1213 and RFC- 1215 as well as t he propriet ary
ZyXEL privat e MI B. The purpose of t he MI Bs is t o let adm inist rat ors collect st at ist ical dat a and
m onit or st at us and perform ance.
9.9.3 Private-Public Certificates
When using public- key crypt ology for aut hent icat ion, each host has t wo keys. One key is public and
can be m ade openly available. The ot her key is privat e and m ust be kept secure.
These keys work like a handwrit t en signat ure ( in fact, cert ificat es are oft en referred t o as “ digit al
signat ures” ) . Only you can writ e your signat ure exact ly as it should look. When people know what
your signat ure looks like, t hey can verify whet her som et hing was signed by you, or by som eone
else. I n t he sam e way, your privat e key “ writ es” your digit al signat ure and your public key allows
people t o verify whet her dat a was signed by you, or by som eone else. This process works as
follows.
Tim want s t o send a m essage t o Jenny. He needs her t o be sure t hat it com es from him , and t hat
t he m essage cont ent has not been alt ered by anyone else along t he way. Tim generat es a public
key pair ( one public key and one privat e key) .
Tim keeps t he privat e key and m akes t he public key openly available. This m eans t hat anyone who
receives a m essage seem ing t o com e from Tim can read it and verify whet her it is really from him
or not .
Tim uses his privat e key t o sign t he m essage and sends it t o Jenny.
Jenny receives t he m essage and uses Tim ’s public key t o verify it . Jenny knows t hat t he m essage is
from Tim , and t hat alt hough ot her people m ay have been able t o read t he m essage, no- one can
have alt ered it ( because t hey cannot re- sign t he m essage wit h Tim ’s privat e key) .
Addit ionally, Jenny uses her own privat e key t o sign a m essage and Tim uses Jenny’s public key t o
verify t he m essage.
9.9.4 Certification Authorities
A Cert ificat ion Aut horit y ( CA) issues cert ificat es and guarant ees t he ident it y of each cert ificat e
owner. There are com m ercial cert ificat ion aut horit ies like CyberTrust or VeriSign and governm ent
108
NWA1120 Series User’s Guide
Chapter 9 System
cert ificat ion aut horit ies. You can use t he NWA t o generat e cert ificat ion request s t hat cont ain
ident ifying inform at ion and public keys and t hen send t he cert ificat ion request s t o a cert ificat ion
aut horit y.
9.9.5 Checking the Fingerprint of a Certificate on Your Computer
A cert ificat e’s fingerprint s are m essage digest s calculat ed using t he MD5 or SHA1 algorit hm s. The
following procedure describes how t o check a cert ificat e’s fingerprint t o verify t hat you have t he
act ual cert ificat e.
Browse t o where you have t he cert ificat e saved on your com put er.
Make sure t hat t he cert ificat e has a “ .cer ” or “ .crt ” file nam e ext ension.
Figure 54 Cert ificat es on Your Com put er
Double- click t he cert ificat e’s icon t o open t he Ce r t ifica t e window. Click t he D e t a ils t ab and scroll
down t o t he Thum bpr int Algor it hm and Th um bpr int fields.
Figure 55 Cert ificat e Det ails
Use a secure m et hod t o verify t hat t he cert ificat e owner has t he sam e inform at ion in t he
Th um bpr in t Algor it h m and Th u m bpr in t fields. The secure m et hod m ay vary according t o your
sit uat ion. Possible exam ples would be over t he t elephone or t hrough an HTTPS connect ion.
NWA1120 Series User’s Guide
109
Chapter 9 System
110
NWA1120 Series User’s Guide
C HAPTER
10
Log Settings
10.1 Overview
This chapt er provides inform at ion on viewing and generat ing logs on your NWA.
Logs are files t hat cont ain recorded net work act ivit y over a set period. They are used by
adm inist rat ors t o m onit or t he healt h of t he syst em ( s) t hey are m anaging. Logs enable
adm inist rat ors t o effect ively m onit or event s, errors, progress, et c. so t hat when net work problem s
or syst em failures occur, t he cause or origin can be t raced. Logs are also essent ial for audit ing and
keeping t rack of changes m ade by users.
Figure 56
Accessing Logs in t he Net work
The figure above illust rat es t hree ways t o access logs. The user ( U) can access logs direct ly from
t he NWA ( A) via t he Web configurat or. Logs can also be locat ed in an ext ernal log server ( B) . An
em ail server ( C) can also send harvest ed logs t o t he user ’s em ail account .
10.2 What You Can Do in this Chapter
Use t he Log Se t t in gs screen t o configure where and when t he NWA will send t he logs, and which
logs it will send ( Sect ion 10.4 on page 112) . Use t he M on it or > Logs screen t o display all logs or
logs for a cert ain cat egory.
NWA1120 Series User’s Guide
111
Chapter 10 Log Settings
10.3 What You Need To Know
Alerts and Logs
An alert is a t ype of log t hat warrant s m ore serious at t ent ion. Som e cat egories such as Syst e m
Er r or consist of bot h logs and alert s. You can different iat e t hem by t heir color in t he M onit or >
Logs screen. Alert s are displayed in red and logs are displayed in black.
Receiving Logs via E-mail
I f you want t o receive logs in your e- m ail account , you need t o have t he necessary det ails ready,
such as t he Server Nam e or Sim ple Mail Transfer Prot ocol ( SMTP) Address of your e- m ail account .
Ensure t hat you have a valid e- m ail address.
Enabling Syslog Logging
To enable Syslog Logging, obt ain your Syslog server ’s I P address ( or server nam e) .
10.4 Log Settings Screen
Use t his screen t o configure t o where and when t he NWA is t o send t he logs and which logs and/ or
im m ediat e alert s it is t o send.
112
NWA1120 Series User’s Guide
Chapter 10 Log Settings
To change your NWA’s log set t ings, click Con figu r a t ion > Log Se t t ings. The screen appears as
shown.
Figure 57 Log Set t ings
The following t able describes t he labels in t his screen.
Table 33 Log Set t ings
LABEL
DESCRIPTION
E- m ail Log Set t ings
Mail Server
Ent er t he server nam e or t he I P address of t he m ail server for t he e- m ail addresses
specified below. I f t his field is left blank, logs and alert m essages will not be sent via
e- m ail.
Mail Subj ect
Type a t it le t hat you want t o be in t he subj ect line of t he log e- m ail m essage t hat t he
NWA sends.
Send Log t o
Logs are sent t o t he e- m ail address specified in t his field. I f t his field is left blank, logs
will not be sent via e- m ail.
NWA1120 Series User’s Guide
113
Chapter 10 Log Settings
Table 33 Log Set t ings ( cont inued)
LABEL
DESCRIPTION
SMTP Aut hent icat ion
SMTP ( Sim ple Mail Transfer Prot ocol) is t he m essage- exchange st andard for t he
I nt ernet . Select t he check box t o act ivat e SMTP aut hent icat ion. I f m ail server
aut hent icat ion is needed but t his feat ure is disabled, you will not receive t he e- m ail
logs.
I f you use SMTP aut hent icat ion, t he m ail receiver should be t he owner of t he SMTP
account .
User Nam e
I f your e- m ail account requires SMTP aut hent icat ion, ent er t he usernam e here.
Password
Ent er t he password associat ed wit h t he above usernam e.
Syslog Logging
Syslog logging sends a log t o an ext ernal syslog server used t o st ore logs.
Syslog Logging
Select t he check box t o enable syslog logging.
Syslog Server I P
Address
Ent er t he I P address of t he syslog server t hat will log t he select ed cat egories of logs.
Syslog Port
Num ber
Ent er t he port num ber of t he syslog server t hat will log t he select ed cat egories of
logs.
Send Log
Log Schedule
This drop- down m enu is used t o configure t he frequency of log m essages being sent
as E- m ail:
•
•
•
•
•
When Log is Full
Hourly
Daily
Weekly
None.
I f t he W e e k ly or t he D a ily opt ion is select ed, specify a t im e of day when t he E- m ail
should be sent . I f t he W e e k ly opt ion is select ed, t hen also specify which day of t he
week t he E- m ail should be sent . I f t he W h e n Log is Fu ll opt ion is select ed, an alert
is sent when t he log fills up. I f you select N one , no log m essages are sent .
Day for Sending
Log
This field is only available when you select W e e k ly in t he Log Sch e du le field.
Tim e for Sending
Log
Ent er t he t im e of t he day in 24- hour form at ( for exam ple 23: 00 equals 11: 00 pm ) t o
send t he logs.
Clear log aft er
sending m ail
Select t he check box t o clear all logs aft er logs and alert m essages are sent via em ail.
Use t he drop down list box t o select which day of t he week t o send t he logs.
Log Cat egory
114
Syst em
Maint enance
Click t his t o receive logs relat ed t o syst em m aint enance.
Syst em Error
Click t his t o receive logs relat ed t o syst em errors.
802.1x
Click t his t o receive logs relat ed t o t he 802.1x m ode.
Wireless
Click t his t o receive logs relat ed t o t he wireless funct ion.
Em ail Log Now
Select t he cat egories of alert s for which you want t he NWA t o im m ediat ely send em ail alert s.
Apply
Click Apply t o save your cust om ized set t ings.
Cancel
Click Ca n ce l t o begin configuring t his screen afresh.
NWA1120 Series User’s Guide
C HAPTER
11
Maintenance
11.1 Overview
This chapt er describes t he m aint enance screens. I t discusses how you can upload new firm ware,
m anage configurat ion and rest art your NWA wit hout t urning it off and on.
This chapt er provides inform at ion and inst ruct ions on how t o ident ify and m anage your NWA over
t he net work.
Figure 58 NWA Set up
I n t he figure above, t he NWA connect s t o a Dom ain Nam e Server ( DNS) server t o avail of a dom ain
nam e. I t also connect s t o an Net work Tim e Prot ocol ( NTP) server t o set t he t im e on t he device.
11.2 What You Can Do in this Chapter
• Use t he Ge ne r a l screen t o specify t he syst em nam e ( see Sect ion 11.4 on page 116) .
• Use t he Pa ssw or d screen t o m anage t he password for your NWA ( see Sect ion 11.5 on page
117) .
• Use t he Tim e screen t o change your NWA’s t im e and dat e. This screen allows you t o configure
t he NWA’s t im e based on your local t im e zone ( see Sect ion 11.6 on page 118) .
• Use t he Fir m w a r e Upgr a de screen t o upload t he lat est firm ware for your NWA ( see Sect ion
11.7 on page 119) .
• Use t he Configur a t ion File screen t o view inform at ion relat ed t o fact ory default s, backup
configurat ion, and rest oring configurat ion ( see Sect ion 11.8 on page 120) .
• Use Re st a r t screen t o reboot t he NWA wit hout t urning t he power off ( see Sect ion 11.9 on page
121) .
NWA1120 Series User’s Guide
115
Chapter 11 Maintenance
11.3 What You Need To Know
You can find t he firm ware for your device at www.zyxel.com . I t is a file t hat uses t he syst em proj ect
code wit h a " * .bin" ext ension, for exam ple " V100AAEO0.bin" . The upload process uses HTTP
( Hypert ext Transfer Prot ocol) and m ay t ake up t o t wo m inut es. Aft er a successful upload, t he
syst em will reboot .
11.4 General Screen
Use t he Ge n e r a l screen t o ident ify your NWA over t he net work. Click M a int e na nce > Ge n e r a l.
The following screen displays.
Figure 59 Maint enance > General
The following t able describes t he labels in t his screen.
Table 34 Maint enance > General
LABEL
DESCRIPTION
Syst em Set t ings
Syst em Nam e
Type a descript ive nam e t o ident ify t he NWA in t he Et hernet net work.
This nam e can be up t o 15 alphanum eric charact ers long. Spaces are not allowed, but
dashes " - " are accept ed.
116
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o reload t he previous configurat ion for t his screen.
NWA1120 Series User’s Guide
Chapter 11 Maintenance
11.5 Password Screen
Use t his screen t o cont rol access t o your NWA by assigning a password t o it . Click M a int e n a n ce >
Pa ssw or d. The following screen displays.
Figure 60 Maint enance > Password
The following t able describes t he labels in t his screen.
Table 35 Maint enance > Password
LABEL
DESCRIPTIONS
Current Password
Type in your exist ing syst em password.
New Password
Type your new syst em password. Not e t hat as you t ype a password, t he screen
displays a dot ( .) for each charact er you t ype.
Ret ype t o Confirm
Ret ype your new syst em password for confirm at ion.
Apply
Click Apply t o save your changes.
Cancel
Click Ca nce l t o reload t he previous configurat ion for t his screen.
NWA1120 Series User’s Guide
117
Chapter 11 Maintenance
11.6 Time Screen
Use t his screen t o change your NWA’s t im e and dat e, click M a in t e na nce > Tim e . The following
screen displays.
Figure 61 Maint enance > Tim e
The following t able describes t he labels in t his screen.
Table 36 Maint enance > Tim e
LABEL
DESCRIPTION
Current Tim e and Dat e
Current Tim e
This field displays t he t im e of your NWA.
Each t im e you reload t his page, t he NWA synchronizes t he t im e wit h t he t im e server
( if configured) .
When you disable N TP Clie n t Upda t e , you can m anually ent er t he new t im e in t his
field and t hen click Apply.
Current Dat e
This field displays t he last updat ed dat e from t he t im e server.
When you disable N TP Clie n t Upda t e , you can m anually ent er t he new dat e in t his
field and t hen click Apply.
Tim e and Dat e Set up
NTP Client Updat e
Select t his t o have t he NWA get t he t im e and dat e from t he t im e server you
specified below.
NTP server
Select t his opt ion t o use t he predefined list of Net work Tim e Prot ocol ( NTP) servers.
Select an NTP server from t he drop- list box.
Manual I P
Select t his opt ion t o ent er t he I P address or URL of your t im e server. Check wit h
your I SP/ net work adm inist rat or if you are unsure of t his inform at ion.
Tim e Zone Set up
118
Tim e Zone
Choose t he t im e zone of your locat ion. This will set t he t im e difference bet ween
your t im e zone and Greenwich Mean Tim e ( GMT) .
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o reload t he previous configurat ion for t his screen.
NWA1120 Series User’s Guide
Chapter 11 Maintenance
11.7 Firmware Upgrade Screen
Use t his screen t o upload a firm ware t o your NWA. Click M a int e na nce > Fir m w a r e Upgr a de .
Follow t he inst ruct ions in t his sect ion t o upload firm ware t o your NWA.
Figure 62 Maint enance > Firm ware Upgrade
The following t able describes t he labels in t his screen.
Table 37 Maint enance > Firm ware Upgrade
LABEL
DESCRIPTION
File Pat h
Type in t he locat ion of t he file you want t o upload in t his field or click Br ow se ... t o find
it .
Browse...
Click Br ow se ... t o find t he .bin file you want t o upload. Rem em ber t hat you m ust
decom press com pressed ( .zip) files before you can upload t hem .
Upload
Click Uploa d t o begin t he upload process. This process m ay t ake up t o t wo m inut es.
Do not turn off the NWA while firmware upload is in progress!
Figure 63 Firm ware Upload I n Process
The NWA aut om at ically rest art s in t his t im e causing a t em porary net work disconnect . I n som e
operat ing syst em s, you m ay see t he following icon on your deskt op.
Figure 64 Net work Tem porarily Disconnect ed
Aft er t he upload was finished, log in again and check your new firm ware version in t he D a sh boa r d
screen.
NWA1120 Series User’s Guide
119
Chapter 11 Maintenance
11.8 Configuration File Screen
Use t his screen t o backup, rest ore and reset t he configurat ion of your NWA.
Click M a int e na nce > Con figu r a t ion File . The screen appears as shown next .
Figure 65 Maint enance > Configurat ion File
11.8.1 Backup Configuration
Backup configurat ion allows you t o back up ( save) t he NWA’s current configurat ion t o a file on your
com put er. Once your NWA is configured and funct ioning properly, it is highly recom m ended t hat
you back up your configurat ion file before m aking configurat ion changes. The backup configurat ion
file will be useful in case you need t o ret urn t o your previous set t ings.
Click Ba ck up t o save t he NWA’s current configurat ion t o your com put er.
11.8.2 Restore Configuration
Rest ore configurat ion allows you t o upload a new or previously saved configurat ion file from your
com put er t o your NWA.
Table 38 Rest ore Configurat ion
LABEL
DESCRIPTION
File Pat h
Type in t he locat ion of t he file you want t o upload in t his field or click Br ow se ... t o find
it .
Browse...
Click Br ow se ... t o find t he file you want t o upload. Rem em ber t hat you m ust
decom press com pressed ( .ZI P) files before you can upload t hem .
Upload
Click Uploa d t o begin t he upload process.
Do not turn off the NWA while configuration file upload is in progress.
You m ust t hen wait one m inut e before logging int o t he NWA again.
120
NWA1120 Series User’s Guide
Chapter 11 Maintenance
The NWA aut om at ically rest art s in t his t im e causing a t em porary net work disconnect . I n som e
operat ing syst em s, you m ay see t he following icon on your deskt op.
Figure 66 Net work Tem porarily Disconnect ed
I f you uploaded t he default configurat ion file you m ay need t o change t he I P address of your
com put er t o be in t he sam e subnet as t hat of t he default NWA I P address ( 192.168.1.2) . See
Appendix A on page 129 for det ails on how t o set up your com put er ’s I P address.
11.8.3 Back to Factory Defaults
Pressing t he Re se t but t on in t his sect ion clears all user- ent ered configurat ion inform at ion and
ret urns t he NWA t o it s fact ory default s as shown on t he screen. The following screen will appear.
Figure 67 Reset Message
You can also press t he RESET but t on t o reset your NWA t o it s fact ory default set t ings. Refer t o
Sect ion 2.2 on page 20 for m ore inform at ion.
11.9 Restart Screen
Use t his screen t o reboot t he NWA wit hout t urning t he power off.
Click M a int e na nce > Re st a r t . The following screen displays.
Figure 68 Maint enance > Rest art
Click Re st a r t t o have t he NWA reboot . This does not affect t he NWA's configurat ion.
NWA1120 Series User’s Guide
121
Chapter 11 Maintenance
122
NWA1120 Series User’s Guide
C HAPTER
12
Troubleshooting
This chapt er offers som e suggest ions t o solve problem s you m ight encount er. The pot ent ial
problem s are divided int o t he following cat egories.
• Power, Hardware Connect ions, and LEDs
• NWA Access and Login
• I nt ernet Access
• Wireless LAN
12.1 Power, Hardware Connections, and LEDs
The NWA does not t urn on. None of t he LEDs t urn on.
Make sure you are using t he power adapt or or cord included wit h t he NWA.
Make sure t he power adapt or or cord is connect ed t o t he NWA and plugged in t o an appropriat e
power source. Make sure t he power source is t urned on.
Disconnect and re- connect t he power adapt or or cord t o t he NWA.
I f t he problem cont inues, cont act t he vendor.
One of t he LEDs does not behave as expect ed.
Make sure you underst and t he norm al behavior of t he LED. See Sect ion 1.7 on page 18.
Check t he hardware connect ions. See t he Quick St art Guide.
I nspect your cables for dam age. Cont act t he vendor t o replace any dam aged cables.
Disconnect and re- connect t he power adapt or t o t he NWA.
I f t he problem cont inues, cont act t he vendor.
NWA1120 Series User’s Guide
123
Chapter 12 Troubleshooting
12.2 NWA Access and Login
I forgot t he I P address for t he NWA.
The default I P address is 1 9 2 .1 6 8 .1 .2 .
I f t he NWA is working as a DHCP client and receives an I P address from a DHCP server, check t he
DHCP server for t he NWA’s I P address.
I f you configured a st at ic I P address and have forgot t en it , you have t o reset t he device t o it s
fact ory default s. See Sect ion 2.2 on page 20.
I forgot t he passwor d.
The default password is 1 2 3 4 .
I f t his does not work, you have t o reset t he device t o it s fact ory default s. See Sect ion 2.2 on page
20.
I cannot see or access t he Login screen in t he web configurat or.
Make sure you are using t he correct I P address.
• The default I P address is 192.168.1.2.
• I f you changed t he I P address ( Sect ion 7.4 on page 93) , use t he new I P address.
• I f you changed t he I P address and have forgot t en it , see t he t roubleshoot ing suggest ions for I
forgot t he I P address for t he NWA.
Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See t he Quick
St art Guide and Sect ion 1.7 on page 18.
Make sure your I nt ernet browser does not block pop- up windows and has JavaScript and Java
enabled. See Sect ion 12.1 on page 123.
Make sure your com put er is in t he sam e subnet as t he NWA. ( I f you know t hat t here are rout ers
bet ween your com put er and t he NWA, skip t his st ep.)
• I f t here is no DHCP server on your net work, m ake sure your com put er ’s I P address is in t he
sam e subnet as t he NWA.
124
Reset t he device t o it s fact ory default s, and t ry t o access t he NWA wit h t he default I P address. See
Chapt er 2 on page 20.
I f t he problem cont inues, cont act t he net work adm inist rat or or vendor, or t ry one of t he advanced
suggest ions.
NWA1120 Series User’s Guide
Chapter 12 Troubleshooting
Adva n ce d Sugge st ions
• Try t o access t he NWA using anot her service, such as Telnet . I f you can access t he NWA, check
t he rem ot e m anagem ent set t ings t o find out why t he NWA does not respond t o HTTP.
• I f your com put er is connect ed wirelessly, use a com put er t hat is connect ed t o a LAN/ Et hernet
port .
I can see t he Login screen, but I cannot log in t o t he NWA.
Make sure you have ent ered t he user nam e and password correct ly. The default user nam e is
a dm in and default password is 1 2 3 4 . This fields are case- sensit ive, so m ake sure [ Caps Lock] is
not on.
Disconnect and re- connect t he power adapt or or cord t o t he NWA.
I f t his does not work, you have t o reset t he device t o it s fact ory default s. See Sect ion 2.2 on page
20.
I cannot use FTP t o upload new firm ware.
See t he t roubleshoot ing suggest ions for I cannot see or access t he Login screen in t he web
configurat or. I gnore t he suggest ions about your browser.
12.3 Internet Access
I cannot access t he I nt er net t hrough t he NWA.
Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See t he Quick
St art Guide and Sect ion 12.1 on page 123.
Make sure your NWA is connect ed t o a net working device t hat provides I nt ernet access.
Make sure your com put er is set t o obt ain a dynam ic I P address or has an I P address which is in t he
sam e subnet as t he broadband m odem or rout er.
I f you are t rying t o access t he I nt ernet wirelessly, m ake sure t he wireless set t ings on t he wireless
client are t he sam e as t he set t ings on t he AP.
Disconnect all t he cables from your device, and follow t he direct ions in t he Quick St art Guide again.
I f t he problem cont inues, cont act your I SP.
NWA1120 Series User’s Guide
125
Chapter 12 Troubleshooting
I cannot access t he I nt er net anym ore. I had access t o t he I nt ernet ( wit h t he NWA) , but m y
I nt ernet connect ion is not available anym ore.
Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See t he Quick
St art Guide and Sect ion 1.7 on page 18.
Reboot t he NWA.
I f t he problem cont inues, cont act your I SP or net work adm inist rat or.
The I nt ernet connect ion is slow or int erm it t ent .
There m ight be a lot of t raffic on t he net work. Look at t he LEDs, and check Sect ion 1.7 on page 18.
I f t he NWA is sending or receiving a lot of inform at ion, t ry closing som e program s t hat use t he
I nt ernet , especially peer- t o- peer applicat ions.
Check t he signal st rengt h. I f t he signal is weak, t ry m oving t he NWA ( in wireless client m ode) closer
t o t he AP ( if possible) , and look around t o see if t here are any devices t hat m ight be int erfering wit h
t he wireless net work ( m icrowaves, ot her wireless net works, and so on) .
Reboot t he NWA.
I f t he problem cont inues, cont act t he net work adm inist rat or or vendor, or t ry one of t he advanced
suggest ions.
Adva n ce d Sugge st ions
• Check t he set t ings for QoS. I f it is disabled, you m ight consider act ivat ing it .
12.4 Wireless LAN
I cannot access t he NWA or ping any com put er from t he WLAN.
126
Make sure t he wireless LAN is enabled on t he NWA.
Make sure t he wireless adapt er on t he wireless st at ion is working properly.
Make sure t he wireless adapt er inst alled on your com put er is I EEE 802.11 com pat ible and support s
t he sam e wireless st andard as t he NWA.
Make sure your com put er ( wit h a wireless adapt er inst alled) is wit hin t he t ransm ission range of t he
NWA.
NWA1120 Series User’s Guide
Chapter 12 Troubleshooting
Check t hat bot h t he NWA and your wireless client are using t he sam e wireless and wireless securit y
set t ings.
NWA1120 Series User’s Guide
127
Chapter 12 Troubleshooting
128
NWA1120 Series User’s Guide
A PPENDIX
Setting Up Your Computer’s IP Address
Not e: Your specific NWA m ay not support all of t he operat ing syst em s described in t his
appendix. See t he product specificat ions for m ore inform at ion about which
operat ing syst em s are support ed.
This appendix shows you how t o configure t he I P set t ings on your com put er in order for it t o be
able t o com m unicat e wit h t he ot her devices on your net work. Windows Vist a/ XP/ 2000, Mac OS 9/
OS X, and all versions of UNI X/ LI NUX include t he soft ware com ponent s you need t o use TCP/ I P on
your com put er.
I f you m anually assign I P inform at ion inst ead of using a dynam ic I P, m ake sure t hat your net work’s
com put ers have I P addresses t hat place t hem in t he sam e subnet .
I n t his appendix, you can set up an I P address for:
• Windows XP/ NT/ 2000 on page 129
• Windows Vist a on page 133
• Windows 7 on page 137
• Mac OS X: 10.3 and 10.4 on page 141
• Mac OS X: 10.5 and 10.6 on page 144
• Linux: Ubunt u 8 ( GNOME) on page 147
• Linux: openSUSE 10.3 ( KDE) on page 151
Windows XP/NT/2000
The following exam ple uses t he default Windows XP display t hem e but can also apply t o Windows
2000 and Windows NT.
NWA1120 Series User’s Guide
129
Appendix A Setting Up Your Computer’s IP Address
130
Click St a r t > Con t r ol Pa n e l.
I n t he Cont r ol Pa n e l, click t he N e t w or k Con ne ct ion s icon.
Right- click Loca l Ar e a Conne ct ion and t hen select Pr ope r t ie s.
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
On t he Ge n e r a l t ab, select I n t e r n e t Pr ot ocol ( TCP/ I P) and t hen click Pr ope r t ie s.
NWA1120 Series User’s Guide
131
Appendix A Setting Up Your Computer’s IP Address
The I nt e r ne t Pr ot ocol TCP/ I P Pr ope r t ie s window opens.
Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your net work adm inist rat or or I SP assigns your I P
address dynam ically.
Select Use t h e follow in g I P Addr e ss and fill in t he I P a ddr e ss, Subn e t m a sk , and D e fa ult
ga t e w a y fields if you have a st at ic I P address t hat was assigned t o you by your net work
adm inist rat or or I SP. You m ay also have t o ent er a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S
se r ve r , if t hat inform at ion was provided.
Click OK t o close t he I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window.
Click OK t o close t he Loca l Ar e a Con n e ct ion Pr ope r t ie s window.
Verifying Settings
Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt .
I n t he Com m a nd Pr om pt window, t ype " ipconfig" and t hen press [ ENTER] .
You can also go t o St a r t > Con t r ol Pa n e l > N e t w or k Con n e ct ions, right- click a net work
connect ion, click St a t u s and t hen click t he Suppor t t ab t o view your I P address and connect ion
inform at ion.
132
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Windows Vista
This sect ion shows screens from Windows Vist a Professional.
Click St a r t > Cont r ol Pa n e l.
I n t he Cont r ol Pa n e l, click t he N e t w or k a nd I n t e r n e t icon.
Click t he N e t w or k a n d Sh a r ing Ce n t e r icon.
NWA1120 Series User’s Guide
133
Appendix A Setting Up Your Computer’s IP Address
Click M a n a ge n e t w or k con n e ct ions.
Right- click Loca l Ar e a Conne ct ion and t hen select Pr ope r t ie s.
Not e: During t his procedure, click Con t inu e whenever Windows displays a screen saying
t hat it needs your perm ission t o cont inue.
134
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Select I n t e r n e t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) and t hen select Pr ope r t ie s.
NWA1120 Series User’s Guide
135
Appendix A Setting Up Your Computer’s IP Address
The I nt e r ne t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window opens.
Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your net work adm inist rat or or I SP assigns your I P
address dynam ically.
Select Use t h e follow in g I P Addr e ss and fill in t he I P a ddr e ss, Subn e t m a sk , and D e fa ult
ga t e w a y fields if you have a st at ic I P address t hat was assigned t o you by your net work
adm inist rat or or I SP. You m ay also have t o ent er a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S
se r ve r , if t hat inform at ion was provided.Click Adva nce d.
Click OK t o close t he I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window.
10 Click OK t o close t he Loca l Ar e a Con n e ct ion Pr ope r t ie s window.
Verifying Settings
Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt .
I n t he Com m a nd Pr om pt window, t ype " ipconfig" and t hen press [ ENTER] .
You can also go t o St a r t > Con t r ol Pa n e l > N e t w or k Con n e ct ions, right- click a net work
connect ion, click St a t u s and t hen click t he Suppor t t ab t o view your I P address and connect ion
inform at ion.
136
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Windows 7
This sect ion shows screens from Windows 7 Ent erprise.
Click St a r t > Cont r ol Pa n e l.
I n t he Cont r ol Pa n e l, click Vie w ne t w or k st a t us a nd t a sk s under t he N e t w or k a n d I n t e r n e t
cat egory.
Click Ch a n ge a da pt e r se t t in gs.
NWA1120 Series User’s Guide
137
Appendix A Setting Up Your Computer’s IP Address
Double click Loca l Ar e a Conne ct ion and t hen select Pr ope r t ie s.
Not e: During t his procedure, click Con t inu e whenever Windows displays a screen saying
t hat it needs your perm ission t o cont inue.
138
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Select I n t e r n e t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) and t hen select Pr ope r t ie s.
NWA1120 Series User’s Guide
139
Appendix A Setting Up Your Computer’s IP Address
The I nt e r ne t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window opens.
Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your net work adm inist rat or or I SP assigns your I P
address dynam ically.
Select Use t h e follow in g I P Addr e ss and fill in t he I P a ddr e ss, Subn e t m a sk , and D e fa ult
ga t e w a y fields if you have a st at ic I P address t hat was assigned t o you by your net work
adm inist rat or or I SP. You m ay also have t o ent er a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S
se r ve r , if t hat inform at ion was provided. Click Adva nce d if you want t o configure advanced
set t ings for I P, DNS and WI NS.
Click OK t o close t he I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window.
Click OK t o close t he Loca l Ar e a Con n e ct ion Pr ope r t ie s window.
Verifying Settings
140
Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt .
I n t he Com m a nd Pr om pt window, t ype " ipconfig" and t hen press [ ENTER] .
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
The I P set t ings are displayed as follows.
Mac OS X: 10.3 and 10.4
The screens in t his sect ion are from Mac OS X 10.4 but can also apply t o 10.3.
Click Apple > Syst e m Pr e fe r e nce s.
NWA1120 Series User’s Guide
141
Appendix A Setting Up Your Computer’s IP Address
142
I n t he Syst e m Pr e fe r e nce s window, click t he N e t w or k icon.
When t he N e t w or k preferences pane opens, select Built - in Et he r ne t from t he net work
connect ion t ype list , and t hen click Configu r e .
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
For dynam ically assigned set t ings, select Usin g D H CP from t he Configu r e I Pv4 list in t he TCP/ I P
t ab.
For st at ically assigned set t ings, do t he following:
• From t he Configu r e I Pv4 list , select M a nua lly.
• I n t he I P Addr e ss field, t ype your I P address.
• I n t he Subn e t M a sk field, t ype your subnet m ask.
• I n t he Rou t e r field, t ype t he I P address of your device.
Click Apply N ow and close t he window.
NWA1120 Series User’s Guide
143
Appendix A Setting Up Your Computer’s IP Address
Verifying Settings
Check your TCP/ I P propert ies by clicking Applica t ions > Ut ilit ie s > N e t w or k Ut ilit ie s, and t hen
select ing t he appropriat e N e t w or k I nt e r fa ce from t he I n fo t ab.
Figure 69 Mac OS X 10.4: Net work Ut ilit y
Mac OS X: 10.5 and 10.6
The screens in t his sect ion are from Mac OS X 10.5 but can also apply t o 10.6.
144
Click Apple > Syst e m Pr e fe r e nce s.
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
I n Syst e m Pr e fe r e n ce s, click t he N e t w or k icon.
When t he N e t w or k preferences pane opens, select Et he r ne t from t he list of available connect ion
t ypes.
From t he Configu r e list , select Usin g D H CP for dynam ically assigned set t ings.
For st at ically assigned set t ings, do t he following:
NWA1120 Series User’s Guide
145
Appendix A Setting Up Your Computer’s IP Address
• From t he Configu r e list , select M a nua lly.
• I n t he I P Addr e ss field, ent er your I P address.
• I n t he Subn e t M a sk field, ent er your subnet m ask.
• I n t he Rou t e r field, ent er t he I P address of your NWA.
146
Click Apply and close t he window.
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Verifying Settings
Check your TCP/ I P propert ies by clicking Applica t ions > Ut ilit ie s > N e t w or k Ut ilit ie s, and t hen
select ing t he appropriat e N e t w or k int e r fa ce from t he I nfo t ab.
Figure 70 Mac OS X 10.5: Net work Ut ilit y
Linux: Ubuntu 8 (GNOME)
This sect ion shows you how t o configure your com put er ’s TCP/ I P set t ings in t he GNU Obj ect Model
Environm ent ( GNOME) using t he Ubunt u 8 Linux dist ribut ion. The procedure, screens and file
locat ions m ay vary depending on your specific dist ribut ion, release version, and individual
configurat ion. The following screens use t he default Ubunt u 8 inst allat ion.
Not e: Make sur e you are logged in as t he root adm inist rat or.
Follow t he st eps below t o configure your com put er I P address in GNOME:
Click Syst e m > Adm in ist r a t ion > N e t w or k .
NWA1120 Series User’s Guide
147
Appendix A Setting Up Your Computer’s IP Address
148
When t he N e t w or k Se t t in gs window opens, click Un lock t o open t he Aut he nt ica t e window. ( By
default , t he Unlock but t on is greyed out unt il clicked.) You cannot m ake changes t o your
configurat ion unless you first ent er your adm in password.
I n t he Aut he nt ica t e window, ent er your adm in account nam e and password t hen click t he
Aut he nt ica t e but t on.
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
I n t he N e t w or k Se t t ings window, select t he connect ion t hat you want t o configure, t hen click
Pr ope r t ie s.
The Pr ope r t ie s dialog box opens.
• I n t he Configu r a t ion list , select Au t om a t ic Con figu r a t ion ( D H CP) if you have a dynam ic I P
address.
• I n t he Configur a t ion list , select St a t ic I P a ddr e ss if you have a st at ic I P address. Fill in t he
I P a ddr e ss, Subne t m a sk , and Ga t e w a y a ddr e ss fields.
Click OK t o save t he changes and close t he Pr ope r t ie s dialog box and ret urn t o t he N e t w or k
Se t t in gs screen.
NWA1120 Series User’s Guide
149
Appendix A Setting Up Your Computer’s IP Address
150
I f you know your DNS server I P address( es) , click t he D N S t ab in t he N e t w or k Se t t in gs window
and t hen ent er t he DNS server inform at ion in t he fields provided.
Click t he Close but t on t o apply t he changes.
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Verifying Settings
Check your TCP/ I P propert ies by clicking Syst e m > Adm in ist r a t ion > N e t w or k Tools, and t hen
select ing t he appropriat e N e t w or k de vice from t he D e vice s t ab. The I n t e r fa ce St a t ist ics
colum n shows dat a if your connect ion is working properly.
Figure 71 Ubunt u 8: Net work Tools
Linux: openSUSE 10.3 (KDE)
This sect ion shows you how t o configure your com put er ’s TCP/ I P set t ings in t he K Deskt op
Environm ent ( KDE) using t he openSUSE 10.3 Linux dist ribut ion. The procedure, screens and file
locat ions m ay vary depending on your specific dist ribut ion, release version, and individual
configurat ion. The following screens use t he default openSUSE 10.3 inst allat ion.
Not e: Make sur e you are logged in as t he root adm inist rat or.
Follow t he st eps below t o configure your com put er I P address in t he KDE:
NWA1120 Series User’s Guide
151
Appendix A Setting Up Your Computer’s IP Address
152
Click K M e n u > Com pu t e r > Adm in ist r a t or Se t t in gs ( Ya ST) .
When t he Run a s Root - KD E su dialog opens, ent er t he adm in password and click OK.
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
When t he Ya ST Cont r ol Ce nt e r window opens, select N e t w or k D e vice s and t hen click t he
N e t w or k Ca r d icon.
When t he N e t w or k Se t t in gs window opens, click t he Ove r vie w t ab, select t he appropriat e
connect ion N a m e from t he list , and t hen click t he Configu r e but t on.
NWA1120 Series User’s Guide
153
Appendix A Setting Up Your Computer’s IP Address
When t he N e t w or k Ca r d Se t u p window opens, click t he Addr e ss t ab
Figure 72 openSUSE 10.3: Net work Card Set up
Select D yna m ic Addr e ss ( D H CP) if you have a dynam ic I P address.
Select St a t ica lly a ssign e d I P Addr e ss if you have a st at ic I P address. Fill in t he I P a ddr e ss,
Subne t m a sk , and H ost na m e fields.
154
Click N e x t t o save t he changes and close t he N e t w or k Ca r d Se t up window.
NWA1120 Series User’s Guide
Appendix A Setting Up Your Computer’s IP Address
I f you know your DNS server I P address( es) , click t he H ost na m e / D N S t ab in N e t w or k Se t t in gs
and t hen ent er t he DNS server inform at ion in t he fields provided.
Click Finish t o save your set t ings and close t he window.
Verifying Settings
Click t he KN e t w or k M a na ge r icon on t he Ta sk ba r t o check your TCP/ I P propert ies. From t he
Opt ion s sub- m enu, select Sh ow Con n e ct ion I n for m a t ion .
Figure 73 openSUSE 10.3: KNet work Manager
NWA1120 Series User’s Guide
155
Appendix A Setting Up Your Computer’s IP Address
When t he Conn e ct ion St a t u s - KN e t w or k M a n a ge r window opens, click t he St a t ist ics t a b t o
see if your connect ion is working properly.
Figure 74 openSUSE: Connect ion St at us - KNet work Manager
156
NWA1120 Series User’s Guide
A PPENDIX
Pop-up Windows, JavaScript and Java
Permissions
I n order t o use t he web configurat or you need t o allow:
• Web browser pop- up windows from your device.
• JavaScript ( enabled by default ) .
• Java perm issions ( enabled by default ) .
Not e: The screens used below belong t o I nt ernet Explorer version 6, 7 and 8. Screens for
ot her I nt ernet Explorer versions m ay vary.
Internet Explorer Pop-up Blockers
You m ay have t o disable pop- up blocking t o log int o your device.
Eit her disable pop- up blocking ( enabled by default in Windows XP SP ( Service Pack) 2) or allow
pop- up blocking and creat e an except ion for your device’s I P address.
Disable Pop-up Blockers
I n I nt ernet Explorer, select Tools, Pop- u p Block e r and t hen select Tur n Off Pop- up Block e r.
Figure 75 Pop- up Blocker
You can also check if pop- up blocking is disabled in t he Pop- u p Block e r sect ion in t he Pr iva cy t ab.
I n I nt ernet Explorer, select Tools, I nt e r ne t Opt ions, Pr iva cy.
NWA1120 Series User’s Guide
157
Appendix B Pop-up Windows, JavaScript and Java Permissions
Clear t he Block pop- ups check box in t he Pop- u p Block e r sect ion of t he screen. This disables any
web pop- up blockers you m ay have enabled.
Figure 76 I nt ernet Opt ions: Privacy
Click Apply t o save t his set t ing.
Enable Pop-up Blockers with Exceptions
Alt ernat ively, if you only want t o allow pop- up windows from your device, see t he following st eps.
158
I n I nt ernet Explorer, select Tools, I nt e r ne t Opt ions and t hen t he Pr iva cy t ab.
NWA1120 Series User’s Guide
Appendix B Pop-up Windows, JavaScript and Java Permissions
Select Se t t ings…t o open t he Pop- up Block e r Se t t ings screen.
Figure 77 I nt ernet Opt ions: Privacy
Type t he I P address of your device ( t he web page t hat you do not want t o have blocked) wit h t he
prefix “ ht t p: / / ”. For exam ple, ht t p: / / 192.168.167.1.
NWA1120 Series User’s Guide
159
Appendix B Pop-up Windows, JavaScript and Java Permissions
Click Add t o m ove t he I P address t o t he list of Allow e d sit e s.
Figure 78 Pop- up Blocker Set t ings
Click Close t o ret urn t o t he Pr iva cy screen.
Click Apply t o save t his set t ing.
JavaScript
I f pages of t he web configurat or do not display properly in I nt ernet Explorer, check t hat JavaScript
are allowed.
160
NWA1120 Series User’s Guide
Appendix B Pop-up Windows, JavaScript and Java Permissions
I n I nt ernet Explorer, click Tools, I n t e r ne t Opt ion s and t hen t he Se cur it y t ab.
Figure 79 I nt ernet Opt ions: Securit y
Click t he Cu st om Le ve l... but t on.
Scroll down t o Scr ipt ing.
Under Act ive scr ipt ing m ake sure t hat Ena ble is select ed ( t he default ) .
Under Scr ipt ing of Ja va a pple t s m ake sure t hat Ena ble is select ed ( t he default ) .
NWA1120 Series User’s Guide
161
Appendix B Pop-up Windows, JavaScript and Java Permissions
Click OK t o close t he window.
Figure 80 Securit y Set t ings - Java Script ing
Java Permissions
162
From I nt ernet Explorer, click Tools, I nt e r ne t Opt ions and t hen t he Se cu r it y t ab.
Click t he Cu st om Le ve l... but t on.
Scroll down t o M icr osoft VM .
Under Ja va pe r m issions m ake sure t hat a safet y level is select ed.
NWA1120 Series User’s Guide
Appendix B Pop-up Windows, JavaScript and Java Permissions
Click OK t o close t he window.
Figure 81 Securit y Set t ings - Java
JAVA (Sun)
From I nt ernet Explorer, click Tools, I nt e r ne t Opt ions and t hen t he Adva n ce d t ab.
Make sure t hat Use Ja va 2 for < a pple t > under Ja va ( Sun) is select ed.
NWA1120 Series User’s Guide
163
Appendix B Pop-up Windows, JavaScript and Java Permissions
Click OK t o close t he window.
Figure 82 Java ( Sun)
Mozilla Firefox
Mozilla Firefox 2.0 screens are used here. Screens for ot her versions m ay vary slight ly. The st eps
below apply t o Mozilla Firefox 3.0 as well.
You can enable Java, Javascript and pop- ups in one screen. Click Tools, t hen click Opt ions in t he
screen t hat appears.
Figure 83 Mozilla Firefox: TOOLS > Opt ions
164
NWA1120 Series User’s Guide
Appendix B Pop-up Windows, JavaScript and Java Permissions
Click Cont e n t t o show t he screen below. Select t he check boxes as shown in t he following screen.
Figure 84 Mozilla Firefox Cont ent Securit y
Opera
Opera 10 screens are used here. Screens for ot her versions m ay vary slight ly.
NWA1120 Series User’s Guide
165
Appendix B Pop-up Windows, JavaScript and Java Permissions
Allowing Pop-Ups
From Opera, click Tools, t hen Pr e fe r e nce s. I n t he Ge n e r a l t ab, go t o Ch oose h ow you pr e fe r
t o h a n dle pop- ups and select Ope n a ll pop- ups.
Figure 85 Opera: Allowing Pop- Ups
Enabling Java
From Opera, click Tools, t hen Pr e fe r e nce s. I n t he Adva nce d t ab, select Cont e nt from t he leftside m enu. Select t he check boxes as shown in t he following screen.
Figure 86 Opera: Enabling Java
166
NWA1120 Series User’s Guide
Appendix B Pop-up Windows, JavaScript and Java Permissions
To cust om ize JavaScript behavior in t he Opera browser, click Ja va Scr ipt Opt ions.
Figure 87 Opera: JavaScript Opt ions
Select t he it em s you want Opera’s JavaScript t o apply.
NWA1120 Series User’s Guide
167
Appendix B Pop-up Windows, JavaScript and Java Permissions
168
NWA1120 Series User’s Guide
A PPENDIX
IP Addresses and Subnetting
This appendix int roduces I P addresses and subnet m asks.
I P addresses ident ify individual devices on a net work. Every net working device ( including
com put ers, servers, rout ers, print ers, et c.) needs an I P address t o com m unicat e across t he
net work. These net working devices are also known as host s.
Subnet m asks det erm ine t he m axim um num ber of possible host s on a net work. You can also use
subnet m asks t o divide one net work int o m ult iple sub- net works.
Introduction to IP Addresses
One part of t he I P address is t he net work num ber, and t he ot her part is t he host I D. I n t he sam e
way t hat houses on a st reet share a com m on st reet nam e, t he host s on a net work share a com m on
net work num ber. Sim ilarly, as each house has it s own house num ber, each host on t he net work has
it s own unique ident ifying num ber - t he host I D. Rout ers use t he net work num ber t o send packet s
t o t he correct net work, while t he host I D det erm ines t o which host on t he net work t he packet s are
delivered.
Structure
An I P address is m ade up of four part s, writ t en in dot t ed decim al not at ion ( for exam ple,
192.168.1.1) . Each of t hese four part s is known as an oct et . An oct et is an eight- digit binary
num ber ( for exam ple 11000000, which is 192 in decim al not at ion) .
Therefore, each oct et has a possible range of 00000000 t o 11111111 in binary, or 0 t o 255 in
decim al.
NWA1120 Series User’s Guide
169
Appendix C IP Addresses and Subnetting
The following figure shows an exam ple I P address in which t he first t hree oct et s ( 192.168.1) are
t he net work num ber, and t he fourt h oct et ( 16) is t he host I D.
Figure 88 Net work Num ber and Host I D
How m uch of t he I P address is t he net work num ber and how m uch is t he host I D varies according
t o t he subnet m ask.
Subnet Masks
A subnet m ask is used t o det erm ine which bit s are part of t he net work num ber, and which bit s are
part of t he host I D ( using a logical AND operat ion) . The t erm “ subnet ” is short for “ sub- net work”.
A subnet m ask has 32 bit s. I f a bit in t he subnet m ask is a “ 1” t hen t he corresponding bit in t he I P
address is part of t he net work num ber. I f a bit in t he subnet m ask is “ 0” t hen t he corresponding bit
in t he I P address is part of t he host I D.
The following exam ple shows a subnet m ask ident ifying t he net work num ber ( in bold t ext ) and host
I D of an I P address ( 192.168.1.2 in decim al) .
Table 39 Subnet Masks
1ST OCTET: 2ND
OCTET:
(192)
(168)
3RD
OCTET:
4TH OCTET
(1)
(2)
I P Address ( Binary)
11000000
10101000
00000001
00000010
Subnet Mask ( Binary)
11111111
11111111
11111111
00000000
Net work Num ber
11000000
10101000
00000001
Host I D
00000010
By convent ion, subnet m asks always consist of a cont inuous sequence of ones beginning from t he
left m ost bit of t he m ask, followed by a cont inuous sequence of zeros, for a t ot al num ber of 32 bit s.
170
NWA1120 Series User’s Guide
Appendix C IP Addresses and Subnetting
Subnet m asks can be referred t o by t he size of t he net work num ber part ( t he bit s wit h a “ 1” value) .
For exam ple, an “ 8- bit m ask” m eans t hat t he first 8 bit s of t he m ask are ones and t he rem aining 24
bit s are zeroes.
Subnet m asks are expressed in dot t ed decim al not at ion j ust like I P addresses. The following
exam ples show t he binary and decim al not at ion for 8- bit , 16- bit , 24- bit and 29- bit subnet m asks.
Table 40 Subnet Masks
BINARY
DECIMAL
1ST
OCTET
2ND
OCTET
3RD
OCTET
4TH OCTET
8- bit m ask
11111111
00000000
00000000
00000000
255.0.0.0
16- bit m ask
11111111
11111111
00000000
00000000
255.255.0.0
24- bit m ask
11111111
11111111
11111111
00000000
255.255.255.0
29- bit m ask
11111111
11111111
11111111
11111000
255.255.255.248
Network Size
The size of t he net work num ber det erm ines t he m axim um num ber of possible host s you can have
on your net work. The larger t he num ber of net work num ber bit s, t he sm aller t he num ber of
rem aining host I D bit s.
An I P address wit h host I Ds of all zeros is t he I P address of t he net work ( 192.168.1.0 wit h a 24- bit
subnet m ask, for exam ple) . An I P address wit h host I Ds of all ones is t he broadcast address for t hat
net work ( 192.168.1.255 wit h a 24- bit subnet m ask, for exam ple) .
As t hese t wo I P addresses cannot be used for individual host s, calculat e t he m axim um num ber of
possible host s in a net work as follows:
Table 41 Maxim um Host Num bers
SUBNET MASK
HOST ID SIZE
MAXIMUM NUMBER OF HOSTS
24
8 bit s
255.0.0.0
24 bit s
16 bit s
255.255.0.0
16 bit s
2 16 – 2
24 bit s
29 bit s
255.255.255.0
255.255.255.24
8 bit s
3 bit s
– 2
16777214
65534
254
2 – 2
2 – 2
Notation
Since t he m ask is always a cont inuous num ber of ones beginning from t he left , followed by a
cont inuous num ber of zeros for t he rem ainder of t he 32 bit m ask, you can sim ply specify t he
num ber of ones inst ead of writ ing t he value of each oct et . This is usually specified by writ ing a “ / ”
followed by t he num ber of bit s in t he m ask aft er t he address.
For exam ple, 192.1.1.0 / 25 is equivalent t o saying 192.1.1.0 wit h subnet m ask 255.255.255.128.
NWA1120 Series User’s Guide
171
Appendix C IP Addresses and Subnetting
The following t able shows som e possible subnet m asks using bot h not at ions.
Table 42 Alt ernat ive Subnet Mask Not at ion
SUBNET MASK
ALTERNATIVE
NOTATION
LAST OCTET
(BINARY)
LAST OCTET
(DECIMAL)
255.255.255.0
/ 24
0000 0000
255.255.255.128
/ 25
1000 0000
128
255.255.255.192
/ 26
1100 0000
192
255.255.255.224
/ 27
1110 0000
224
255.255.255.240
/ 28
1111 0000
240
255.255.255.248
/ 29
1111 1000
248
255.255.255.252
/ 30
1111 1100
252
Subnetting
You can use subnet t ing t o divide one net work int o m ult iple sub- net works. I n t he following exam ple
a net work adm inist rat or creat es t wo sub- net works t o isolat e a group of servers from t he rest of t he
com pany net work for securit y reasons.
I n t his exam ple, t he com pany net work address is 192.168.1.0. The first t hree oct et s of t he address
( 192.168.1) are t he net work num ber, and t he rem aining oct et is t he host I D, allowing a m axim um
of 2 8 – 2 or 254 possible host s.
The following figure shows t he com pany net work before subnet t ing.
Figure 89 Subnet t ing Exam ple: Before Subnet t ing
You can “ borrow” one of t he host I D bit s t o divide t he net work 192.168.1.0 int o t wo separat e subnet works. The subnet m ask is now 25 bit s ( 255.255.255.128 or / 25) .
The “ borrowed” host I D bit can have a value of eit her 0 or 1, allowing t wo subnet s; 192.168.1.0 / 25
and 192.168.1.128 / 25.
172
NWA1120 Series User’s Guide
Appendix C IP Addresses and Subnetting
The following figure shows t he com pany net work aft er subnet t ing. There are now t wo subnet works, A and B.
Figure 90 Subnet t ing Exam ple: Aft er Subnet t ing
I n a 25- bit subnet t he host I D has 7 bit s, so each sub- net work has a m axim um of 2 7 – 2 or 126
possible host s ( a host I D of all zeroes is t he subnet ’s address it self, all ones is t he subnet ’s
broadcast address) .
192.168.1.0 wit h m ask 255.255.255.128 is subnet A it self, and 192.168.1.127 wit h m ask
255.255.255.128 is it s broadcast address. Therefore, t he lowest I P address t hat can be assigned t o
an act ual host for subnet A is 192.168.1.1 and t he highest is 192.168.1.126.
Sim ilarly, t he host I D range for subnet B is 192.168.1.129 t o 192.168.1.254.
Example: Four Subnets
The previous exam ple illust rat ed using a 25- bit subnet m ask t o divide a 24- bit address int o t wo
subnet s. Sim ilarly, t o divide a 24- bit address int o four subnet s, you need t o “ borrow” t wo host I D
bit s t o give four possible com binat ions ( 00, 01, 10 and 11) . The subnet m ask is 26 bit s
( 11111111.11111111.11111111.1 1 000000) or 255.255.255.192.
Each subnet cont ains 6 host I D bit s, giving 2 6 - 2 or 62 host s for each subnet ( a host I D of all
zeroes is t he subnet it self, all ones is t he subnet ’s broadcast address) .
Table 43 Subnet 1
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
I P Address ( Decim al)
192.168.1.
I P Address ( Binary)
11000000.10101000.00000001.
0 0 000000
Subnet Mask ( Binary)
11111111.11111111.11111111.
1 1 000000
NWA1120 Series User’s Guide
173
Appendix C IP Addresses and Subnetting
Table 43 Subnet 1 ( cont inued)
IP/SUBNET MASK
NETWORK NUMBER
Subnet Address:
192.168.1.0
Lowest Host I D: 192.168.1.1
Broadcast Address:
192.168.1.63
Highest Host I D: 192.168.1.62
LAST OCTET BIT
VALUE
Table 44 Subnet 2
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
I P Address
192.168.1.
64
I P Address ( Binary)
11000000.10101000.00000001.
0 1 000000
Subnet Mask ( Binary)
11111111.11111111.11111111.
1 1 000000
Subnet Address:
192.168.1.64
Lowest Host I D: 192.168.1.65
Broadcast Address:
192.168.1.127
Highest Host I D: 192.168.1.126
Table 45 Subnet 3
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
I P Address
192.168.1.
128
I P Address ( Binary)
11000000.10101000.00000001.
1 0 000000
Subnet Mask ( Binary)
11111111.11111111.11111111.
1 1 000000
Subnet Address:
192.168.1.128
Lowest Host I D: 192.168.1.129
Broadcast Address:
192.168.1.191
Highest Host I D: 192.168.1.190
Table 46 Subnet 4
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
I P Address
192.168.1.
192
I P Address ( Binary)
11000000.10101000.00000001.
1 1 000000
Subnet Mask ( Binary)
11111111.11111111.11111111.
1 1 000000
Subnet Address:
192.168.1.192
Lowest Host I D: 192.168.1.193
Broadcast Address:
192.168.1.255
Highest Host I D: 192.168.1.254
Example: Eight Subnets
Sim ilarly, use a 27- bit m ask t o creat e eight subnet s ( 000, 001, 010, 011, 100, 101, 110 and 111) .
174
NWA1120 Series User’s Guide
Appendix C IP Addresses and Subnetting
The following t able shows I P address last oct et values for each subnet .
Table 47 Eight Subnet s
SUBNET
SUBNET
ADDRESS
FIRST ADDRESS
LAST
ADDRESS
BROADCAST
ADDRESS
30
31
32
33
62
63
64
65
94
95
96
97
126
127
128
129
158
159
160
161
190
191
192
193
222
223
224
225
254
255
Subnet Planning
The following t able is a sum m ary for subnet planning on a net work wit h a 24- bit net work num ber.
Table 48 24- bit Net work Num ber Subnet Planning
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS
NO. HOSTS PER
SUBNET
255.255.255.128 ( / 25)
126
255.255.255.192 ( / 26)
62
255.255.255.224 ( / 27)
30
255.255.255.240 ( / 28)
16
14
255.255.255.248 ( / 29)
32
255.255.255.252 ( / 30)
64
255.255.255.254 ( / 31)
128
The following t able is a sum m ary for subnet planning on a net work wit h a 16- bit net work num ber.
Table 49 16- bit Net work Num ber Subnet Planning
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS
NO. HOSTS PER
SUBNET
255.255.128.0 ( / 17)
32766
255.255.192.0 ( / 18)
16382
255.255.224.0 ( / 19)
8190
255.255.240.0 ( / 20)
16
4094
255.255.248.0 ( / 21)
32
2046
255.255.252.0 ( / 22)
64
1022
255.255.254.0 ( / 23)
128
510
255.255.255.0 ( / 24)
256
254
255.255.255.128 ( / 25)
512
126
10
255.255.255.192 ( / 26)
1024
62
11
255.255.255.224 ( / 27)
2048
30
12
255.255.255.240 ( / 28)
4096
14
NWA1120 Series User’s Guide
175
Appendix C IP Addresses and Subnetting
Table 49 16- bit Net work Num ber Subnet Planning ( cont inued)
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS
NO. HOSTS PER
SUBNET
13
255.255.255.248 ( / 29)
8192
14
255.255.255.252 ( / 30)
16384
15
255.255.255.254 ( / 31)
32768
Configuring IP Addresses
Where you obt ain your net work num ber depends on your part icular sit uat ion. I f t he I SP or your
net work adm inist rat or assigns you a block of regist ered I P addresses, follow t heir inst ruct ions in
select ing t he I P addresses and t he subnet m ask.
I f t he I SP did not explicit ly give you an I P net work num ber, t hen m ost likely you have a single user
account and t he I SP will assign you a dynam ic I P address when t he connect ion is est ablished. I f t his
is t he case, it is recom m ended t hat you select a net work num ber from 192.168.0.0 t o
192.168.255.0. The I nt ernet Assigned Num ber Aut horit y ( I ANA) reserved t his block of addresses
specifically for privat e use; please do not use any ot her num ber unless you are t old ot herwise. You
m ust also enable Net work Address Translat ion ( NAT) on t he NWA.
Once you have decided on t he net work num ber, pick an I P address for your NWA t hat is easy t o
rem em ber ( for inst ance, 192.168.1.1) but m ake sure t hat no ot her device on your net work is using
t hat I P address.
The subnet m ask specifies t he net work num ber port ion of an I P address. Your NWA will com put e
t he subnet m ask aut om at ically based on t he I P address t hat you ent ered. You don't need t o change
t he subnet m ask com put ed by t he NWA unless you are inst ruct ed t o do ot herwise.
Private IP Addresses
Every m achine on t he I nt ernet m ust have a unique address. I f your net works are isolat ed from t he
I nt ernet ( running only bet ween t wo branch offices, for exam ple) you can assign any I P addresses t o
t he host s wit hout problem s. However, t he I nt ernet Assigned Num bers Aut horit y ( I ANA) has
reserved t he following t hree blocks of I P addresses specifically for privat e net works:
• 10.0.0.0
• 172.16.0.0
— 10.255.255.255
— 172.31.255.255
• 192.168.0.0 — 192.168.255.255
You can obt ain your I P address from t he I ANA, from an I SP, or it can be assigned from a privat e
net work. I f you belong t o a sm all organizat ion and your I nt ernet access is t hrough an I SP, t he I SP
can provide you wit h t he I nt ernet addresses for your local net works. On t he ot her hand, if you are
part of a m uch larger organizat ion, you should consult your net work adm inist rat or for t he
appropriat e I P addresses.
Regardless of your part icular sit uat ion, do not creat e an arbit rary I P address; always follow t he
guidelines above. For m ore inform at ion on address assignm ent , please refer t o RFC 1597, Address
Allocat ion for Privat e I nt ernet s and RFC 1466, Guidelines for Managem ent of I P Address Space.
176
NWA1120 Series User’s Guide
A PPENDIX
IPv6
Overview
I Pv6 ( I nt ernet Prot ocol version 6) , is designed t o enhance I P address size and feat ures. The
increase in I Pv6 address size t o 128 bit s ( from t he 32- bit I Pv4 address) allows up t o 3.4 x 10 38 I P
addresses.
IPv6 Addressing
The 128- bit I Pv6 address is writ t en as eight 16- bit hexadecim al blocks separat ed by colons ( : ) . This
is an exam ple I Pv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000.
I Pv6 addresses can be abbreviat ed in t wo ways:
• Leading zeros in a block can be om it t ed. So 2001:0db8:1a2b:0015:0000:0000:1a2f:0000 can
be writ t en as 2001:db8:1a2b:15:0:0:1a2f:0.
• Any num ber of consecut ive blocks of zeros can be replaced by a double colon. A double colon can
only appear once in an I Pv6 address. So 2001:0db8:0000:0000:1a2f:0000:0000:0015 can be
writ t en as 2001:0db8::1a2f:0000:0000:0015, 2001:0db8:0000:0000:1a2f::0015,
2001:db8::1a2f:0:0:15 or 2001:db8:0:0:1a2f::15.
Prefix and Prefix Length
Sim ilar t o an I Pv4 subnet m ask, I Pv6 uses an address prefix t o represent t he net work address. An
I Pv6 prefix lengt h specifies how m any m ost significant bit s ( st art from t he left ) in t he address
com pose t he net work address. The prefix lengt h is writ t en as “ / x” where x is a num ber. For
exam ple,
2001:db8:1a2b:15::1a2f:0/32
m eans t hat t he first 32 bit s ( 2001:db8) is t he subnet prefix.
Link-local Address
A link- local address uniquely ident ifies a device on t he local net work ( t he LAN) . I t is sim ilar t o a
“ privat e I P address” in I Pv4. You can have t he sam e link- local address on m ult iple int erfaces on a
device. A link- local unicast address has a predefined prefix of fe80: : / 10. The link- local unicast
address form at is as follows.
Table 50 Link- local Unicast Address Form at
1111 1110 10
I nt erface I D
10 bit s
54 bit s
64 bit s
NWA1120 Series User’s Guide
177
Appendix D IPv6
Global Address
A global address uniquely ident ifies a device on t he I nt ernet . I t is sim ilar t o a “ public I P address” in
I Pv4. A global unicast address st art s wit h a 2 or 3.
Unspecified Address
An unspecified address ( 0: 0: 0: 0: 0: 0: 0: 0 or : : ) is used as t he source address when a device does
not have it s own address. I t is sim ilar t o “ 0.0.0.0” in I Pv4.
Loopback Address
A loopback address ( 0: 0: 0: 0: 0: 0: 0: 1 or : : 1) allows a host t o send packet s t o it self. I t is sim ilar t o
“ 127.0.0.1” in I Pv4.
Multicast Address
I n I Pv6, m ult icast addresses provide t he sam e funct ionalit y as I Pv4 broadcast addresses.
Broadcast ing is not support ed in I Pv6. A m ult icast address allows a host t o send packet s t o all host s
in a m ult icast group.
Mult icast scope allows you t o det erm ine t he size of t he m ult icast group. A m ult icast address has a
predefined prefix of ff00: : / 8. The following t able describes som e of t he predefined m ult icast
addresses.
Table 51 Predefined Mult icast Address
MULTICAST ADDRESS
DESCRIPTION
FF01:0:0:0:0:0:0:1
All host s on a local node.
FF01:0:0:0:0:0:0:2
All rout ers on a local node.
FF02:0:0:0:0:0:0:1
All host s on a local connect ed link.
FF02:0:0:0:0:0:0:2
All rout ers on a local connect ed link.
FF05:0:0:0:0:0:0:2
All rout ers on a local sit e.
FF05:0:0:0:0:0:1:3
All DHCP severs on a local sit e.
The following t able describes t he m ult icast addresses which are reserved and can not be assigned
t o a m ult icast group.
Table 52 Reserved Mult icast Address
MULTICAST ADDRESS
FF00:0:0:0:0:0:0:0
FF01:0:0:0:0:0:0:0
FF02:0:0:0:0:0:0:0
FF03:0:0:0:0:0:0:0
FF04:0:0:0:0:0:0:0
FF05:0:0:0:0:0:0:0
FF06:0:0:0:0:0:0:0
FF07:0:0:0:0:0:0:0
FF08:0:0:0:0:0:0:0
FF09:0:0:0:0:0:0:0
178
NWA1120 Series User’s Guide
Appendix D IPv6
Table 52 Reserved Mult icast Address ( cont inued)
MULTICAST ADDRESS
FF0A:0:0:0:0:0:0:0
FF0B:0:0:0:0:0:0:0
FF0C:0:0:0:0:0:0:0
FF0D:0:0:0:0:0:0:0
FF0E:0:0:0:0:0:0:0
FF0F:0:0:0:0:0:0:0
Subnet Masking
Bot h an I Pv6 address and I Pv6 subnet m ask com pose of 128- bit binary digit s, which are divided
int o eight 16- bit blocks and writ t en in hexadecim al not at ion. Hexadecim al uses four bit s for each
charact er ( 1 ~ 10, A ~ F) . Each block’s 16 bit s are t hen represent ed by four hexadecim al
charact ers. For exam ple, FFFF: FFFF: FFFF: FFFF: FC00: 0000: 0000: 0000.
Interface ID
I n I Pv6, an int erface I D is a 64- bit ident ifier. I t ident ifies a physical int erface ( for exam ple, an
Et hernet port ) or a virt ual int erface ( for exam ple, t he m anagem ent I P address for a VLAN) . One
int erface should have a unique int erface I D.
EUI-64
The EUI - 64 ( Ext ended Unique I dent ifier) defined by t he I EEE ( I nst it ut e of Elect rical and Elect ronics
Engineers) is an int erface I D form at designed t o adapt wit h I Pv6. I t is derived from t he 48- bit ( 6byt e) Et hernet MAC address as shown next . EUI - 64 insert s t he hex digit s fffe bet ween t he t hird and
fourt h byt es of t he MAC address and com plem ent s t he sevent h bit of t he first byt e of t he MAC
address. See t he following exam ple.
Table 53
00
: 13
: 49
: 12
: 34
: 56
: 13
: 49
: FF
: FE
: 12
: 34
M AC
Table 54
EUI - 6 4
02
: 56
Stateless Autoconfiguration
Wit h st at eless aut oconfigurat ion in I Pv6, addresses can be uniquely and aut om at ically generat ed.
Unlike DHCPv6 ( Dynam ic Host Configurat ion Prot ocol version six) which is used in I Pv6 st at eful
aut oconfigurat ion, t he owner and st at us of addresses don’t need t o be m aint ained by a DHCP
server. Every I Pv6 device is able t o generat e it s own and unique I P address aut om at ically when
I Pv6 is init iat ed on it s int erface. I t com bines t he prefix and t he int erface I D ( generat ed from it s own
Et hernet MAC address, see I nt erface I D and EUI - 64) t o form a com plet e I Pv6 address.
When I Pv6 is enabled on a device, it s int erface aut om at ically generat es a link- local address
( beginning wit h fe80) .
When t he int erface is connect ed t o a net work wit h a rout er and t he NWA is set t o aut om at ically
obt ain an I Pv6 net work prefix from t he rout er for t he int erface, it generat es 1 anot her address which
NWA1120 Series User’s Guide
179
Appendix D IPv6
com bines it s int erface I D and global and subnet inform at ion advert ised from t he rout er. This is a
rout able global I P address.
DHCPv6
The Dynam ic Host Configurat ion Prot ocol for I Pv6 ( DHCPv6, RFC 3315) is a server- client prot ocol
t hat allows a DHCP server t o assign and pass I Pv6 net work addresses, prefixes and ot her
configurat ion inform at ion t o DHCP client s. DHCPv6 servers and client s exchange DHCP m essages
using UDP.
Each DHCP client and server has a unique DHCP Unique I Dent ifier ( DUI D) , which is used for
ident ificat ion when t hey are exchanging DHCPv6 m essages. The DUI D is generat ed from t he MAC
address, t im e, vendor assigned I D and/ or t he vendor's privat e ent erprise num ber regist ered wit h
t he I ANA. I t should not change over t im e even aft er you reboot t he device.
Identity Association
An I dent it y Associat ion ( I A) is a collect ion of addresses assigned t o a DHCP client , t hrough which
t he server and client can m anage a set of relat ed I P addresses. Each I A m ust be associat ed wit h
exact ly one int erface. The DHCP client uses t he I A assigned t o an int erface t o obt ain configurat ion
from a DHCP server for t hat int erface. Each I A consist s of a unique I AI D and associat ed I P
inform at ion.
The I A t ype is t he t ype of address in t he I A. Each I A holds one t ype of address. I A_NA m eans an
ident it y associat ion for non- t em porary addresses and I A_TA is an ident it y associat ion for t em porary
addresses. An I A_NA opt ion cont ains t he T1 and T2 fields, but an I A_TA opt ion does not . The
DHCPv6 server uses T1 and T2 t o cont rol t he t im e at which t he client cont act s wit h t he server t o
ext end t he lifet im es on any addresses in t he I A_NA before t he lifet im es expire. Aft er T1, t he client
sends t he server ( S1 ) ( from which t he addresses in t he I A_NA were obt ained) a Renew m essage. I f
t he t im e T2 is reached and t he server does not respond, t he client sends a Rebind m essage t o any
available server ( S2 ) . For an I A_TA, t he client m ay send a Renew or Rebind m essage at t he client 's
discret ion.
T2
T1
Renew Renew
to S1
to S1
Renew Renew
to S1
to S1
Renew
to S1
Renew
to S1
Rebind
to S2
Rebind
to S2
DHCP Relay Agent
A DHCP relay agent is on t he sam e net work as t he DHCP client s and helps forward m essages
bet ween t he DHCP server and client s. When a client cannot use it s link- local address and a wellknown m ult icast address t o locat e a DHCP server on it s net work, it t hen needs a DHCP relay agent
t o send a m essage t o a DHCP server t hat is not at t ached t o t he sam e net work.
The DHCP relay agent can add t he rem ot e ident ificat ion ( rem ot e- I D) opt ion and t he int erface- I D
opt ion t o t he Relay- Forward DHCPv6 m essages. The rem ot e- I D opt ion carries a user- defined st ring,
1.
180
In IPv6, all network interfaces can be associated with several addresses.
NWA1120 Series User’s Guide
Appendix D IPv6
such as t he syst em nam e. The int erface- I D opt ion provides slot num ber, port inform at ion and t he
VLAN I D t o t he DHCPv6 server. The rem ot e- I D opt ion ( if any) is st ripped from t he Relay- Reply
m essages before t he relay agent sends t he packet s t o t he client s. The DHCP server copies t he
int erface- I D opt ion from t he Relay- Forward m essage int o t he Relay- Reply m essage and sends it t o
t he relay agent . The int erface- I D should not change even aft er t he relay agent rest art s.
Prefix Delegation
Prefix delegat ion enables an I Pv6 rout er t o use t he I Pv6 prefix ( net work address) received from t he
I SP ( or a connect ed uplink rout er) for it s LAN. The NWA uses t he received I Pv6 prefix ( for exam ple,
2001: db2: : / 48) t o generat e it s LAN I P address. Through sending Rout er Advert isem ent s ( RAs)
regularly by m ult icast , t he NWA passes t he I Pv6 prefix inform at ion t o it s LAN host s. The host s t hen
can use t he prefix t o generat e t heir I Pv6 addresses.
ICMPv6
I nt ernet Cont rol Message Prot ocol for I Pv6 ( I CMPv6 or I CMP for I Pv6) is defined in RFC 4443.
I CMPv6 has a preceding Next Header value of 58, which is different from t he value used t o ident ify
I CMP for I Pv4. I CMPv6 is an int egral part of I Pv6. I Pv6 nodes use I CMPv6 t o report errors
encount ered in packet processing and perform ot her diagnost ic funct ions, such as " ping" .
Neighbor Discovery Protocol (NDP)
The Neighbor Discovery Prot ocol ( NDP) is a prot ocol used t o discover ot her I Pv6 devices and t rack
neighbor ’s reachabilit y in a net work. An I Pv6 device uses t he following I CMPv6 m essages t ypes:
• Neighbor solicit at ion: A request from a host t o det erm ine a neighbor ’s link- layer address ( MAC
address) and det ect if t he neighbor is st ill reachable. A neighbor being “ reachable” m eans it
responds t o a neighbor solicit at ion m essage ( from t he host ) wit h a neighbor advert isem ent
m essage.
• Neighbor advert isem ent : A response from a node t o announce it s link- layer address.
• Rout er solicit at ion: A request from a host t o locat e a rout er t hat can act as t he default rout er and
forward packet s.
• Rout er advert isem ent : A response t o a rout er solicit at ion or a periodical m ult icast advert isem ent
from a rout er t o advert ise it s presence and ot her param et ers.
IPv6 Cache
An I Pv6 host is required t o have a neighbor cache, dest inat ion cache, prefix list and default rout er
list . The NWA m aint ains and updat es it s I Pv6 caches const ant ly using t he inform at ion from
response m essages. I n I Pv6, t he NWA configures a link- local address aut om at ically, and t hen sends
a neighbor solicit at ion m essage t o check if t he address is unique. I f t here is an address t o be
resolved or verified, t he NWA also sends out a neighbor solicit at ion m essage. When t he NWA
receives a neighbor advert isem ent in response, it st ores t he neighbor ’s link- layer address in t he
neighbor cache. When t he NWA uses a rout er solicit at ion m essage t o query for a rout er and
receives a rout er advert isem ent m essage, it adds t he rout er ’s inform at ion t o t he neighbor cache,
prefix list and dest inat ion cache. The NWA creat es an ent ry in t he default rout er list cache if t he
rout er can be used as a default rout er.
When t he NWA needs t o send a packet , it first consult s t he dest inat ion cache t o det erm ine t he next
hop. I f t here is no m at ching ent ry in t he destinat ion cache, t he NWA uses t he prefix list t o
NWA1120 Series User’s Guide
181
Appendix D IPv6
det erm ine whet her t he dest inat ion address is on- link and can be reached direct ly wit hout passing
t hrough a rout er. I f t he address is onlink, t he address is considered as t he next hop. Ot herwise, t he
NWA det erm ines t he next- hop from t he default router list or rout ing t able. Once t he next hop I P
address is known, t he NWA looks int o t he neighbor cache t o get t he link- layer address and sends
t he packet when t he neighbor is reachable. I f t he NWA cannot find an ent ry in t he neighbor cache
or t he st at e for t he neighbor is not reachable, it st art s t he address resolut ion process. This helps
reduce t he num ber of I Pv6 solicit at ion and advert isem ent m essages.
Multicast Listener Discovery
The Mult icast List ener Discovery ( MLD) prot ocol ( defined in RFC 2710) is derived from I Pv4's
I nt ernet Group Managem ent Prot ocol version 2 ( I GMPv2) . MLD uses I CMPv6 m essage t ypes, rat her
t han I GMP m essage t ypes. MLDv1 is equivalent t o I GMPv2 and MLDv2 is equivalent t o I GMPv3.
MLD allows an I Pv6 swit ch or rout er t o discover t he presence of MLD list eners who wish t o receive
m ult icast packet s and t he I P addresses of m ult icast groups t he host s want t o j oin on it s net work.
MLD snooping and MLD proxy are analogous t o I GMP snooping and I GMP proxy in I Pv4.
MLD filt ering cont rols which m ult icast groups a port can j oin.
MLD Messages
A m ult icast rout er or swit ch periodically sends general queries t o MLD host s t o updat e t he m ult icast
forwarding t able. When an MLD host want s t o j oin a m ult icast group, it sends an MLD Report
m essage for t hat address.
An MLD Done m essage is equivalent t o an I GMP Leave m essage. When an MLD host want s t o leave
a m ult icast group, it can send a Done m essage t o t he rout er or swit ch. The rout er or swit ch t hen
sends a group- specific query t o t he port on which t he Done m essage is received t o det erm ine if
ot her devices connect ed t o t his port should rem ain in t he group.
182
NWA1120 Series User’s Guide
Appendix D IPv6
Example - Enabling IPv6 on Windows XP/2003/Vista
By default , Windows XP and Windows 2003 support I Pv6. This exam ple shows you how t o use t he
ipv6 install com m and on Windows XP/ 2003 t o enable I Pv6. This also displays how t o use t he
ipconfig com m and t o see aut o- generat ed I P addresses.
C:\>ipv6 install
Installing...
Succeeded.
C:\>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific
IP Address. . . . .
Subnet Mask . . . .
IP Address. . . . .
Default Gateway . .
DNS
. .
. .
. .
. .
Suffix
. . . .
. . . .
. . . .
. . . .
10.1.1.46
255.255.255.0
fe80::2d0:59ff:feb8:103c%4
10.1.1.254
I Pv6 is inst alled and enabled by default in Windows Vist a. Use t he ipconfig com m and t o check
your aut om at ic configured I Pv6 address as well. You should see at least one I Pv6 address available
for t he int erface on your com put er.
Example - Enabling DHCPv6 on Windows XP
Windows XP does not support DHCPv6. I f your net work uses DHCPv6 for I P address assignm ent ,
you have t o addit ionally inst all a DHCPv6 client soft ware on your Windows XP. ( Not e: I f you use
st at ic I P addresses or Rout er Advert isem ent for I Pv6 address assignm ent in your net work, ignore
t his sect ion.)
This exam ple uses Dibbler as t he DHCPv6 client. To enable DHCPv6 client on your com put er:
I nst all Dibbler and select t he DHCPv6 client opt ion on your com put er.
Aft er t he inst allat ion is com plet e, select St a r t > All Pr ogr a m s > D ibble r - D H CPv6 > Clie nt
I nst a ll a s se r vice .
Select St a r t > Cont r ol Pa n e l > Adm in ist r a t ive Tools > Se r vice s.
Double click D ibble r - a D H CPv6 clie nt .
NWA1120 Series User’s Guide
183
Appendix D IPv6
Click St a r t and t hen OK.
Now your com put er can obt ain an I Pv6 address from a DHCPv6 server.
Example - Enabling IPv6 on Windows 7
Windows 7 support s I Pv6 by default . DHCPv6 is also enabled when you enable I Pv6 on a Windows 7
com put er.
To enable I Pv6 in Windows 7:
184
Select Cont r ol Pa ne l > N e t w or k a n d Sh a r in g Ce n t e r > Loca l Ar e a Con ne ct ion.
Select t he I n t e r n e t Pr ot ocol Ve r sion 6 ( TCP/ I Pv6 ) checkbox t o enable it .
Click OK t o save t he change.
NWA1120 Series User’s Guide
Appendix D IPv6
Click Close t o exit t he Loca l Ar e a Conn e ct ion St a t us screen.
Select St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt .
Use t he ipconfig com m and t o check your dynam ic I Pv6 address. This exam ple shows a global
address ( 2001: b021: 2d: : 1000) obt ained from a DHCP server.
C:\>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific DNS
IPv6 Address. . . . . .
Link-local IPv6 Address
IPv4 Address. . . . . .
Subnet Mask . . . . . .
Default Gateway . . . .
NWA1120 Series User’s Guide
Suffix
. . . .
. . . .
. . . .
. . . .
. . . .
2001:b021:2d::1000
fe80::25d8:dcab:c80a:5189%11
172.16.100.61
255.255.255.0
fe80::213:49ff:feaa:7125%11
172.16.100.254
185
Appendix D IPv6
186
NWA1120 Series User’s Guide
A PPENDIX
Wireless LANs
Wireless LAN Topologies
This sect ion discusses ad- hoc and infrast ruct ure wireless LAN t opologies.
Ad-hoc Wireless LAN Configuration
The sim plest WLAN configurat ion is an independent ( Ad- hoc) WLAN t hat connect s a set of
com put ers wit h wireless adapt ers ( A, B, C) . Any t im e t wo or m ore wireless adapt ers are wit hin
range of each ot her, t hey can set up an independent net work, which is com m only referred t o as an
ad- hoc net work or I ndependent Basic Service Set ( I BSS) . The following diagram shows an exam ple
of not ebook com put ers using wireless adapt ers t o form an ad- hoc wireless LAN.
Figure 91 Peer- t o- Peer Com m unicat ion in an Ad- hoc Net work
BSS
A Basic Service Set ( BSS) exist s when all com m unicat ions bet ween wireless client s or bet ween a
wireless client and a wired net work client go t hrough one access point ( AP) .
I nt ra- BSS t raffic is t raffic bet ween wireless client s in t he BSS. When I nt ra- BSS is enabled, wireless
client A and B can access t he wired net work and com m unicat e wit h each ot her. When I nt ra- BSS is
NWA1120 Series User’s Guide
187
Appendix E Wireless LANs
disabled, wireless client A and B can st ill access t he wired net work but cannot com m unicat e wit h
each ot her.
Figure 92 Basic Service Set
ESS
An Ext ended Service Set ( ESS) consist s of a series of overlapping BSSs, each cont aining an access
point , wit h each access point connect ed t oget her by a wired net work. This wired connect ion
bet ween APs is called a Dist ribut ion Syst em ( DS) .
This t ype of wireless LAN t opology is called an I nfrast ruct ure WLAN. The Access Point s not only
provide com m unicat ion wit h t he wired net work but also m ediat e wireless net work t raffic in t he
im m ediat e neighborhood.
188
NWA1120 Series User’s Guide
Appendix E Wireless LANs
An ESSI D ( ESS I Dent ificat ion) uniquely ident ifies each ESS. All access point s and t heir associat ed
wireless client s wit hin t he sam e ESS m ust have t he sam e ESSI D in order t o com m unicat e.
Figure 93 I nfrast ruct ure WLAN
Channel
A channel is t he radio frequency( ies) used by wireless devices t o t ransm it and receive dat a.
Channels available depend on your geographical area. You m ay have a choice of channels ( for your
region) so you should use a channel different from an adj acent AP ( access point ) t o reduce
int erference. I nt erference occurs when radio signals from different access point s overlap causing
int erference and degrading perform ance.
Adj acent channels part ially overlap however. To avoid int erference due t o overlap, your AP should
be on a channel at least five channels away from a channel t hat an adj acent AP is using. For
exam ple, if your region has 11 channels and an adj acent AP is using channel 1, t hen you need t o
select a channel bet ween 6 or 11.
RTS/CTS
A hidden node occurs when t wo st at ions are wit hin range of t he sam e access point , but are not
wit hin range of each ot her. The following figure illust rat es a hidden node. Bot h st at ions ( STA) are
wit hin range of t he access point ( AP) or wireless gat eway, but out- of- range of each ot her, so t hey
NWA1120 Series User’s Guide
189
Appendix E Wireless LANs
cannot " hear" each ot her, t hat is t hey do not know if t he channel is current ly being used. Therefore,
t hey are considered hidden from each ot her.
Figure 94
RTS/ CTS
When st at ion A sends dat a t o t he AP, it m ight not know t hat t he st at ion B is already using t he
channel. I f t hese t wo st at ions send dat a at t he sam e t im e, collisions m ay occur when bot h set s of
dat a arrive at t he AP at t he sam e t im e, result ing in a loss of m essages for bot h st at ions.
RTS/ CTS is designed t o prevent collisions due t o hidden nodes. An RTS/ CTS defines t he biggest
size dat a fram e you can send before an RTS ( Request To Send) / CTS ( Clear t o Send) handshake is
invoked.
When a dat a fram e exceeds t he RTS/ CTS value you set ( bet ween 0 t o 2432 byt es) , t he st at ion
t hat want s t o t ransm it t his fram e m ust first send an RTS ( Request To Send) m essage t o t he AP for
perm ission t o send it . The AP t hen responds wit h a CTS ( Clear t o Send) m essage t o all ot her
st at ions wit hin it s range t o not ify t hem t o defer t heir t ransm ission. I t also reserves and confirm s
wit h t he request ing st at ion t he t im e fram e for t he request ed t ransm ission.
St at ions can send fram es sm aller t han t he specified RTS/ CTS direct ly t o t he AP wit hout t he RTS
( Request To Send) / CTS ( Clear t o Send) handshake.
You should only configure RTS/ CTS if t he possibilit y of hidden nodes exist s on your net work and
t he " cost " of resending large fram es is m ore t han t he ext ra net work overhead involved in t he RTS
( Request To Send) / CTS ( Clear t o Send) handshake.
I f t he RTS/ CTS value is great er t han t he Fr a gm e nt a t ion Thr e sh old value ( see next ) , t hen t he
RTS ( Request To Send) / CTS ( Clear t o Send) handshake will never occur as dat a fram es will be
fragm ent ed before t hey reach RTS/ CTS size.
Not e: Enabling t he RTS Threshold causes redundant net w ork overhead t hat could
negat ively affect t he t hroughput perfor m ance inst ead of pr oviding a rem edy.
Fragmentation Threshold
A Fr a gm e nt a t ion Thr e sh old is t he m axim um dat a fragm ent size ( bet ween 256 and 2432 byt es)
t hat can be sent in t he wireless net work before t he AP will fragm ent t he packet int o sm aller dat a
fram es.
A large Fr a gm e n t a t ion Th r e sh old is recom m ended for net works not prone t o int erference while
you should set a sm aller t hreshold for busy net works or net works t hat are prone t o int erference.
190
NWA1120 Series User’s Guide
Appendix E Wireless LANs
I f t he Fr a gm e nt a t ion Thr e shold value is sm aller t han t he RTS/ CTS value ( see previously) you
set t hen t he RTS ( Request To Send) / CTS ( Clear t o Send) handshake will never occur as dat a fram es
will be fragm ent ed before t hey reach RTS/ CTS size.
Preamble Type
Pream ble is used t o signal t hat dat a is com ing t o t he receiver. Short and long refer t o t he lengt h of
t he synchronizat ion field in a packet .
Short pream ble increases perform ance as less t im e sending pream ble m eans m ore t im e for sending
dat a. All I EEE 802.11 com pliant wireless adapt ers support long pream ble, but not all support short
pream ble.
Use long pream ble if you are unsure what pream ble m ode ot her wireless devices on t he net work
support , and t o provide m ore reliable com m unicat ions in busy wireless net works.
Use short pream ble if you are sure all wireless devices on t he net work support it , and t o provide
m ore efficient com m unicat ions.
Use t he dynam ic set t ing t o aut om at ically use short pream ble when all wireless devices on t he
net work support it , ot herwise t he NWA uses long pream ble.
Not e: The wireless devices MUST use t he sam e pream ble m ode in order t o com m unicat e.
Wireless LAN Standards
The I EEE 802.11b wireless access st andard was first published in 1999. I EEE 802.11b has a
m axim um dat a rat e of 11 Mbps and uses t he 2.4 GHz band.
I EEE 802.11g also works in t he 2.4 GHz band and is fully com pat ible wit h t he I EEE 802.11b
st andard. This m eans an I EEE 802.11b adapt er can int erface direct ly wit h an I EEE 802.11g access
point ( and vice versa) at 11 Mbps or lower depending on range. I EEE 802.11g has several
int erm ediat e rat e st eps bet ween t he m axim um and m inim um dat a rat es ( 54 Mbps and 1 Mbps
respect ively) .
I EEE 802.11a has a dat a rat e of up t o 54 Mbps using t he 5 GHz band. I EEE 802.11a is not
int eroperable wit h I EEE 802.11b or I EEE 802.11g.
I EEE 802.11n can operat e bot h in t he 2.4 GHz and 5 GHz bands and is backward com pat ible wit h
t he I EEE 802.11a, I EEE 802.11b, and I EEE 802.11g st andards. I t im proves net work t hroughput and
increases t he m axim um raw dat a rat e from 54 Mbps t o 300 Mbps by using m ult iple- input m ult ipleout put ( MI MO) , a channel widt h of 40 MHz, fram e aggregat ion and short guard int erval.
Table 55 Wireless LAN St andards Com parison Table
WIRELESS LAN
STANDARD
MAXIMUM NET
DATA RATE
FREQUENCY
BAND
COMPATIBILITY
I EEE 802.11b
11 Mbps
2.4 GHz
I EEE 802.11g
I EEE 802.11n
I EEE 802.11g
54 Mbps
2.4 GHz
I EEE 802.11b
I EEE 802.11n
NWA1120 Series User’s Guide
191
Appendix E Wireless LANs
Table 55 Wireless LAN St andards Com parison Table
WIRELESS LAN
STANDARD
MAXIMUM NET
DATA RATE
FREQUENCY
BAND
COMPATIBILITY
I EEE 802.11a
54 Mbps
5 GHz
I EEE 802.11n
I EEE 802.11n
300 Mbps
2.4 GHz, 5 GHz
I EEE 802.11b
I EEE 802.11g
I EEE 802.11a
Wireless Security Overview
Wireless securit y is vit al t o your net work t o prot ect wireless com m unicat ion bet ween wireless
client s, access point s and t he wired net work.
Wireless securit y m et hods available on t he NWA are dat a encrypt ion, wireless client aut hent icat ion,
rest rict ing access by device MAC address and hiding t he NWA ident it y.
The following figure shows t he relat ive effect iveness of t hese wireless securit y m et hods available on
your NWA.
Table 56 Wireless Securit y Levels
SECURITY
LEVEL
Least
Secure
SECURITY TYPE
Unique SSI D ( Default )
Unique SSI D wit h Hide SSI D Enabled
MAC Address Filt ering
WEP Encrypt ion
I EEE802.1x EAP wit h RADI US Server Aut hent icat ion
Wi- Fi Prot ect ed Access ( WPA)
Most Secure
WPA2
Not e: You m ust enable t he sam e wireless securit y set t ings on t he NWA and on all w ireless
client s t hat you want t o associat e wit h it .
IEEE 802.1x
I n June 2001, t he I EEE 802.1x st andard was designed t o ext end t he feat ures of I EEE 802.11 t o
support ext ended aut hent icat ion as well as providing addit ional account ing and cont rol feat ures. I t
is support ed by Windows XP and a num ber of net work devices. Som e advant ages of I EEE 802.1x
are:
• User based ident ificat ion t hat allows for roam ing.
• Support for RADI US ( Rem ot e Aut hent icat ion Dial I n User Service, RFC 2138, 2139) for
cent ralized user profile and account ing m anagem ent on a net work RADI US server.
• Support for EAP ( Ext ensible Aut hent icat ion Prot ocol, RFC 2486) t hat allows addit ional
aut hent icat ion m et hods t o be deployed wit h no changes t o t he access point or t he wireless
client s.
192
NWA1120 Series User’s Guide
Appendix E Wireless LANs
RADIUS
RADI US is based on a client- server m odel t hat support s aut hent icat ion, aut horizat ion and
account ing. The access point is t he client and t he server is t he RADI US server. The RADI US server
handles t he following t asks:
• Aut hent icat ion
Det erm ines t he ident it y of t he users.
• Aut horizat ion
Det erm ines t he net work services available t o aut hent icat ed users once t hey are connect ed t o t he
net work.
• Account ing
Keeps t rack of t he client ’s net work act ivit y.
RADI US is a sim ple package exchange in which your AP act s as a m essage relay bet ween t he
wireless client and t he net work RADI US server.
Types of RADIUS Messages
The following t ypes of RADI US m essages are exchanged bet ween t he access point and t he RADI US
server for user aut hent icat ion:
• Access- Request
Sent by an access point request ing aut hent icat ion.
• Access- Rej ect
Sent by a RADI US server rej ect ing access.
• Access-Accept
Sent by a RADI US server allowing access.
• Access- Challenge
Sent by a RADI US server request ing m ore inform at ion in order t o allow access. The access point
sends a proper response from t he user and t hen sends anot her Access- Request m essage.
The following t ypes of RADI US m essages are exchanged bet ween t he access point and t he RADI US
server for user account ing:
• Account ing- Request
Sent by t he access point request ing account ing.
• Account ing- Response
Sent by t he RADI US server t o indicat e t hat it has st art ed or st opped account ing.
I n order t o ensure net work securit y, t he access point and t he RADI US server use a shared secret
key, which is a password, t hey bot h know. The key is not sent over t he net work. I n addit ion t o t he
shared key, password inform at ion exchanged is also encrypt ed t o prot ect t he net work from
unaut horized access.
Types of EAP Authentication
This sect ion discusses som e popular aut hent icat ion t ypes: EAP- MD5, EAP-TLS, EAP-TTLS, PEAP and
LEAP. Your wireless LAN device m ay not support all aut hent icat ion t ypes.
NWA1120 Series User’s Guide
193
Appendix E Wireless LANs
EAP ( Ext ensible Aut hent icat ion Prot ocol) is an aut hent icat ion prot ocol t hat runs on t op of t he I EEE
802.1x t ransport m echanism in order t o support m ult iple t ypes of user aut hent icat ion. By using EAP
t o int eract wit h an EAP- com pat ible RADI US server, an access point helps a wireless st at ion and a
RADI US server perform aut hent icat ion.
The t ype of aut hent icat ion you use depends on t he RADI US server and an int erm ediary AP( s) t hat
support s I EEE 802.1x.
For EAP-TLS aut hent icat ion t ype, you m ust first have a wired connect ion t o t he net work and obt ain
t he cert ificat e( s) from a cert ificat e aut horit y ( CA) . A cert ificat e ( also called digit al I Ds) can be used
t o aut hent icat e users and a CA issues cert ificat es and guarant ees t he ident it y of each cert ificat e
owner.
EAP-MD5 (Message-Digest Algorithm 5)
MD5 aut hent icat ion is t he sim plest one- way aut hent icat ion m et hod. The aut hent icat ion server
sends a challenge t o t he wireless client . The wireless client ‘proves’ t hat it knows t he password by
encrypt ing t he password wit h t he challenge and sends back t he inform at ion. Password is not sent in
plain t ext .
However, MD5 aut hent icat ion has som e weaknesses. Since t he aut hent icat ion server needs t o get
t he plaint ext passwords, t he passwords m ust be st ored. Thus som eone ot her t han t he
aut hent icat ion server m ay access t he password file. I n addit ion, it is possible t o im personat e an
aut hent icat ion server as MD5 aut hent icat ion m et hod does not perform m ut ual aut hent icat ion.
Finally, MD5 aut hent icat ion m et hod does not support dat a encrypt ion wit h dynam ic session key. You
m ust configure WEP encrypt ion keys for dat a encrypt ion.
EAP-TLS (Transport Layer Security)
Wit h EAP-TLS, digit al cert ificat ions are needed by bot h t he server and t he wireless client s for
m ut ual aut hent icat ion. The server present s a cert ificat e t o t he client . Aft er validat ing t he ident it y of
t he server, t he client sends a different cert ificat e t o t he server. The exchange of cert ificat es is done
in t he open before a secured t unnel is creat ed. This m akes user ident it y vulnerable t o passive
at t acks. A digit al cert ificat e is an elect ronic I D card t hat aut hent icat es t he sender ’s ident it y.
However, t o im plem ent EAP-TLS, you need a Cert ificat e Aut horit y ( CA) t o handle cert ificat es, which
im poses a m anagem ent overhead.
EAP-TTLS (Tunneled Transport Layer Service)
EAP-TTLS is an ext ension of t he EAP-TLS aut hent icat ion t hat uses cert ificat es for only t he serverside aut hent icat ions t o est ablish a secure connect ion. Client aut hent icat ion is t hen done by sending
usernam e and password t hrough t he secure connect ion, t hus client ident it y is prot ect ed. For client
aut hent icat ion, EAP-TTLS support s EAP m et hods and legacy aut hent icat ion m et hods such as PAP,
CHAP, MS- CHAP and MS- CHAP v2.
PEAP (Protected EAP)
Like EAP-TTLS, server- side cert ificat e aut hent icat ion is used t o est ablish a secure connect ion, t hen
use sim ple usernam e and password m et hods t hrough t he secured connect ion t o aut hent icat e t he
client s, t hus hiding client ident it y. However, PEAP only support s EAP m et hods, such as EAP- MD5,
EAP- MSCHAPv2 and EAP- GTC ( EAP- Generic Token Card) , for client aut hent icat ion. EAP- GTC is
im plem ent ed only by Cisco.
194
NWA1120 Series User’s Guide
Appendix E Wireless LANs
LEAP
LEAP ( Light weight Ext ensible Aut hent icat ion Prot ocol) is a Cisco im plem ent at ion of I EEE 802.1x.
Dynamic WEP Key Exchange
The AP m aps a unique key t hat is generat ed wit h t he RADI US server. This key expires when t he
wireless connect ion t im es out , disconnect s or reaut hent icat ion t im es out . A new WEP key is
generat ed each t im e reaut hent icat ion is perform ed.
I f t his feat ure is enabled, it is not necessary t o configure a default encrypt ion key in t he wireless
securit y configurat ion screen. You m ay st ill configure and st ore keys, but t hey will not be used while
dynam ic WEP is enabled.
Not e: EAP- MD5 cannot be used wit h Dynam ic WEP Key Exchange
For added securit y, cert ificat e- based aut hent icat ions ( EAP-TLS, EAP-TTLS and PEAP) use dynam ic
keys for dat a encrypt ion. They are oft en deployed in corporat e environm ent s, but for public
deploym ent , a sim ple user nam e and password pair is m ore pract ical. The following t able is a
com parison of t he feat ures of aut hent icat ion t ypes.
Table 57 Com parison of EAP Aut hent icat ion Types
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
LEAP
Mut ual Aut hent icat ion
No
Yes
Yes
Yes
Yes
Cert ificat e – Client
No
Yes
Opt ional
Opt ional
No
Cert ificat e – Server
No
Yes
Yes
Yes
No
Dynam ic Key Exchange
No
Yes
Yes
Yes
Yes
Credent ial I nt egrit y
None
St rong
St rong
St rong
Moderat e
Deploym ent Difficult y
Easy
Hard
Moderat e
Moderat e
Moderat e
Client I dent it y Prot ect ion
No
No
Yes
Yes
No
WPA and WPA2
Wi- Fi Prot ect ed Access ( WPA) is a subset of t he I EEE 802.11i st andard. WPA2 ( I EEE 802.11i) is a
wireless securit y st andard t hat defines st ronger encrypt ion, aut hent icat ion and key m anagem ent
t han WPA.
Key differences bet ween WPA or WPA2 and WEP are im proved dat a encrypt ion and user
aut hent icat ion.
I f bot h an AP and t he wireless client s support WPA2 and you have an ext ernal RADI US server, use
WPA2 for st ronger dat a encrypt ion. I f you don't have an ext ernal RADI US server, you should use
WPA2- PSK ( WPA2- Pre- Shared Key) t hat only requires a single ( ident ical) password ent ered int o
each access point , wireless gat eway and wireless client . As long as t he passwords m at ch, a wireless
client will be grant ed access t o a WLAN.
I f t he AP or t he wireless client s do not support WPA2, j ust use WPA or WPA- PSK depending on
whet her you have an ext ernal RADI US server or not .
Select WEP only when t he AP and/ or wireless client s do not support WPA or WPA2. WEP is less
secure t han WPA or WPA2.
NWA1120 Series User’s Guide
195
Appendix E Wireless LANs
Encryption
WPA im proves dat a encrypt ion by using Tem poral Key I nt egrit y Prot ocol ( TKI P) , Message I nt egrit y
Check ( MI C) and I EEE 802.1x. WPA2 also uses TKI P when required for com pat ibilit y reasons, but
offers st ronger encrypt ion t han TKI P wit h Advanced Encrypt ion St andard ( AES) in t he Count er
m ode wit h Cipher block chaining Message aut hent icat ion code Prot ocol ( CCMP) .
TKI P uses 128- bit keys t hat are dynam ically generat ed and dist ribut ed by t he aut hent icat ion server.
AES ( Advanced Encrypt ion St andard) is a block cipher t hat uses a 256- bit m at hem at ical algorit hm
called Rij ndael. They bot h include a per- packet key m ixing funct ion, a Message I nt egrit y Check
( MI C) nam ed Michael, an ext ended init ializat ion vect or ( I V) wit h sequencing rules, and a re- keying
m echanism .
WPA and WPA2 regularly change and rot at e t he encrypt ion keys so t hat t he sam e encrypt ion key is
never used t wice.
The RADI US server dist ribut es a Pairwise Mast er Key ( PMK) key t o t he AP t hat t hen set s up a key
hierarchy and m anagem ent syst em , using t he PMK t o dynam ically generat e unique dat a encrypt ion
keys t o encrypt every dat a packet t hat is wirelessly com m unicat ed bet ween t he AP and t he wireless
client s. This all happens in t he background aut om at ically.
The Message I nt egrit y Check ( MI C) is designed t o prevent an at t acker from capt uring dat a packet s,
alt ering t hem and resending t hem . The MI C provides a st rong m at hem at ical funct ion in which t he
receiver and t he t ransm it t er each com put e and t hen com pare t he MI C. I f t hey do not m at ch, it is
assum ed t hat t he dat a has been t am pered wit h and t he packet is dropped.
By generat ing unique dat a encrypt ion keys for every dat a packet and by creat ing an int egrit y
checking m echanism ( MI C) , wit h TKI P and AES it is m ore difficult t o decrypt dat a on a Wi- Fi
net work t han WEP and difficult for an int ruder t o break int o t he net work.
The encrypt ion m echanism s used for WPA( 2) and WPA( 2) - PSK are t he sam e. The only difference
bet ween t he t wo is t hat WPA( 2) - PSK uses a sim ple com m on password, inst ead of user- specific
credent ials. The com m on- password approach m akes WPA( 2) - PSK suscept ible t o brut e- force
password- guessing at t acks but it ’s st ill an im provem ent over WEP as it em ploys a consist ent ,
single, alphanum eric password t o derive a PMK which is used t o generat e unique t em poral
encrypt ion keys. This prevent all wireless devices sharing t he sam e encrypt ion keys. ( a weakness of
WEP)
User Authentication
WPA and WPA2 apply I EEE 802.1x and Ext ensible Aut hent icat ion Prot ocol ( EAP) t o aut hent icat e
wireless client s using an ext ernal RADI US dat abase. WPA2 reduces t he num ber of key exchange
m essages from six t o four ( CCMP 4- way handshake) and short ens t he t im e required t o connect t o a
net work. Ot her WPA2 aut hent icat ion feat ures t hat are different from WPA include key caching and
pre- aut hent icat ion. These t wo feat ures are opt ional and m ay not be support ed in all wireless
devices.
Key caching allows a wireless client t o st ore t he PMK it derived t hrough a successful aut hent icat ion
wit h an AP. The wireless client uses t he PMK when it t ries t o connect t o t he sam e AP and does not
need t o go wit h t he aut hent icat ion process again.
Pre- aut hent icat ion enables fast roam ing by allowing t he wireless client ( already connect ing t o an
AP) t o perform I EEE 802.1x aut hent icat ion wit h anot her AP before connect ing t o it .
196
NWA1120 Series User’s Guide
Appendix E Wireless LANs
Wireless Client WPA Supplicants
A wireless client supplicant is t he soft ware t hat runs on an operat ing syst em inst ruct ing t he wireless
client how t o use WPA. At t he t im e of writ ing, t he m ost widely available supplicant is t he WPA pat ch
for Windows XP, Funk Soft ware's Odyssey client .
The Windows XP pat ch is a free download t hat adds WPA capabilit y t o Windows XP's built- in " Zero
Configurat ion" wireless client . However, you m ust run Windows XP t o use it .
WPA(2) with RADIUS Application Example
To set up WPA( 2) , you need t he I P address of t he RADI US server, it s port num ber ( default is 1812) ,
and t he RADI US shared secret . A WPA( 2) applicat ion exam ple wit h an ext ernal RADI US server
looks as follows. " A" is t he RADI US server. " DS" is t he dist ribut ion syst em .
The AP passes t he wireless client 's aut hent icat ion request t o t he RADI US server.
The RADI US server t hen checks t he user's ident ificat ion against it s dat abase and grant s or denies
net work access accordingly.
A 256- bit Pairwise Mast er Key ( PMK) is derived from t he aut hent icat ion process by t he RADI US
server and t he client .
The RADI US server dist ribut es t he PMK t o t he AP. The AP t hen set s up a key hierarchy and
m anagem ent syst em , using t he PMK t o dynam ically generat e unique dat a encrypt ion keys. The
keys are used t o encrypt every dat a packet t hat is wirelessly com m unicat ed bet ween t he AP and
t he wireless client s.
Figure 95 WPA( 2) wit h RADI US Applicat ion Exam ple
WPA(2)-PSK Application Example
A WPA( 2) - PSK applicat ion looks as follows.
NWA1120 Series User’s Guide
197
Appendix E Wireless LANs
First ent er ident ical passwords int o t he AP and all wireless client s. The Pre- Shared Key ( PSK) m ust
consist of bet ween 8 and 63 ASCI I charact ers or 64 hexadecim al charact ers ( including spaces and
sym bols) .
The AP checks each wireless client 's password and allows it t o j oin t he net work only if t he password
m at ches.
The AP and wireless client s generat e a com m on PMK ( Pairwise Mast er Key) . The key it self is not
sent over t he net work, but is derived from t he PSK and t he SSI D.
The AP and wireless client s use t he TKI P or AES encrypt ion process, t he PMK and inform at ion
exchanged in a handshake t o creat e t em poral encrypt ion keys. They use t hese keys t o encrypt dat a
exchanged bet ween t hem .
Figure 96 WPA( 2) - PSK Aut hent icat ion
Security Parameters Summary
Refer t o t his t able t o see what ot her securit y param et ers you should configure for each
aut hent icat ion m et hod or key m anagem ent prot ocol t ype. MAC address filt ers are not dependent on
how you configure t hese securit y feat ures.
Table 58 Wireless Securit y Relat ional Mat rix
AUTHENTICATION
ENCRYPTIO
METHOD/ KEY
MANAGEMENT PROTOCOL N METHOD
ENTER
MANUAL KEY
Open
No
None
IEEE 802.1X
Disable
Enable wit hout Dynam ic WEP Key
Open
Shared
198
WEP
WEP
No
Enable wit h Dynam ic WEP Key
Yes
Enable wit hout Dynam ic WEP Key
Yes
Disable
No
Enable wit h Dynam ic WEP Key
Yes
Enable wit hout Dynam ic WEP Key
Yes
Disable
WPA
TKI P/ AES
No
Enable
WPA- PSK
TKI P/ AES
Yes
Disable
NWA1120 Series User’s Guide
Appendix E Wireless LANs
Table 58 Wireless Securit y Relat ional Mat rix ( cont inued)
AUTHENTICATION
ENCRYPTIO
METHOD/ KEY
MANAGEMENT PROTOCOL N METHOD
ENTER
MANUAL KEY
IEEE 802.1X
WPA2
TKI P/ AES
No
Enable
WPA2- PSK
TKI P/ AES
Yes
Disable
Antenna Overview
An ant enna couples RF signals ont o air. A t ransm it t er wit hin a wireless device sends an RF signal t o
t he ant enna, which propagat es t he signal t hrough t he air. The ant enna also operat es in reverse by
capt uring RF signals from t he air.
Posit ioning t he ant ennas properly increases t he range and coverage area of a wireless LAN.
Antenna Characteristics
Frequency
An ant enna in t he frequency of 2.4GHz or 5GHz is needed t o com m unicat e efficient ly in a wireless
LAN
Radiation Pattern
A radiat ion pat t ern is a diagram t hat allows you t o visualize t he shape of t he ant enna’s coverage
area.
Antenna Gain
Ant enna gain, m easured in dB ( decibel) , is t he increase in coverage wit hin t he RF beam widt h.
Higher ant enna gain im proves t he range of t he signal for bet t er com m unicat ions.
For an indoor sit e, each 1 dB increase in ant enna gain result s in a range increase of approxim at ely
2.5% . For an unobst ruct ed out door sit e, each 1dB increase in gain result s in a range increase of
approxim at ely 5% . Act ual result s m ay vary depending on t he net work environm ent .
Ant enna gain is som et im es specified in dBi, which is how m uch t he ant enna increases t he signal
power com pared t o using an isot ropic ant enna. An isot ropic ant enna is a t heoret ical perfect ant enna
t hat sends out radio signals equally well in all direct ions. dBi represent s t he t rue gain t hat t he
ant enna provides.
Types of Antennas for WLAN
There are t wo t ypes of ant ennas used for wireless LAN applicat ions.
• Om ni- direct ional ant ennas send t he RF signal out in all direct ions on a horizont al plane. The
coverage area is t orus- shaped ( like a donut ) which m akes t hese ant ennas ideal for a room
environm ent . Wit h a wide coverage area, it is possible t o m ake circular overlapping coverage
areas wit h m ult iple access point s.
NWA1120 Series User’s Guide
199
Appendix E Wireless LANs
• Direct ional ant ennas concent rat e t he RF signal in a beam , like a flashlight does wit h t he light
from it s bulb. The angle of t he beam det erm ines t he widt h of t he coverage pat t ern. Angles
t ypically range from 20 degrees ( very direct ional) t o 120 degrees ( less direct ional) . Direct ional
ant ennas are ideal for hallways and out door point- t o- point applicat ions.
Positioning Antennas
I n general, ant ennas should be m ount ed as high as pract ically possible and free of obst ruct ions. I n
point- t o–point applicat ion, posit ion bot h ant ennas at t he sam e height and in a direct line of sight t o
each ot her t o at t ain t he best perform ance.
For om ni- direct ional ant ennas m ount ed on a t able, desk, and so on, point t he ant enna up. For
om ni- direct ional ant ennas m ount ed on a wall or ceiling, point t he ant enna down. For a single AP
applicat ion, place om ni- direct ional ant ennas as close t o t he cent er of t he coverage area as possible.
For direct ional ant ennas, point t he ant enna in t he direct ion of t he desired coverage area.
200
NWA1120 Series User’s Guide
A PPENDIX
Legal Information
Copyright
Copyright © 2012 by ZyXEL Com m unicat ions Cor porat ion.
The cont ent s of t his publicat ion m ay not be reproduced in any part or as a whole, t ranscribed, st ored in a ret rieval syst em , t ranslat ed int o
any language, or t ransm it t ed in any form or by any m eans, elect ronic, m echanical, m agnet ic, opt ical, chem ical, phot ocopying, m anual, or
ot herwise, wit hout t he prior writ t en perm ission of ZyXEL Com m unicat ions Corporat ion.
Published by ZyXEL Com m unicat ions Corporat ion. All right s reserved.
Disclaimers
ZyXEL does not assum e any liabilit y arising out of t he applicat ion or use of any product s, or soft ware described her ein. Neit her does it
convey any license under it s pat ent right s nor t he pat ent right s of ot hers. ZyXEL furt her reserves t he right t o m ake changes in any
product s described herein wit hout not ice. This publicat ion is subj ect t o change w it hout not ice.
Your use of t he NWA is subj ect t o t he t erm s and condit ions of any relat ed service provider s.
Trademarks
Tradem arks m ent ioned in t his publicat ion are used for ident ificat ion purposes only and m ay be pr opert ies of t heir respect ive owner s.
Certifications
Federal Communications Commission (FCC) Interference Statement
The device com plies wit h Part 15 of FCC rules. Operat ion is subj ect t o t he following t w o condit ions:
• This device m ay not cause harm ful int erference.
• This device m ust accept any int erfer ence received, including int erference t hat m ay cause undesired operat ions.
This device has been t est ed and found t o com ply wit h t he lim it s for a Class B digit al device pursuant t o Part 15 of t he FCC Rules. These
lim it s are designed t o provide reasonable prot ect ion against harm ful int erfer ence in a resident ial inst allat ion. This device generat es, uses,
and can radiat e radio frequency ener gy, and if not inst alled and used in accordance wit h t he inst ruct ions, m ay cause harm ful int erference
t o radio com m unicat ions. However, t her e is no guarant ee t hat int erference will not occur in a part icular inst allat ion.
I f t his device does cause harm ful int erference t o radio/ t elevision recept ion, w hich can be det erm ined by t urning t he device off and on, t he
user is encouraged t o t r y t o correct t he int erference by one or m ore of t he following m easures:
Reor ient or relocat e t he receiving ant enna.
I ncrease t he separat ion bet ween t he equipm ent and t he receiver.
Connect t he equipm ent int o an out let on a circuit different from t hat t o w hich t he receiver is connect ed.
Consult t he dealer or an experienced radio/ TV t echnician for help.
FCC Caut ion: Any changes or m odificat ions not expressly approved by t he part y responsible for com pliance could void t he user's aut horit y
t o operat e t his equipm ent .
FCC Radiation Exposure Statement
•
•
•
•
This t ransm it t er m ust not be co- locat ed or operat ing in conj unct ion w it h any ot her ant enna or t ransm it t er.
For operat ion wit hin 5.15 ~ 5.25GHz frequency range, it is rest rict ed t o indoor environm ent .
I EEE 802.11b, 802.11g or 802.11n ( 20MHz) operat ion of t his product in t he U.S.A. is firm ware- lim it ed t o channels 1 t hrough 11. I EEE
802.11n ( 40MHz) operat ion of t his product in t he U.S.A. is fir m ware- lim it ed t o channels 3 t hrough 9.
22 cm m ust be m aint ained bet w een t he
To com ply wit h FCC RF exposure com pliance requirem ent s, a separat ion dist ance of at least 20
ant enna of t his device and all persons.
Industry Canada Statement
This device com plies wit h RSS- 210 of t he I ndust ry Canada Rules. Operat ion is subj ect t o t he following t w o condit ions:
1) t his device m ay not cause int erference and
2) t his device m ust accept any int erference, including int erference t hat m ay cause undesired operat ion of t he device
This device has been designed t o operat e w it h an ant enna having a m axim um gain of 3dBi.
Ant enna having a higher gain is st rict ly prohibit ed per regulat ions of I ndust ry Canada. The required ant enna im pedance is 50 ohm s.
To reduce pot ent ial radio int erference t o ot her users, t he ant enna t ype and it s gain should be so chosen t hat t he EI RP is not m ore t han
required for successful com m unicat ion.
NWA1120 Series User’s Guide
201
Appendix F Legal Information
IC Radiation Exposure Statement
This equipm ent com plies wit h I C radiat ion exposure lim it s set fort h for an uncont r olled environm ent . End users m ust follow t he specific
operat ing inst ruct ions for sat isfying RF exposure com pliance.
注意 !
依據 低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司
者均不得擅自變更頻率 加大功率或變更原設計之特性及功能
商號或使用
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現
有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用
前項合法通信,指依電信規定作業之無線電信 低功率射頻電機須忍
受合法通信或工業 科學及醫療用電波輻射性電機設備之干擾
本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用
減少電磁波影響,請妥適使用
在 5.25-5.35 (GHz) 頻帶內操作之無線資訊傳輸設備,限於室內使用
Notices
Changes or m odificat ions not expressly approved by t he part y responsible for com pliance could void t he user's aut horit y t o operat e t he
equipm ent .
This Class B digit al apparat us com plies w it h Canadian I CES- 003.
Cet appareil num érique de la classe B est conform e à la norm e NMB- 003 du Canada.
ErP (Energy-related Products) Declaration of Conformity
All ZyXEL product s put on t he EU m arket in com pliance wit h t he requir em ent of t he European Parliam ent and t he Council published
Direct ive 2009/ 125/ EC est ablishing a fram ework for t he set t ing of ecodesign requirem ent s for ener gy- relat ed product s ( r ecast ) , so called
as " ErP Dir ect ive ( Energy- relat ed Product s direct ive) .
This product has been out side t he scope of Energy efficiency lim it at ion requirem ent in t he light of t he t erm s of Regulat ion ( EC) No 1275/
2008, Annex I I :
2. Four years aft er t his Regulat ion has com e int o force:
( c) Availabilit y of off m ode and/ or st andby m ode
Equipm ent shall, except where t his is inappropr iat e for t he int ended use, provide off m ode and/ or st andby m ode, and/ or anot her
condit ion which does not exceed t he applicable power consum pt ion requirem ent s for off m ode and/ or st andby m ode when t he equipm ent
is connect ed t o t he m ains power source.
( d) Power m anagem ent
- anot her condit ion which does not exceed t he applicable pow er consum pt ion r equirem ent s for off m ode and/ or st andby m ode when t he
equipm ent is connect ed t o t he m ains power source. The power anagem ent funct ion shall be act ivat ed before delivery.
4. I nform at ion t o be provided by m anufact urers:
( c) t he charact erist ics of equipm ent relevant for assessing confor m it y w it h t he requirem ent s set out in point 1( c) , or t he requirem ent s set
out in point s 2( c) and/ or 2( d) , as applicable, including t he t im e t aken t o aut om at ically reach st andby, or off m ode, or anot her condit ion
which does not exceed t he applicable pow er consum pt ion requirem ent s for off m ode and/ or st andby m ode.
I n part icular, if applicable, t he t echnical j ust ificat ion shall be provided t hat t he requirem ent s set out in point 1( c) , or t he requirem ent s set
out in point s 2( c) and/ or 2( d) , are inappropriat e for t he int ended use of equipm ent .
EU Direct ive & Regulat ion:
ErP Dir ect ive: Direct ive 2009/ 125/ EC
St andby & off m ode: Regulat ion ( EC) No 1275/ 2008,
Guidance accom panying Com m ission Regulat ion ( EC) No 1275/ 2008,
source: ht t p: / / ec.europa.eu/ energy/ efficiency/ ecodesign/ eco_design_en.ht m
Viewing Certifications
Go t o ht t p: / / www.zyxel.com t o view t his product ’s docum ent at ion and cert ificat ions.
ZyXEL Limited Warranty
ZyXEL warrant s t o t he original end user ( pur chaser) t hat t his product is free from any defect s in m at erial or workm anship for a specific
period ( t he War rant y Period) from t he dat e of pur chase. The War rant y Period varies by region. Check w it h your vendor and/ or t he
aut horized ZyXEL local dist ribut or for det ails about t he Warrant y Period of t his product . During t he warrant y period, and upon proof of
purchase, should t he pr oduct have indicat ions of failure due t o fault y w orkm anship and/ or m at erials, ZyXEL will, at it s discretion, repair or
replace t he defect ive product s or com ponent s wit hout charge for eit her part s or labor, and t o what ever ext ent it shall deem necessar y t o
rest ore t he product or com ponent s t o pr oper operat ing condit ion. Any replacem ent will consist of a new or re- m anufact ured funct ionally
equivalent product of equal or higher value, and will be solely at t he discret ion of ZyXEL. This warrant y shall not apply if t he pr oduct has
been m odified, m isused, t am per ed w it h, dam aged by an act of God, or subj ect ed t o abnor m al w or king condit ions.
Note
Repair or replacem ent , as provided under t his warrant y, is t he exclusive rem edy of t he purchaser. This warrant y is in lieu of all ot her
warrant ies, expr ess or im plied, including any im plied warrant y of m erchant abilit y or fit ness for a part icular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequent ial dam ages of any kind t o t he purchaser.
To obt ain t he services of t his warrant y, cont act your vendor. You m ay also refer t o t he war rant y policy for t he region in which you bought
t he device at ht t p: / / w ww.zyxel.com / web/ support _warrant y_info.php.
Registration
Regist er your product online t o receive e- m ail not ices of firm ware upgrades and inform at ion at www.zyxel.com .
202
NWA1120 Series User’s Guide
Appendix F Legal Information
Open Source Licenses
This product cont ains in part som e free soft ware dist ribut ed under GPL license t erm s and/ or GPL like licenses. Open source licenses are
provided wit h t he firm ware package. You can download t he lat est firm ware at w ww.zyxel.com . To obt ain t he source code covered under
t hose Licenses, please cont act support @zyxel.com .t w t o get it .
Regulatory Information
European Union
The following inform at ion applies if you use t he product wit hin t he European Union.
Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive)
Com pliance I nform at ion for 2.4GHz and 5GHz Wireless Product s Relevant t o t he EU and Ot her Count ries Following the EU Directive 1999/5/EC
(R&TTE Directive)
[ Czech]
ZyXEL t ím t o prohlašuj e, že t ent o zařízení j e ve shodě se základním i požadavky a dalším i příslušným i ust anovením i
sm ěrnice 1999/ 5/ EC.
[ Danish]
Undert egnede ZyXEL erklærer herved, at følgende udst yr udst yr overholder de væsent lige krav og øvrige relevant e
krav i direkt iv 1999/ 5/ EF.
[ Germ an]
Hierm it erklärt ZyXEL, dass sich das Gerät Ausst at t ung in Über einst im m ung m it den grundlegenden Anforderungen
und den übrigen einschlägigen Best im m ungen der Richt linie 1999/ 5/ EU befindet .
[ Est onian]
Käesolevaga kinnit ab ZyXEL seadm e seadm ed vast avust direkt iivi 1999/ 5/ EÜ põhinõuet ele j a nim et at ud direkt iivist
t ulenevat ele t eist ele asj akohast ele sät et ele.
English
Hereby, ZyXEL declares t hat t his equipm ent is in com pliance w it h t he essent ial requir em ent s and ot her relevant
provisions of Direct ive 1999/ 5/ EC.
[ Spanish]
Por m edio de la present e ZyXEL declara que el equipo cum ple con los requisit os esenciales y cualesquiera ot ras
disposiciones aplicables o exigibles de la Direct iva 1999/ 5/ CE.
Η
[ Greek]
Α
Χ
Α ZyXEL Η Ω
Α Α
Η
ε π ισ ός
ΗΓ Α 1999/ 5/ C.
ΦΩ
Α
Ω
Α Α
Η
Α
[ French]
Par la présent e ZyXEL déclare que l'appareil équipem ent s est conform e aux exigences essent ielles et aux aut res
disposit ions pert inent es de la direct ive 1999/ 5/ EC.
[ I t alian]
Con la present e ZyXEL dichiara che quest o at t rezzat ura è conform e ai requisit i essenziali ed alle alt re disposizioni
pert inent i st abilit e dalla diret t iva 1999/ 5/ CE.
[ Lat vian]
Ar šo ZyXEL deklarē, ka iekārt as at bilst Direkt īvas 1999/ 5/ EK būt iskaj ām prasībām un cit iem ar t o saist īt aj iem
not eikum iem .
[ Lit huanian]
Šiuo ZyXEL deklaruoj a, kad šis įranga at it inka esm inius reikalavim us ir kit as 1999/ 5/ EB Direkt yvos nuost at as.
[ Dut ch]
Hierbij verklaart ZyXEL dat het t oest el uit rust ing in overeenst em m ing is m et de essent iële eisen en de andere
relevant e bepalingen van richt lij n 1999/ 5/ EC.
[ Malt ese]
Haw nhekk, ZyXEL, j iddikj ara li dan t agħm ir j ikkonform a m al- ħt iġij iet essenzj ali u m a provvedim ent i oħraj n relevant i li
hem m fid- Dirret t iva 1999/ 5/ EC.
[ Hungarian]
Alulírot t , ZyXEL nyilat kozom , hogy a ber endezés m egfelel a vonat kozó alapvet õ követ elm ényeknek és az 1999/ 5/ EK
irányelv egyéb elõírásainak.
[ Polish]
Niniej szym ZyXEL oświadcza, że sprzęt j est zgodny z zasadniczym i wym ogam i oraz pozost ałym i st osow nym i
post anow ieniam i Dyrekt ywy 1999/ 5/ EC.
[ Port uguese]
ZyXEL declara que est e equipam ent o est á conform e com os requisit os essenciais e out ras disposições da Direct iva
1999/ 5/ EC.
[ Slovenian]
ZyXEL izj avlj a, da j e t a oprem a v skladu z bist venim i zaht evam i in ost alim i relevant nim i določili dir ekt ive 1999/ 5/ EC.
[ Slovak]
ZyXEL t ým t o vyhlasuj e, že zariadenia spĺňa základné požiadavky a všet ky príslušné ust anovenia Sm ernice 1999/ 5/ EC.
[ Finnish]
ZyXEL vakuut t aa t ät en et t ä lait t eet t yyppinen lait e on direkt iivin 1999/ 5/ EY oleellist en vaat im ust en j a sit ä koskevien
direkt iivin m uiden eht oj en m ukainen.
[ Sw edish]
Härm ed int ygar ZyXEL at t denna ut rust ning st år I överensst äm m else m ed de väsent liga egenskapskrav och övriga
relevant a best äm m elser som fram går av direkt iv 1999/ 5/ EC.
[ Bulgarian]
С
[ I celandic]
Hér m eð lýsir, ZyXEL því yfir að þessi búnaður er í sam ræm i við grunnkröfur og önnur viðeigandi ákvæði t ilskipunar
1999/ 5/ EC.
[ Norw egian]
Erklærer herved ZyXEL at det t e ut st yret er I sam svar m ed de grunnleggende kravene og andre relevant e
best em m elser I dir ekt iv 1999/ 5/ EF.
[ Rom anian]
Prin pr ezent a, ZyXEL declară că acest echipam ent est e în conform it at e cu cerinţele esenţiale şi alt e pr evederi
relevant e ale Dir ect ivei 1999/ 5/ EC.
NWA1120 Series User’s Guide
я
ZyXEL
, ч
я
1999/ 5/ C.
203
Appendix F Legal Information
National Restrictions
This pr oduct m ay be used in all EU count ries ( and ot her count ries following t he EU direct ive 1999/ 5/ EC) wit hout any lim it at ion except for
t he count ries m ent ioned below :
Ce produit peut êt re ut ilisé dans t ous les pays de l’UE ( et dans t ous les pays ayant t ransposés la direct ive 1999/ 5/ CE) sans aucune
lim it at ion, except é pour les pays m ent ionnés ci- dessous:
Quest o prodot t o è ut ilizzabile in t ut t e i paesi EU ( ed in t ut t i gli alt ri paesi che seguono le diret t ive EU 1999/ 5/ EC) senza nessuna
lim it azione, eccet t o per i paesii m enzionat i di seguit o:
Das Produkt kann in allen EU St aat en ohne Einschränkungen eingeset zt werden ( sowie in anderen St aat en die der EU Dir ekt ive 1995/ 5/ CE
folgen) m it Außnahm e der folgenden aufgeführt en St aat en:
I n t he m aj orit y of t he EU and ot her European count ries, t he 2, 4- and 5- GHz bands have been m ade available for t he use of wireless local
area net works ( LANs) . Lat er in t his docum ent you will find an overview of count ries inw hich addit ional rest rict ions or requirem ent s or bot h
are applicable.
The requirem ent s for any count ry m ay evolve. ZyXEL r ecom m ends t hat you check wit h t he local aut horit ies for t he lat est st at us of t heir
nat ional regulat ions for bot h t he 2,4- and 5- GHz wireless LANs.
The following count ries have rest rict ions and/ or requirem ent s in addit ion t o t hose given in t he t able labeled “ Overview of Regulat ory
Requirem ent s for Wireless LANs” : .
Overview of Regulat ory Requirem ent s for Wireless LANs
Frequency Band ( MHz)
Max Power Level
( EI RP) 1 ( m W)
2400- 2483.5
100
5150- 5350
200
5470- 5725
1000
I ndoor ONLY
I ndoor and Out door
Belgium
The Belgian I nst it ut e for Post al Services and Telecom m unicat ions ( BI PT) m ust be not ified of any out door wireless link having a range
exceeding 300 m et ers. Please check ht t p: / / w ww.bipt .be for m ore det ails.
Draadloze verbindingen voor buit engebruik en m et een reikw ij dt e van m eer dan 300 m et er dienen aangem eld t e w or den bij het Belgisch
I nst it uut voor post dienst en en t elecom m unicat ie ( BI PT) . Zie ht t p: / / ww w.bipt .be voor m eer gegevens.
Les liaisons sans fil pour une ut ilisat ion en ext érieur d’une dist ance supérieure à 300 m èt res doivent êt re not ifiées à l’I nst it ut Belge des
services Post aux et des Télécom m unicat ions ( I BPT) . Visit ez ht t p: / / ww w.ibpt .be pour de plus am ples dét ails.
Denm ark
I n Denm ark, t he band 5150 - 5350 MHz is also allowed for out door usage.
I Danm ark m å frekvensbåndet 5150 - 5350 også anvendes udendørs.
I t aly
This product m eet s t he Nat ional Radio I nt erface and t he requirem ent s specified in t he Nat ional Frequency Allocat ion Table for I t aly. Unless
t his wireless LAN pr oduct is operat ing w it hin t he boundaries of t he ow ner's propert y, it s use r equir es a “ general aut hor izat ion.” Please
check ht t p: / / w ww.sviluppoeconom ico.gov.it / for m ore det ails.
Quest o prodot t o è conform e alla specifiche di I nt erfaccia Radio Nazionali e rispet t a il Piano Nazionale di ripart izione delle frequenze in
I t alia. Se non viene inst allat o all 'int erno del proprio fondo, l'ut ilizzo di prodot t i Wireless LAN richiede una “Aut orizzazione Generale”.
Consult are ht t p: / / ww w.sviluppoeconom ico.gov.it / per m aggiori det t agli.
Lat via
The out door usage of t he 2.4 GHz band requires an aut hor izat ion from t he Elect ronic Com m unicat ions Office. Please check ht t p: / /
ww w.esd.lv for m or e det ails.
2.4 GHz frekvenèu joslas izmantoðanai ârpus telpâm nepiecieðama atïauja no Elektronisko sakaru direkcijas. Vairâk informâcijas: http://www.esd.lv.
Not es:
1. Alt hough Norway, Sw it zer land and Liecht enst ein are not EU m em ber st at es, t he EU Direct ive 1999/ 5/ EC has also been im plem ent ed in
t hose count ries.
2. The regulat or y lim it s for m axim um out put pow er are specified in EI RP. The EI RP level ( in dBm ) of a device can be calculat ed by adding
t he gain of t he ant enna used( specified in dBi) t o t he out put pow er available at t he connect or ( specified in dBm ) .
204
NWA1120 Series User’s Guide
Appendix F Legal Information
List of national codes
COUNTRY
ISO 3166 2 LETTER CODE
COUNTRY
ISO 3166 2 LETTER CODE
Aust ria
AT
Malt a
MT
Belgium
BE
Net herlands
NL
Cyprus
CY
Poland
PL
Czech Republic
CR
Port ugal
PT
Denm ark
DK
Slovakia
SK
Est onia
EE
Slovenia
SI
Finland
FI
Spain
ES
France
FR
Sweden
SE
Germ any
DE
Unit ed Kingdom
GB
Greece
GR
I celand
IS
Hungary
HU
Liecht enst ein
LI
NO
I reland
IE
Nor way
I t aly
IT
Swit zerland
CH
Lat via
LV
Bulgaria
BG
Lit huania
LT
Rom ania
RO
Luxem bourg
LU
Turkey
TR
Safety Warnings
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Do NOT use t his product near wat er, for exam ple, in a wet basem ent or near a swim m ing pool.
Do NOT expose your device t o dam pness, dust or corrosive liquids.
Do NOT st ore t hings on t he device.
Do NOT inst all, use, or ser vice t his device during a t hunderst orm . There is a r em ot e risk of elect ric shock from light ning.
Connect ONLY suit able accessories t o t he device.
Do NOT open t he device or unit . Opening or rem oving covers can expose you t o dangerous high volt age point s or ot her risks. ONLY
qualified service personnel should service or disassem ble t his device. Please cont act your vendor for furt her inform at ion.
Make sure t o connect t he cables t o t he correct port s.
Place connect ing cables carefully so t hat no one will st ep on t hem or st um ble over t hem .
Always disconnect all cables from t his device befor e servicing or disassem bling.
Use ONLY an appr opriat e power adapt or or cord for your device. Connect it t o t he right supply volt age ( for exam ple, 110V AC in Nort h
Am er ica or 230V AC in Europe) .
Do NOT allow anyt hing t o rest on t he power adapt or or cord and do NOT place t he product where anyone can walk on t he power
adapt or or cord.
Do NOT use t he device if t he power adapt or or cor d is dam aged as it m ight cause elect rocut ion.
I f t he power adapt or or cord is dam aged, rem ove it fr om t he device and t he pow er source.
Do NOT at t em pt t o repair t he power adapt or or cord. Cont act your local vendor t o order a new one.
Do not use t he device out side, and m ake sure all t he connect ions are indoors. There is a rem ot e risk of elect ric shock from light ning.
Do NOT obst ruct t he device vent ilat ion slot s, as insufficient airflow m ay harm your device.
Ant enna Warning! This device m eet s ETSI and FCC cert ificat ion requirem ent s when using t he included ant enna( s) . Only use t he
included ant enna( s) .
I f you wall m ount your device, m ake sure t hat no elect rical lines, gas or wat er pipes w ill be dam aged.
The PoE ( Pow er over Et her net ) devices t hat supply or receive pow er and t heir connect ed Et hernet cables m ust all be com plet ely
indoor s.
This product is for indoor use only ( ut ilisat ion int érieure exclusivem ent ) .
FOR COUNTRY CODE SELECTI ON USAGE ( WLAN DEVI CES)
Not e: The count ry code select ion is for non- US m odel only and is not available t o all US m odel. Per FCC regulat ion, all Wi- Fi product
m arket ed in US m ust fixed t o US operat ion channels only.
Your product is m arked w it h t his sym bol, which is known as t he WEEE m ark. WEEE st ands for Wast e Elect ronics and Elect r ical
Equipm ent . I t m eans t hat used elect rical and elect ronic product s should not be m ixed w it h general wast e. Used elect rical and
elect ronic equipm ent should be t reat ed separat ely.
NWA1120 Series User’s Guide
205
Appendix F Legal Information
RoHS
ENGLISH
DEUTSCH
ESPAÑOL
FRANÇAIS
Green Product Declaration
Grünes Produkt Erklärung
Declaración de Producto Ecológico
Déclaration de Produit Vert
RoHS Directive 2011/65/EU
RoHS Richtlinie 2011/65/EU
Directiva RoHS 2011/65/UE
Directive RoHS 2011/65/UE
WEEE Directive 2002/96/EC
(WEEE: Waste Electrical and Electronic
Equipment)
2003/108/EC;2008/34/EC
ElektroG Richtlinie 2002/96/EG
(ElektroG: Über Elektro- und
Elektronik-Altgeräte)
2003/108/EG;2008/34/EG
Directiva RAEE 2002/96/CE
(RAEE : Residuos de Aparatos
Eléctricos y Electrónicos)
2003/108/CE;2008/34/CE
Directive DEEE 2002/96/CE
(DEEE : déchets d'équipements
électriques et électroniques)
2003/108/CE;2008/34/CE
Unterschrift des Erklärenden:
Name/Title: Thomas Wei / Quality Management
Department/ Senior Director.
Date (yyyy/mm/dd): 2012/07/09
Firma de declaración:
Nombre/Título: Thomas Wei / Quality Management
Department/ Senior Director.
Fecha (aaaa/mm/dd): 2012/07/09
Signature de la déclaration :
Nom/Titre : Thomas Wei / Quality Management
Department/ Senior Director.
Date (aaaa/mm/jj) : 2012/07/09
Declaration Signature:
Name/Title: Thomas Wei / Quality Management
Department/ Senior Director.
Date (yyyy/mm/dd): 2012/07/09
ITALIANO
Prodotto dichiarazione di verde
206
NEDERLANDS
SVENSKA
Productmilieuverklaring
Miljödeklaration
Direttiva RoHS 2011/65/UE
RoHS Richtlijn 2011/65/EU
RoHS Direktiv 2011/65/EU
Direttiva RAEE 2002/96/CE
(RAEE: Rifiuti di Apparecchiature
Elettriche ed Elettroniche)
2003/108/CE;2008/34/CE
AEEA-Richtlijn 2002/96/EG
(AEEA: Afgedankte Elektrische en
Elektronische apparatuur)
2003/108/EG;2008/34/EG
WEEE Direktiv 2002/96/EG
(WEEE: om avfall som utgörs av eller
innehåller elektriska eller elektroniska
produkter)
2003/108/EG;2008/34/EG
Firma dichiarazione:
Nome/titolo: Thomas Wei / Quality Management
Department/ Senior Director.
Data (aaaa/mm/gg): 2012/07/09
Verklaringshandtekening:
Naam/titel: Thomas Wei / Quality Management
Department/ Senior Director.
Datum(jjjj/mm/dd): 2012/07/09
Deklaration undertecknad av:
Namn/Titel: Thomas Wei / Quality Management
Department/ Senior Director.
Datum (åååå/mm/dd): 2012/07/09
NWA1120 Series User’s Guide
Index
Index
access privileges 13
Account ing Server 84
aut hent icat ion 100
file form at 100
Cert ificat e Aut horit y
See CA.
Alert s 112
Cert ificat es
Fingerprint 109
MD5 109
public key 100
SHA1 109
Alt ernat ive subnet m ask not at ion 172
Cert ificat ion Aut horit y 108
Ant enna 89
cert ificat ions 201
not ices 202
viewing 202
Advanced Encrypt ion St andard
See AES.
AES 196
ant enna
direct ional 200
gain 199
om ni- direct ional 199
AP ( access point ) 189
Applicat ions
Access Point 15
AP + Bridge 15
applicat ions
MBSSI D 12
Repeat er 15
ATC 76
Channel 57
channel 189
int erference 189
Cont rolling net work access, Ways of 11
copyright 201
CTS ( Clear t o Send) 190
ATC+ WMM 76
disclaim er 201
Dist ribut ion Syst em 56
Basic Service Set 56
see BSS
DNS 94, 115
docum ent at ion
relat ed 2
Dom ain Nam e Server ( DNS) 115
Basic Service Set , See BSS 187
DS 56
beacon 56
DTI M I nt erval 63, 66, 72
Beacon I nt erval 63, 66, 72
dynam ic WEP key exchange 195
BSS 12, 13, 56, 187
EAP 59
CA 194
EAP Aut hent icat ion 193
Cert ificat e
Encrypt ion 59, 78, 81
encrypt ion 15, 196
NWA1120 Series User’s Guide
207
Index
ESS 56, 188
Et hernet device 86
I nt ernet Assigned Num bers Aut horit y
See I ANA
Ext ended Service Set 56
I nt ernet Prot ocol version 6, see I Pv6
Ext ended Service Set , See ESS 188
I nt ernet t elephony 13
Ext ensible Aut hent icat ion Prot ocol 59
I P Address 91
Gat eway I P address 91
Fact ory Default s 121
rest oring 21
FCC int erference st at em ent 201
Firm ware 116
Fragm ent at ion 63, 67, 69, 73
Fragm ent at ion t hreshold 89
fragm ent at ion t hreshold 190
FTP 99
rest rict ions 99
Generic Token Card 59
GTC 59
Guide
Quick St art 2
I P Screen 91
DHCP 93
I Pv6 92, 177
addressing 92, 177
EUI - 64 179
global address 92, 178
int erface I D 179
link- local address 92, 177
Neighbor Discovery Prot ocol 92, 177
ping 92, 177
prefix 92, 177
prefix lengt h 92, 177
st at eless aut oconfigurat ion 179
unspecified address 178
key 59, 79
layer- 2 isolat ion 84
exam ple 84
MAC address 85
hidden node 189
LEAP 59
LEDs 18, 123
Blinking 18
Flashing 18
Off 18
I ANA 176
Light weight Ext ensible Aut hent icat ion Prot ocol 59
I BSS 187
Log 49
I EEE 802.11g 191
Log Screens 111
I EEE 802.1x 57
Logs
accessing logs 111
receiving logs via e- m ail 112
I m port Cert ificat e 102
I ndependent Basic Service Set
See I BSS 187
init ializat ion vect or ( I V) 196
208
Logs Screen
Mail Server 113
Mail Subj ect 113
NWA1120 Series User’s Guide
Index
Send Log t o 113
Syslog 114
Logs, Uses of 111
Passphrase 59
Password 124
PEAP 59
Personal I nform at ion Exchange Synt ax
St andard 100
PFX PKCS# 12 100
MAC Filt er
Allow Associat ion 87
Deny Associat ion 87
pream ble m ode 191
Maint enance 115
Associat ion List 116
Backup 120
Rest ore 120
Managem ent I nform at ion Base ( MI B) 108
m anaging t he device
good habit s 17
MBSSI D 12
Media Access Cont rol 86
Message I nt egrit y Check ( MI C) 196
m essage relay 60
Pream ble 89
Pream ble Type 63, 67, 69, 73
Pre- Shared Key 59
priorit ies 90
product regist rat ion 202
Prot ect ed Ext ensible Aut hent icat ion Prot ocol 59
PSK 59, 196
QoS 76
Quick St art Guide 2
Microsoft Challenge Handshake Aut hent icat ion
Prot ocol Version 2 59
MSCHAPv2 59
MSDU 63, 67, 73
Radio Frequency 89
NAT 176
Net work Tim e Prot ocol ( NTP) 115
NTP 115
Operat ing Mode 56
ot her docum ent at ion 2
Out put Power Managem ent 63, 67, 69, 72
Pairwise Mast er Key ( PMK) 196, 198
NWA1120 Series User’s Guide
RADI US 59, 193
Account ing 60
Aut hent icat ion 60
Aut horizat ion 60
m essage t ypes 193
m essages 193
shared secret key 193
RADI US Screen
Account ing Server 84
Account ing Server I P Address 84
RADI US server 58
Backup 84
Prim ary 83
Rat es Configurat ion 63, 67, 70, 73
regist rat ion
product 202
relat ed docum ent at ion 2
Rem ot e Aut hent icat ion Dial I n User Service 59
rem ot e m anagem ent 17
rem ot e m anagem ent lim it at ions 98
209
Index
Roam ing 89
General 116
Password 117
Tim e
Tim e and Dat e Set up 118
Tim e Zone 118
Root AP 15
RTS ( Request To Send) 190
t hreshold 189, 190
RTS/ CTS Threshold 63, 67, 69, 73, 89
Securit y Mode, Choosing t he 90
Securit y Modes
None 58
WEP 58
WPA 58
WPA2 58
WPA2- MI X 58
WPA2- PSK 58
t elnet 102
Tem poral Key I nt egrit y Prot ocol 59
Tem poral Key I nt egrit y Prot ocol ( TKI P) 196
TFTP rest rict ions 99
Thum bprint Algorit hm 109
TKI P 59
TLS 59
Service Set I Dent ifier 56
Service Set I dent ifier
see SSI D
Sim ple Mail Transfer Prot ocol 112
SMTP 112, 114
SNMP
MI Bs 108
Spanning Tree Prot ocol 89
SSI D 12, 56
SSI D profile
pre- configured 13
t radem arks 201
Transport Layer Securit y 59
Troubleshoot ing 123
connect ion is slow or int erm it t ent 126
DHCP 124
fact ory default s 125
firm ware 125
I nt ernet 125
LAN/ ETHERNET port 125
QoS 126
Web Configurat or 124
TTLS 59
SSI D profiles 12
Tunneled Transport Layer Securit y 59
St at us Screens 25
802.11 Mode 50
Channel I D 50
Et hernet 25
FCS Error Count
Firm ware Version
I nt erface St at us
Poll I nt erval 50
Ret ry Count 50
St at ist ics 51
syst em st at ist ics
WLAN 25
Tut orial 29
50
27
28
25
Subnet 169
User Aut hent icat ion 58
Virt ual Local Area Net work 95
Subnet Mask 91, 170
VLAN 95
int roduct ion 95
subnet t ing 172
VoI P 13, 76
Syslog Logging 112
Syst em Screens
210
NWA1120 Series User’s Guide
Index
WMM QoS 89
warrant y 202
not e 202
WLAN
int erference 189
securit y param et ers 198
WDS 15
WMM 76
Web Configurat or 19
password 19
WMM QoS 89
WEP 58
WEP key encrypt ing 90
Wi- Fi Mult im edia QoS 89
Wi- Fi Prot ect ed Access 58, 195
Wired Equivalent Privacy 58
Wireless Client 42
wireless client WPA supplicant s 197
Wireless Dist ribut ion Syst em ( WDS) 15
Wireless Mode 57
Wireless Mode, Choosing t he
Access Point 29
Bridge 29
Wireless Client 29
Wireless Securit y 17
how t o im prove 17
Levels 58
wireless securit y 13, 192
Wireless Securit y Screen
WEP 78
WPA 79
Access Point 79
Wireless Client 80
WPA- PSK, WPA2- PSK, WPA2- PSK- MI X 81
Wireless Set t ings Screen 55
Access Point Mode 61
Ant enna 89
AP + Bridge Mode 68
Bridge Mode 65
BSS 56
Channel 57
ESS 56
Fragm ent at ion Threshold 89
I nt ra- BSS Traffic 89
Operat ing Mode 56
Pream ble 89
Roam ing 89
RTS/ CTS Threshold 89
SSI D 56
Wireless Client Mode 68
Wireless Mode 57
NWA1120 Series User’s Guide
WPA 58, 195
key caching 196
pre- aut hent icat ion 196
user aut hent icat ion 196
vs WPA- PSK 196
wireless client supplicant 197
wit h RADI US applicat ion exam ple 197
WPA2 58, 195
user aut hent icat ion 196
vs WPA2- PSK 196
wireless client supplicant 197
wit h RADI US applicat ion exam ple 197
WPA2- MI X 58
WPA2- Pre- Shared Key 195
WPA2- PSK 195, 196
applicat ion exam ple 197
WPA2- PSK- MI X 58
WPA- PSK 195, 196
applicat ion exam ple 197
ZyXEL Device
Et hernet param et ers 91
good habit s 17
I nt roduct ion 11
m anaging 16
reset t ing 20, 121
Securit y Feat ures 17
211
Index
212
NWA1120 Series User’s Guide

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.7
Linearized                      : No
Warning                         : Unsupported PNG filter 0
EXIF Metadata provided by EXIF.tools
FCC ID Filing: I88NWA1123-NI

Navigation menu