ZyXEL Communications NWA 1121-NI User Manual

ZyXEL Communications NWA 1121-NI User Manual

802.11b/g/n poe access point
Hide thumbs Also See for NWA 1121-NI:
Table of Contents

Advertisement

NWA1121-NI
802.11b/g/n PoE Access Point
Default Login Details
IP Address
http://192.168.1.2
User Name
Password
Version 1.00
Edition 1, 03/2012
www.zyxel.com
www.zyxel.com
admin
1234
IMPORTANT!
READ CAREFULLY
BEFORE USE.
KEEP THIS GUIDE
FOR FUTURE
REFERENCE.
Copyright © 2012
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NWA 1121-NI

  • Page 1 NWA1121-NI 802.11b/g/n PoE Access Point Default Login Details IMPORTANT! IP Address http://192.168.1.2 READ CAREFULLY User Name admin BEFORE USE. Password 1234 KEEP THIS GUIDE FOR FUTURE REFERENCE. Version 1.00 Edition 1, 03/2012 www.zyxel.com www.zyxel.com Copyright © 2012 ZyXEL Communications Corporation...
  • Page 2 IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate.
  • Page 3: Table Of Contents

    Contents Overview Contents Overview User’s Guide ............................9 Introducing the NWA1121-NI ........................11 Introducing the Web Configurator ......................19 Dashboard ...............................25 Tutorial ..............................29 Technical Reference ..........................47 Monitor ..............................49 Wireless LAN ............................55 LAN .................................94 VLAN ...............................98 System ..............................101 Log Settings ............................115 Maintenance ............................119 Troubleshooting ............................127 NWA1121-NI User’s Guide...
  • Page 4 Contents Overview NWA1121-NI User’s Guide...
  • Page 5: Table Of Contents

    Table of Contents Table of Contents Contents Overview ..........................3 Table of Contents ..........................5 Part I: User’s Guide ................... 9 Chapter 1 Introducing the NWA1121-NI......................11 1.1 Introducing the NWA1121-NI ......................11 1.2 Wireless Modes ..........................11 1.2.1 MBSSID ........................... 11 1.2.2 Wireless Client .........................13 1.2.3 Root AP ...........................14 1.2.4 Repeater ..........................14...
  • Page 6 Table of Contents 4.1 How to Configure the Wireless LAN ....................29 4.1.1 Choosing the Wireless Mode ....................29 4.1.2 Further Reading ........................29 4.2 How to Configure Multiple Wireless Networks ..................29 4.2.1 Configure the SSID Profiles .....................31 4.2.2 Configure the Standard Network .....................33 4.2.3 Configure the VoIP Network ....................34 4.2.4 Configure the Guest Network ....................36 4.2.5 Testing the Wireless Networks ....................38...
  • Page 7 Table of Contents 6.6.2 Security: 802.1x Only ......................77 6.6.3 Security: 802.1x Static WEP ....................79 6.6.4 Security: WPA, WPA2, WPA2-MIX ..................83 6.6.5 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ..............86 6.7 RADIUS Screen ..........................87 6.8 MAC Filter Screen ..........................89 6.9 Technical Reference ..........................91 6.9.1 Additional Wireless Terms .......................91 6.9.2 WMM QoS ..........................92 6.9.3 Security Mode Guideline ......................93 Chapter 7...
  • Page 8 Table of Contents 10.1 Overview ............................115 10.2 What You Can Do in this Chapter ....................115 10.3 What You Need To Know ......................116 10.4 Log Settings Screen ........................116 Chapter 11 Maintenance ............................119 11.1 Overview ............................119 11.2 What You Can Do in this Chapter ....................
  • Page 9: User's Guide

    User’s Guide...
  • Page 11: Introducing The Nwa1121-Ni

    H A PT ER Introducing the NWA1121-NI This chapter introduces the main applications and features of the NWA1121-NI. It also discusses the ways you can manage your NWA1121-NI. 1.1 Introducing the NWA1121-NI Your NWA1121-NI is an IPv6 wireless AP (Access Point) that can function in several wireless modes. It extends the range of your existing wired network without additional wiring, providing easy network access to mobile users.
  • Page 12 Chapter 1 Introducing the NWA1121-NI Multiple BSS (MBSSID) mode, the NWA1121-NI provides multiple virtual APs, each forming its own BSS and using its own individual SSID profile. You can configure multiple SSID profiles, and have all of them active at any one time. You can assign different wireless and security settings to each SSID profile.
  • Page 13: Wireless Client

    Chapter 1 Introducing the NWA1121-NI 1.2.2 Wireless Client The NWA1121-NI can be used as a wireless client to communicate with an existing network. In the figure below, the printer can receive requests from the wired computer clients A and B via the NWA1121-NI in Client mode (Z).
  • Page 14: Root Ap

    Chapter 1 Introducing the NWA1121-NI 1.2.3 Root AP In Root AP mode, the NWA1121-NI (Z) can act as the root AP in a wireless network and also allow repeaters (X and Y) to extend the range of its wireless network at the same time. In the figure below, both clients A, B and C can access the wired network through the root AP.
  • Page 15: Ways To Manage The Nwa1121-Ni

    Chapter 1 Introducing the NWA1121-NI between associated wireless clients and the wired LAN. Clients A, B and C access the AP and the wired network behind the AP throught repeaters Z and Y. Figure 4 Repeater Application When the NWA1121-NI is in Repeater mode, universal repeater security between the NWA1121-NI and other repeater is independent of the security between the wireless clients and the AP or repeater.
  • Page 16: Configuring Your Nwa1121-Ni's Security Features

    Chapter 1 Introducing the NWA1121-NI 1.4 Configuring Your NWA1121-NI’s Security Features Your NWA1121-NI comes with a variety of security features. This section summarizes these features and provides links to sections in the User’s Guide to configure security settings on your NWA1121-NI.
  • Page 17: Hardware Connections

    Chapter 1 Introducing the NWA1121-NI • Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the NWA1121-NI to its factory default settings. If you backed up an earlier configuration file, you would not have to totally re-configure the NWA1121-NI.
  • Page 18 Chapter 1 Introducing the NWA1121-NI NWA1121-NI User’s Guide...
  • Page 19: Introducing The Web Configurator

    H A PT ER Introducing the Web Configurator This chapter describes how to access the NWA1121-NI’s web configurator and provides an overview of its screens. 2.1 Accessing the Web Configurator Make sure your hardware is properly connected and prepare your computer or computer network to connect to the NWA1121-NI (refer to the Quick Start Guide).
  • Page 20: Resetting The Nwa1121-Ni

    Chapter 2 Introducing the Web Configurator Note: If you do not change the password, the following screen appears every time you login. Figure 7 Change Password Screen You should now see the Dashboard screen. See Chapter 2 on page 19 for details about the Dashboard screen.
  • Page 21: Introducing The Web Configurator

    Chapter 2 Introducing the Web Configurator factory-default configuration file. This means that you will lose all the settings you previously configured. The password will be reset to “1234”. Figure 8 The RESET Button 2.2.1 Methods of Restoring Factory-Defaults You can erase the current configuration and restore factory defaults in two ways: Use the RESET button to upload the default configuration file.
  • Page 22: Navigating The Web Configurator

    Chapter 2 Introducing the Web Configurator 2.3 Navigating the Web Configurator The following summarizes how to navigate the web configurator from the Dashboard screen. Figure 9 Status Screen of the Web Configurator As illustrated above, the Web Configurator screen is divided into these parts: •...
  • Page 23: Navigation Panel

    Chapter 2 Introducing the Web Configurator 2.3.2 Navigation Panel Use the menu items on the navigation panel to open screens to configure NWA1121-NI features. The following tables describe each menu item. Table 2 Navigation Panel Summary LINK FUNCTION Dashboard This screen shows the NWA1121-NI’s general device and network status information.
  • Page 24: Main Window

    Chapter 2 Introducing the Web Configurator Table 2 Navigation Panel Summary LINK FUNCTION Configuration File Use this screen to backup and restore your device’s configuration (settings) or reset the factory default settings. Restart Use this screen to reboot the NWA1121-NI without turning the power off.
  • Page 25: Dashboard

    H A PT ER Dashboard The Dashboard screens display when you log into the NWA1121-NI, or click Dashboard in the navigation menu. Use the Dashboard screen to look at the current status of the device, system resources, and interfaces. The Dashboard screens also provide detailed information about system statistics, associated wireless clients, and logs.
  • Page 26 Chapter 3 Dashboard The following table describes the labels in this screen. Table 3 The Dashboard Screen LABEL DESCRIPTION Refresh Interval Select how often you want the NWA1121-NI to update this screen. Refresh Now Click this to update this screen immediately. System Information System Name This field displays the NWA1121-NI system name.
  • Page 27 Chapter 3 Dashboard Table 3 The Dashboard Screen (continued) LABEL DESCRIPTION Current Date/Time This field displays the date and time configured on the NWA1121-NI. You can change this in the Maintenance > Time screen. System Resource CPU Usage This field displays what percentage of the NWA1121-NI’s processing ability is currently being used.
  • Page 28 Chapter 3 Dashboard NWA1121-NI User’s Guide...
  • Page 29: Chapter 4 Tutorial

    H A PT ER Tutorial This chapter first provides an overview of how to configure the wireless LAN on your NWA1121-NI, and then gives step-by-step guidelines showing how to configure your NWA1121-NI for some example scenarios. 4.1 How to Configure the Wireless LAN This section illustrates how to choose which wireless operating mode to use on the NWA1121-NI and how to set up the wireless LAN in each wireless mode.
  • Page 30: Tutorial

    Chapter 4 Tutorial 6.4.4 on page 69) to provide multiple wireless networks. Each wireless network will cater to a different type of user. You want to make three wireless networks: one standard office wireless network with all the same settings you already have, another wireless network with high priority QoS settings for Voice over IP (VoIP) users, and a guest network that allows visitors to access only the Internet and the network printer.
  • Page 31: Configure The Ssid Profiles

    Chapter 4 Tutorial To configure these settings, you need to know the Media Access Control (MAC) addresses of the devices you want to allow users of the guest network to access. The following table shows the addresses used in this example. Table 4 Tutorial: Example Information Network router (A) MAC address 00:AA:00:AA:00:AA...
  • Page 32 Chapter 4 Tutorial 4.2.1.1 MBSSID Go to Wireless LAN > Wireless Settings. Select MBSSID from the Operation Mode drop-down list box. SSID01 is the standard network, so select SSID01 as the first profile. It is always active. Select VoIP_SSID as the second profile, and Guest_SSID as the third profile. Select the corresponding Active check-boxes.
  • Page 33: Configure The Standard Network

    Chapter 4 Tutorial 4.2.2 Configure the Standard Network Click Wireless LAN > SSID. Click the Edit icon next to SSID01. Select SecProfile1 as SSID01’s security profile. Select the Hidden SSID checkbox as you want only authorized company employees to use this network, so there is no need to broadcast the SSID to wireless clients scanning the area.
  • Page 34: Configure The Voip Network

    Chapter 4 Tutorial Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile1. Since SSID01 is the standard network that has access to all resources, assign a more secure security mode. Select WPA2-PSK-MIX as the Security Mode, and enter the Pre-Shared Key. In this example, use ThisisSSID01PreSharedKey.
  • Page 35 Chapter 4 Tutorial Select WMM_VOICE in the QoS field to give VoIP the highest priority in the wireless network. Click Apply. Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile2. NWA1121-NI User’s Guide...
  • Page 36: Configure The Guest Network

    Chapter 4 Tutorial Select WPA2-PSK as the Security Mode, and enter the Pre-Shared Key. In this example, use ThisisVoIPPreSharedKey. Click Apply. Your VoIP wireless network is now ready to use. Any traffic using the VoIP_SSID profile will be given the highest priority across the wireless network. 4.2.4 Configure the Guest Network When you are setting up the wireless network for guests to your office, your primary concern is to keep your network secure while allowing access to certain resources (such as a network printer, or...
  • Page 37 Chapter 4 Tutorial Select the check-box of Intra-BSS Traffic blocking Enabled. Click Apply. Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile3. Select WPA-PSK in the Security Mode field. WPA-PSK provides strong security that is supported by most wireless clients.
  • Page 38: Testing The Wireless Networks

    Chapter 4 Tutorial Enter the PSK you want to use in your network in the Pre Shared Key field. In this example, the PSK is ThisismyGuestWPApre-sharedkey. Click Apply. Your guest wireless network is now ready to use. 4.2.5 Testing the Wireless Networks To make sure that the three networks are correctly configured, do the following.
  • Page 39: Configuring The Nwa1121-Ni In Mbssid Or Root Ap Mode

    Chapter 4 Tutorial to allow wireless traffic between B and wireless clients connected to A (W, Y and Z). Other wireless devices (X) must not be able to connect to the FTP server. Figure 11 FTP Server Connected to a Wireless Client 4.3.2 Configuring the NWA1121-NI in MBSSID or Root AP Mode Before setting up the NWA1121-NI as a wireless client (B), you need to make sure there is an access point to connect to.
  • Page 40 Chapter 4 Tutorial Log into the Web Configurator on NWA1121-NI (A) and go to the Wireless LAN > Wireless Settings screen. Set the Operation Mode to Root AP. Select the Wireless Mode. In this example, select 802.11b/g/n. Select Profile1 as the SSID Profile. Choose the Channel you want NWA1121-NI (A) to use.
  • Page 41 Chapter 4 Tutorial Go to Wireless LAN > SSID. Click the Edit icon next to Profile1. Change the SSID to AP-A. Select SecProfile1 in the Security field. Select the check-box for Intra-BSS Traffic blocking Enabled so the client cannot access other clients on the same wireless network.
  • Page 42: Configuring The Nwa1121-Ni In Wireless Client Mode

    Chapter 4 Tutorial 11 Go to Wireless LAN > Security. Click the Edit icon next to SecProfile1. 12 Configure WPA-PSK as the Security Mode and enter ThisisMyPreSharedKey in the Pre- Shared Key field. 13 Click Apply to finish configuration for NWA1121-NI (A). 4.3.3 Configuring the NWA1121-NI in Wireless Client Mode The NWA1121-NI (B) should have a wired connection before it can be set to wireless client operating mode.
  • Page 43 Chapter 4 Tutorial Select Client as Operation Mode. Click Apply. Click on the Site Survey button. A window should pop up which contains a list of all available wireless devices within your NWA1121-NI’s range. Find and select NWA1121-NI (A)’s SSID: AP-A. NWA1121-NI User’s Guide...
  • Page 44: Mac Filter Setup

    Chapter 4 Tutorial Go to Wireless LAN > Security to configure the NWA1121-NI to use the same security mode and Pre-Shared Key as NWA1121-NI (A): WPA-PSK/ThisisMyPreSharedKey. Click Apply. Figure 12 4.3.4 MAC Filter Setup One way to ensure that only specified wireless clients can access the FTP server is by enabling MAC filtering on NWA1121-NI (B) (See Section 6.8 on page 89 for more information on MAC Filter).
  • Page 45: Testing The Connection And Troubleshooting

    Chapter 4 Tutorial 4.3.5 Testing the Connection and Troubleshooting This section discusses how you can check if you have correctly configured your network setup as described in this tutorial. • Try accessing the FTP server from wireless clients W, Y or Z. Test if you can send or retrieve a file.
  • Page 46 Chapter 4 Tutorial NWA1121-NI User’s Guide...
  • Page 47: Technical Reference

    Technical Reference The appendices provide general information. Some details may not apply to your NWA1121-NI.
  • Page 49: Monitor

    H A PT ER Monitor 5.1 Overview This chapter discusses read-only information related to the device state of the NWA1121-NI. Note: To access the Monitor screens, you can also click the links in the Summary table of the Dashboard screen to view the wireless packets sent/received as well as the status of clients connected to the NWA1121-NI.
  • Page 50: Statistics

    Chapter 5 Monitor Click Monitor > Logs. Figure 13 Logs The following table describes the labels in this screen. Table 5 Logs LABEL DESCRIPTION Display Select a category of logs to view. Select All Log to view logs from all of the log categories that you selected in the Configuration >...
  • Page 51: Association List

    Chapter 5 Monitor Click Monitor > Statistics. The following screen pops up. Figure 14 Statistics The following table describes the labels in this screen. Table 6 Statistics LABEL DESCRIPTION Description This is the wireless interface on the NWA1121-NI. 802.11 Mode This field shows which 802.11 mode the NWA1121-NI is using.
  • Page 52: Channel Usage

    Chapter 5 Monitor Click Monitor > Association List to display the screen as shown next. Figure 15 Association List The following table describes the labels in this screen. Table 7 Association List LABEL DESCRIPTION This is the index number of an associated wireless device. MAC Address This field displays the MAC address of an associated wireless device.
  • Page 53 Chapter 5 Monitor Wait a moment while the NWA1121-NI compiles the information. Figure 16 Channel Usage The following table describes the labels in this screen. Table 8 Channel Usage LABEL DESCRIPTION SSID This is the Service Set IDentification (SSID) name of the AP in an Infrastructure wireless network or wireless station in an Ad-Hoc wireless network.
  • Page 54 Chapter 5 Monitor NWA1121-NI User’s Guide...
  • Page 55: Wireless Lan

    H A PT ER Wireless LAN 6.1 Overview This chapter discusses the steps to configure the Wireless Settings screen on the NWA1121-NI. It also introduces the wireless LAN (WLAN) and some basic scenarios. Figure 17 Wireless Mode In the figure above, the NWA1121-NI allows access to another bridge device (A) and a notebook computer (B) upon verifying their settings and credentials.
  • Page 56: What You Need To Know

    Chapter 6 Wireless LAN 6.3 What You Need To Know A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless clients in the BSS.
  • Page 57 Chapter 6 Wireless LAN Wireless Mode The IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. Your NWA1121-NI can support 802.11b/g, 802.11n and 802.11b/g/n. MBSSID Traditionally, you needed to use different APs to configure different Basic Service Sets (BSSs).
  • Page 58 Chapter 6 Wireless LAN User Authentication Authentication is the process of verifying whether a wireless device is allowed to use the wireless network. You can make every user log in to the wireless network before they can use it. However, every device in the wireless network has to support IEEE 802.1x to do this.
  • Page 59 Chapter 6 Wireless LAN Passphrase A passphrase functions like a password. In WEP security mode, it is further converted by the NWA1121-NI into a complicated string that is referred to as the “key”. This key is requested from all devices wishing to connect to a wireless network. The Pre-Shared Key (PSK) is a password shared by a wireless access point and a client during a previous secure connection.
  • Page 60: Wireless Settings Screen

    Chapter 6 Wireless LAN In the figure above, wireless clients A and B are trying to access the Internet via the NWA1121-NI. The NWA1121-NI in turn queries the RADIUS server if the identity of clients A and U are allowed access to the Internet.
  • Page 61: Root Ap Mode

    Chapter 6 Wireless LAN 6.4.1 Root AP Mode Use this screen to use your NWA1121-NI as an access point. Select Root AP as the Operation Mode. The following screen displays. Figure 20 Wireless LAN > Wireless Settings: Root AP NWA1121-NI User’s Guide...
  • Page 62 Chapter 6 Wireless LAN The following table describes the general wireless LAN labels in this screen. Table 10 Wireless LAN > Wireless Settings: Root AP LABEL DESCRIPTION Basic Settings Wireless LAN Select the check box to turn on the wireless LAN on the NWA1121-NI. Interface Operation Mode Select Root AP from the drop-down list.
  • Page 63 Chapter 6 Wireless LAN Table 10 Wireless LAN > Wireless Settings: Root AP (continued) LABEL DESCRIPTION Advanced Settings Beacon Interval When a wirelessly network device sends a beacon, it includes with it a beacon interval. This specifies the time period before the device sends the beacon again. The interval tells receiving devices on the network how long they can wait in lowpower mode before waking up to handle the beacon.
  • Page 64: Repeater Mode

    Chapter 6 Wireless LAN 6.4.2 Repeater Mode Use this screen to have the NWA1121-NI act as a wireless repeater. You need to know the MAC address of the peer device, which also must be in Repeater or Root AP mode. Figure 21 Wireless LAN >...
  • Page 65 Chapter 6 Wireless LAN Table 11 Wireless LAN > Wireless Settings: Repeater (continued) LABEL DESCRIPTION Wireless Mode Select 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant WLAN devices to associate with the NWA1121-NI. The transmission rate of your NWA1121-NI might be reduced.
  • Page 66 Chapter 6 Wireless LAN Table 11 Wireless LAN > Wireless Settings: Repeater (continued) LABEL DESCRIPTION Preamble Type Select Dynamic to have the AP automatically use short preamble when wireless adapters support it, otherwise the AP uses long preamble. Select Long if you are unsure what preamble mode the wireless adapters support, and to provide more reliable communications in busy wireless networks.
  • Page 67: Wireless Client Mode

    Chapter 6 Wireless LAN 6.4.3 Wireless Client Mode Use this screen to turn your NWA1121-NI into a wireless client. Select Client as the Operation Mode. The following screen displays. Figure 22 Wireless LAN > Wireless Settings: Wireless Client The following table describes the general wireless LAN labels in this screen. Table 12 Wireless LAN >...
  • Page 68 Chapter 6 Wireless LAN Table 12 Wireless LAN > Wireless Settings: Wireless Client (continued) LABEL DESCRIPTION SSID Profile The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID.
  • Page 69: Mbssid Mode

    Chapter 6 Wireless LAN Table 12 Wireless LAN > Wireless Settings: Wireless Client (continued) LABEL DESCRIPTION Short GI Select Enabled to use Short GI (Guard Interval). The guard interval is the gap introduced between data transmission from users in order to reduce interference. Reducing the GI increases data transfer rates but also increases interference.
  • Page 70 Chapter 6 Wireless LAN The following table describes the labels in this screen. Table 13 Wireless LAN > Wireless Settings: MBSSID LABEL DESCRIPTION Basic Settings Wireless LAN Select the check box to turn on the wireless LAN on the NWA1121-NI. Interface Operation Mode Select MBSSID from the drop-down list.
  • Page 71 Chapter 6 Wireless LAN Table 13 Wireless LAN > Wireless Settings: MBSSID (continued) LABEL DESCRIPTION Preamble Type Select Dynamic to have the AP automatically use short preamble when wireless adapters support it, otherwise the AP uses long preamble. Select Long if you are unsure what preamble mode the wireless adapters support, and to provide more reliable communications in busy wireless networks.
  • Page 72: Ssid Screen

    Chapter 6 Wireless LAN 6.5 SSID Screen Use this screen to view and modify the settings of the SSID profiles on the NWA1121-NI. Click Wireless LAN > SSID to display the screen as shown. Figure 24 Wireless LAN > SSID The following table describes the labels in this screen.
  • Page 73: Configuring Ssid

    Chapter 6 Wireless LAN 6.5.1 Configuring SSID Use this screen to configure an SSID profile. In the Wireless LAN > SSID screen, click Edit next to the SSID profile you want to configure to display the following screen. Figure 25 SSID: Edit The following table describes the labels in this screen.
  • Page 74: Wireless Security Screen

    Chapter 6 Wireless LAN Table 15 SSID: Edit (continued) LABEL DESCRIPTION BSSID VLAN ID Enter a VLAN ID for the SSID profile. Packets coming from the WLAN using this SSID profile are tagged with the VLAN ID number by the NWA1121-NI. Number of Wireless Use this field to set a maximum number of wireless stations that may connect to the Stations Allowed to...
  • Page 75 Chapter 6 Wireless LAN The Security Settings screen varies depending upon the security mode you select. Figure 27 Security: None Note that some screens display differently depending on the operating mode selected in the Wireless LAN > Wireless Settings screen. Note: You must enable the same wireless security settings on the NWA1121-NI and on all wireless clients that you want to associate with it.
  • Page 76: Security: Wep

    Chapter 6 Wireless LAN 6.6.1 Security: WEP Use this screen to use WEP as the security mode for your NWA1121-NI. Select WEP in the Security Mode field to display the following screen. Figure 28 Security: WEP The following table describes the labels in this screen. Table 16 Security: WEP LABEL DESCRIPTION...
  • Page 77: Security: 802.1X Only

    Chapter 6 Wireless LAN Table 16 Security: WEP (continued) LABEL DESCRIPTION Key 1 to The WEP keys are used to encrypt data. Both the NWA1121-NI and the wireless stations must use the same WEP key for data transmission. Key 4 If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F").
  • Page 78 Chapter 6 Wireless LAN Table 17 Security: 802.1x Only for Access Point (continued) LABEL DESCRIPTION Reauthentication Specify how often wireless stations have to resend user names and passwords in order Time to stay connected. Enter a time interval between 100 and 3600 seconds. Alternatively, enter “0” to turn reauthentication off.
  • Page 79: Security: 802.1X Static Wep

    Chapter 6 Wireless LAN Table 18 Security: 802.1x Only for Wireless Client (continued) LABEL DESCRIPTION Security Mode Choose the same security mode used by the AP. IEEE802.1x Authentication Eap Type The options on the left refer to EAP methods. You can choose either TLS, LEAP, PEAP or TTLS.
  • Page 80: Access Point

    Chapter 6 Wireless LAN 6.6.3.1 Access Point Use this screen to use 802.1x static WEP security mode for your NWA1121-NI that is in root AP, MBSSID or repeater operating mode. Select 802.1X-Static WEP in the Security Mode field to display the following screen. Figure 31 Security: 802.1X-Static WEP for Access Point The following table describes the labels in this screen.
  • Page 81 Chapter 6 Wireless LAN Table 19 Security: 802.1X-Static WEP for Access Point (continued) LABEL DESCRIPTION Key 1 to The WEP keys are used to encrypt data. Both the NWA1121-NI and the wireless stations must use the same WEP key for data transmission. Key 4 If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F").
  • Page 82 Chapter 6 Wireless LAN 6.6.3.2 Wireless Client Use this screen to use 802.1x-Only security mode for your NWA1121-NI that is in wireless client operating mode. Select 802.1X-Static WEP in the Security Mode field to display the following screen. Figure 32 Security: 802.1X-Static WEP for Wireless Client The following table describes the labels in this screen.
  • Page 83: Security: Wpa, Wpa2, Wpa2-Mix

    Chapter 6 Wireless LAN Table 20 Security: 802.1X-Static WEP for Wireless Client (continued) LABEL DESCRIPTION Data Encryption Select 64-bit WEP or 128-bit WEP to enable data encryption. Passphrase Enter the passphrase or string of text used for automatic WEP key generation. Generate Click this to get the keys from the Passphrase you entered.
  • Page 84 Chapter 6 Wireless LAN 6.6.4.1 Access Point Use this screen to employ WPA or WPA2 as the security mode for your NWA1121-NI that is in root AP, MBSSID or repeater operating mode. Select WPA, WPA2 or WPA2-MIX in the Security Mode field to display the following screen.
  • Page 85 Chapter 6 Wireless LAN 6.6.4.2 Wireless Client Use this screen to employ WPA or WPA2 as the security mode for your NWA1121-NI that is in wireless client operating mode. Select WPA or WPA2 in the Security Mode field to display the following screen.
  • Page 86: Security: Wpa-Psk, Wpa2-Psk, Wpa2-Psk-Mix

    Chapter 6 Wireless LAN Table 22 Security: WPA/WPA2 for Wireless Client (continued) LABEL DESCRIPTION Back Click Back to return to the previous screen. Apply Click Apply to save your changes. Cancel Click Cancel to begin configuring this screen afresh. 6.6.5 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX Use this screen to employ WPA-PSK, WPA2-PSK or WPA2-PSK-MIX as the security mode of your NWA1121-NI.
  • Page 87: Radius Screen

    Chapter 6 Wireless LAN 6.7 RADIUS Screen Use this screen to set up your NWA1121-NI’s RADIUS server settings. Click Wireless LAN > RADIUS. The screen appears as shown. Figure 36 Wireless LAN > RADIUS Select a profile you want to configure and click Edit. Figure 37 Wireless LAN >...
  • Page 88 Chapter 6 Wireless LAN The following table describes the labels in this screen. Table 24 Wireless LAN > RADIUS LABEL DESCRIPTION Profile Name This is the name that identifying this RADIUS profile. Primary RADIUS Select the check box to enable user authentication through an external authentication Server server.
  • Page 89: Mac Filter Screen

    Chapter 6 Wireless LAN Table 24 Wireless LAN > RADIUS (continued) LABEL DESCRIPTION Apply Click Apply to save your changes. Cancel Click Cancel to begin configuring this screen afresh. 6.8 MAC Filter Screen Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
  • Page 90 Chapter 6 Wireless LAN Use this screen to enable MAC address filtering in your NWA1121-NI. You can specify MAC addresses to either allow or deny association with your NWA1121-NI. Click Wireless LAN > MAC Filter. The screen displays as shown. Figure 39 Wireless LAN >...
  • Page 91: Technical Reference

    Chapter 6 Wireless LAN The following table describes the labels in this screen. Table 25 Wireless LAN > MAC Filter LABEL DESCRIPTION Profile Name This is the name that identifying this profile. Access Control Mode Select Disabled if you do not want to use this feature. Select Allow to permit access to the NWA1121-NI.
  • Page 92: Wmm Qos

    Chapter 6 Wireless LAN TERM DESCRIPTION Roaming If you have two or more NWA1121-NIs (or other wireless access points) on your wireless network, you can enable this option so that wireless devices can change locations without having to log in again. This is useful for devices, such as notebooks, that move around a lot.
  • Page 93: Security Mode Guideline

    Chapter 6 Wireless LAN 6.9.3 Security Mode Guideline The following is a general guideline in choosing the security mode for your NWA1121-NI. • Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server. • Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server. WPA has user authentication and improved data encryption over WEP.
  • Page 94: Lan

    H A PT ER 7.1 Overview This chapter describes how you can configure the IP address of your NWA1121-NI. The Internet Protocol (IP) address identifies a device on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 95 Chapter 7 LAN IPv6 IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 10 addresses. IPv6 Addressing The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:).
  • Page 96: Lan Ip Screen

    Chapter 7 LAN 7.4 LAN IP Screen Use this screen to configure the IP address for your NWA1121-NI. Click Network > LAN to display the following screen. Figure 42 LAN IP The following table describes the labels in this screen. Table 29 LAN IP LABEL DESCRIPTION...
  • Page 97 Chapter 7 LAN Table 29 LAN IP (continued) LABEL DESCRIPTION IPv6 Address Assignment Enable Stateful Select this to turn on IPv6 stateful autoconfiguration to have the NWA1121-NI obtain Address Auto- an IPv6 global address from a DHCPv6 server in your network. configuration IPv6 Address/Prefix Enter your IPv6 address and prefix manually.
  • Page 98: Vlan

    H A PT ER VLAN 8.1 Overview This chapter discusses how to configure the NWA1121-NI’s VLAN settings. Figure 43 Management VLAN Setup In the figure above, to access and manage the NWA1121-NI from computer A, the NWA1121-NI and switch B’s ports to which computer A and the NWA1121-NI are connected should be in the same VLAN.
  • Page 99: Vlan Screen

    Chapter 8 VLAN VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain. In traditional switched environments, all broadcast packets go to each and every individual port. With VLAN, all broadcasts are confined to a specific broadcast domain.
  • Page 100 Chapter 8 VLAN NWA1121-NI User’s Guide...
  • Page 101: System

    H A PT ER System 9.1 Overview This chapter shows you how to enable remote management of your NWA1121-NI. It provides information on determining which services or protocols can access which of the NWA1121-NI’s interfaces. Remote Management allows a user to administrate the device over the network. You can manage your NWA1121-NI from a remote location via the following interfaces: •...
  • Page 102: What You Need To Know

    Chapter 9 System • Use the Telnet screen to configure through which interface(s) and from which IP address(es) you can use Telnet to manage the NWA1121-NI. A Telnet connection is prioritized by the NWA1121-NI over other remote management sessions (see Section 9.6 on page 106).
  • Page 103 Chapter 9 System The next figure illustrates an SNMP management operation. Figure 47 SNMP Management Mode An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the NWA1121-NI). An agent translates the local management information from the managed device into a form compatible with SNMP.
  • Page 104: Www Screen

    Chapter 9 System • You may only have one remote management session running at one time. The NWA1121-NI automatically disconnects a remote management session of lower priority when another remote management session of higher priority starts. The priorities for the different types of remote management sessions are as follows: Telnet HTTP...
  • Page 105: Certificates Screen

    Chapter 9 System To change your NWA1121-NI’s WWW settings, click System > WWW. The following screen shows. Figure 49 System > WWW The following table describes the labels in this screen. Table 30 System > WWW LABEL DESCRIPTION HTTP Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
  • Page 106: Telnet Screen

    Chapter 9 System Click System > Certificates. The following screen shows. Figure 50 System > Certificates The following table describes the labels in this screen. Table 31 System > Certificates LABEL DESCRIPTION Import Certificate Import Enter the location of a previously-saved certificate to upload to the NWA1121-NI. Certificate Alternatively, click the Browse button to locate a list.
  • Page 107: Snmp Screen

    Chapter 9 System The following table describes the labels in this screen. Table 32 System > Telnet LABEL DESCRIPTION TELNET Port You can change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Server Access Select the interface(s) through which a computer may access the NWA1121-NI using Telnet and to which the IP and MAC filtering rules you specified below are applied.
  • Page 108 Chapter 9 System manager. To change your NWA1121-NI’s SNMP settings, click System > SNMP. The following screen displays. Figure 52 System > SNMP The following table describes the labels in this screen. Table 33 System > SNMP LABEL DESCRIPTION SNMP Port You can change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
  • Page 109 Chapter 9 System Table 33 System > SNMP (continued) LABEL DESCRIPTION Server Access Select the interface(s) through which a computer may access the NWA1121-NI using SNMP and to which the IP and MAC filtering rules you specified below are applied. Otherwise, select Disable to allow any computer to access the NWA1121-NI through any interface using SNMP.
  • Page 110: Ftp Screen

    Chapter 9 System Table 33 System > SNMP (continued) LABEL DESCRIPTION SNMPv3 User Settings SNMPv3 User Select the check box to enable the SNMP user account for authentication with SNMP managers using SNMP v3. User Name Specify the user name of the SNMP user account. Password Enter the password for SNMP user authentication.
  • Page 111: Technical Reference

    Chapter 9 System The following table describes the labels in this screen. Table 34 System > FTP LABEL DESCRIPTION Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Server Access Select the interface(s) through which a computer may access the NWA1121-NI using this service and to which the IP and MAC filtering rules you specified below are applied.
  • Page 112: Supported Mibs

    9.9.2 Supported MIBs The NWA1121-NI supports MIB II that is defined in RFC-1213 and RFC-1215 as well as the proprietary ZyXEL private MIB. The purpose of the MIBs is to let administrators collect statistical data and monitor status and performance.
  • Page 113 Chapter 9 System Make sure that the certificate has a “.cer” or “.crt” file name extension. Figure 54 Certificates on Your Computer Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Figure 55 Certificate Details Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields.
  • Page 114 Chapter 9 System NWA1121-NI User’s Guide...
  • Page 115: Log Settings

    HAPTER Log Settings 10.1 Overview This chapter provides information on viewing and generating logs on your NWA1121-NI. Logs are files that contain recorded network activity over a set period. They are used by administrators to monitor the health of the system(s) they are managing. Logs enable administrators to effectively monitor events, errors, progress, etc.
  • Page 116: What You Need To Know

    Chapter 10 Log Settings 10.3 What You Need To Know Alerts and Logs An alert is a type of log that warrants more serious attention. Some categories such as System Error consist of both logs and alerts. You can differentiate them by their color in the Monitor > Logs screen.
  • Page 117 Chapter 10 Log Settings To change your NWA1121-NI’s log settings, click Configuration > Log Settings. The screen appears as shown. Figure 57 Log Settings The following table describes the labels in this screen. Table 35 Log Settings LABEL DESCRIPTION E-mail Log Settings Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below.
  • Page 118 Chapter 10 Log Settings Table 35 Log Settings (continued) LABEL DESCRIPTION SMTP Authentication SMTP (Simple Mail Transfer Protocol) is the message-exchange standard for the Internet. Select the check box to activate SMTP authentication. If mail server authentication is needed but this feature is disabled, you will not receive the e-mail logs.
  • Page 119: Chapter 11 Maintenance

    HAPTER Maintenance 11.1 Overview This chapter describes the maintenance screens. It discusses how you can upload new firmware, manage configuration and restart your NWA1121-NI without turning it off and on. This chapter provides information and instructions on how to identify and manage your NWA1121- NI over the network.
  • Page 120: What You Need To Know

    Chapter 11 Maintenance 11.3 What You Need To Know You can find the firmware for your device at www.zyxel.com. It is a file that (usually) uses the system model name with a "*.bin" extension, for example "[Model #].bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes.
  • Page 121: Maintenance

    Chapter 11 Maintenance 11.5 Password Screen Use this screen to control access to your NWA1121-NI by assigning a password to it. Click Maintenance > Password. The following screen displays. Figure 60 Maintenance > Password The following table describes the labels in this screen. Table 37 Maintenance >...
  • Page 122: Time Screen

    Chapter 11 Maintenance 11.6 Time Screen Use this screen to change your NWA1121-NI’s time and date, click Maintenance > Time. The following screen displays. Figure 61 Maintenance > Time The following table describes the labels in this screen. Table 38 Maintenance > Time LABEL DESCRIPTION Current Time and Date...
  • Page 123: Firmware Upgrade Screen

    Chapter 11 Maintenance 11.7 Firmware Upgrade Screen Use this screen to upload a firmware to your NWA1121-NI. Click Maintenance > Firmware Upgrade. Follow the instructions in this section to upload firmware to your NWA1121-NI. Figure 62 Maintenance > Firmware Upgrade The following table describes the labels in this screen.
  • Page 124: Configuration File Screen

    Chapter 11 Maintenance 11.8 Configuration File Screen Use this screen to backup, restore and reset the configuration of your NWA1121-NI. Click Maintenance > Configuration File. The screen appears as shown next. Figure 65 Maintenance > Configuration File 11.8.1 Backup Configuration Backup configuration allows you to back up (save) the NWA1121-NI’s current configuration to a file on your computer.
  • Page 125: Back To Factory Defaults

    Chapter 11 Maintenance The NWA1121-NI automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 66 Network Temporarily Disconnected If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default NWA1121-NI IP address (192.168.1.2).
  • Page 126 Chapter 11 Maintenance Click Restart to have the NWA1121-NI reboot. This does not affect the NWA1121-NI's configuration. NWA1121-NI User’s Guide...
  • Page 127: Troubleshooting

    HAPTER Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NWA1121-NI Access and Login • Internet Access 12.1 Power, Hardware Connections, and LEDs The NWA1121-NI does not turn on.
  • Page 128: Nwa1121-Ni Access And Login

    Chapter 12 Troubleshooting 12.2 NWA1121-NI Access and Login I forgot the IP address for the NWA1121-NI. The default IP address is 192.168.1.2. If you changed the IP address and have forgotten it, you might get the IP address of the NWA1121- NI by looking up the IP address of the default gateway for your computer.
  • Page 129: Internet Access

    Chapter 12 Troubleshooting If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestions • Try to access the NWA1121-NI using another service, such as Telnet. If you can access the NWA1121-NI, check the remote management settings to find out why the NWA1121-NI does not respond to HTTP.
  • Page 130 Chapter 12 Troubleshooting If the problem continues, contact your ISP. I cannot access the Internet anymore. I had access to the Internet (with the NWA1121-NI), but my Internet connection is not available anymore. Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.7 on page Reboot the NWA1121-NI.
  • Page 131: Appendix A Setting Up Your Computer's Ip Address

    PP EN D I X Setting Up Your Computer’s IP Address Note: Your specific NWA1121-NI may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
  • Page 132 Appendix A Setting Up Your Computer’s IP Address Click Start > Control Panel. In the Control Panel, click the Network Connections icon. Right-click Local Area Connection and then select Properties. NWA1121-NI User’s Guide...
  • Page 133 Appendix A Setting Up Your Computer’s IP Address On the General tab, select Internet Protocol (TCP/IP) and then click Properties. NWA1121-NI User’s Guide...
  • Page 134 Appendix A Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 135 Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. In the Control Panel, click the Network and Internet icon. Click the Network and Sharing Center icon. NWA1121-NI User’s Guide...
  • Page 136 Appendix A Setting Up Your Computer’s IP Address Click Manage network connections. Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NWA1121-NI User’s Guide...
  • Page 137 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NWA1121-NI User’s Guide...
  • Page 138 Appendix A Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 139 Appendix A Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. Click Start > Control Panel. In the Control Panel, click View network status and tasks under the Network and Internet category. Click Change adapter settings. NWA1121-NI User’s Guide...
  • Page 140 Appendix A Setting Up Your Computer’s IP Address Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NWA1121-NI User’s Guide...
  • Page 141 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NWA1121-NI User’s Guide...
  • Page 142 Appendix A Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 143 Appendix A Setting Up Your Computer’s IP Address The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple > System Preferences. NWA1121-NI User’s Guide...
  • Page 144 Appendix A Setting Up Your Computer’s IP Address In the System Preferences window, click the Network icon. When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. NWA1121-NI User’s Guide...
  • Page 145 Appendix A Setting Up Your Computer’s IP Address For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. •...
  • Page 146 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 69 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6.
  • Page 147 Appendix A Setting Up Your Computer’s IP Address In System Preferences, click the Network icon. When the Network preferences pane opens, select Ethernet from the list of available connection types. From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: NWA1121-NI User’s Guide...
  • Page 148 Appendix A Setting Up Your Computer’s IP Address • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NWA1121-NI. Click Apply and close the window.
  • Page 149 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 70 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
  • Page 150 Appendix A Setting Up Your Computer’s IP Address When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. In the Authenticate window, enter your admin account name and password then click the Authenticate button.
  • Page 151 Appendix A Setting Up Your Computer’s IP Address In the Network Settings window, select the connection that you want to configure, then click Properties. The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address.
  • Page 152 Appendix A Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Click the Close button to apply the changes. NWA1121-NI User’s Guide...
  • Page 153 Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 71 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop...
  • Page 154 Appendix A Setting Up Your Computer’s IP Address Click K Menu > Computer > Administrator Settings (YaST). When the Run as Root - KDE su dialog opens, enter the admin password and click OK. NWA1121-NI User’s Guide...
  • Page 155 Appendix A Setting Up Your Computer’s IP Address When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. NWA1121-NI User’s Guide...
  • Page 156 Appendix A Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 72 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
  • Page 157 Appendix A Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties.
  • Page 158 Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 74 openSUSE: Connection Status - KNetwork Manager NWA1121-NI User’s Guide...
  • Page 159: Appendix B Pop-Up Windows, Javascript And Java Permissions

    PP EN D I X Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8.
  • Page 160 Appendix B Pop-up Windows, JavaScript and Java Permissions Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 76 Internet Options: Privacy Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
  • Page 161 Appendix B Pop-up Windows, JavaScript and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 77 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”.
  • Page 162 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 78 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
  • Page 163 Appendix B Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 79 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 164 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 80 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 165 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 81 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. NWA1121-NI User’s Guide...
  • Page 166 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 82 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen.
  • Page 167 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 84 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly. NWA1121-NI User’s Guide...
  • Page 168 Appendix B Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 85 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Preferences.
  • Page 169 Appendix B Pop-up Windows, JavaScript and Java Permissions To customize JavaScript behavior in the Opera browser, click JavaScript Options. Figure 87 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply. NWA1121-NI User’s Guide...
  • Page 170 Appendix B Pop-up Windows, JavaScript and Java Permissions NWA1121-NI User’s Guide...
  • Page 171: Appendix C Ip Addresses And Subnetting

    PP EN D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 172 Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 88 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 173 Appendix C IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
  • Page 174 Appendix C IP Addresses and Subnetting The following table shows some possible subnet masks using both notations. Table 44 Alternative Subnet Mask Notation ALTERNATIVE LAST OCTET LAST OCTET SUBNET MASK NOTATION (BINARY) (DECIMAL) 255.255.255.0 0000 0000 255.255.255.128 1000 0000 255.255.255.192 1100 0000 255.255.255.224 1110 0000...
  • Page 175 Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub- networks, A and B. Figure 90 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 –...
  • Page 176 Appendix C IP Addresses and Subnetting Table 45 Subnet 1 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.1.1 192.168.1.0 Broadcast Address: Highest Host ID: 192.168.1.62 192.168.1.63 Table 46 Subnet 2 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE...
  • Page 177 Appendix C IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 49 Eight Subnets SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS ADDRESS ADDRESS Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 50 24-bit Network Number Subnet Planning NO.
  • Page 178 Appendix C IP Addresses and Subnetting Table 51 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.255.248 (/29) 8192 255.255.255.252 (/30) 16384 255.255.255.254 (/31) 32768 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
  • Page 179: Appendix D Wireless Lans

    PP EN D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 180 Appendix D Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 92 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
  • Page 181 Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 93 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
  • Page 182 Appendix D Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. RTS/CTS Figure 94 When station A sends data to the AP, it might not know that the station B is already using the channel.
  • Page 183 Appendix D Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver.
  • Page 184 Appendix D Wireless LANs The following figure shows the relative effectiveness of these wireless security methods available on your NWA1121-NI. Table 53 Wireless Security Levels SECURITY SECURITY TYPE LEVEL Least Unique SSID (Default) Secure Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication...
  • Page 185 Appendix D Wireless LANs RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: •...
  • Page 186 Appendix D Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text.
  • Page 187 Appendix D Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled. Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
  • Page 188 Appendix D Wireless LANs called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice.
  • Page 189 Appendix D Wireless LANs WPA(2) with RADIUS Application Example To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows.
  • Page 190: Security Parameters Summary

    Appendix D Wireless LANs The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 96 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
  • Page 191 Appendix D Wireless LANs Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz or 5GHz is needed to communicate efficiently in a wireless Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage area.
  • Page 192 Appendix D Wireless LANs For directional antennas, point the antenna in the direction of the desired coverage area. NWA1121-NI User’s Guide...
  • Page 193: Appendix E Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
  • Page 194 Appendix E Legal Information If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna.
  • Page 195 ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in material or workmanship for a specific period (the Warranty Period) from the date of purchase. The Warranty Period varies by region.
  • Page 196 ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
  • Page 197 С настоящото ZyXEL декларира, че това оборудване е в съответствие със съществените изисквания и другите приложими разпоредбите на Директива 1999/5/ЕC. [Icelandic] Hér með lýsir, ZyXEL því yfir að þessi búnaður er í samræmi við grunnkröfur og önnur viðeigandi ákvæði tilskipunar 1999/5/EC. [Norwegian] Erklærer herved ZyXEL at dette utstyret er I samsvar med de grunnleggende kravene og...
  • Page 198 The requirements for any country may evolve. ZyXEL recommends that you check with the local authorities for the latest status of their national regulations for both the 2,4- and 5-GHz wireless LANs.
  • Page 199: Safety Warnings

    Appendix E Legal Information Pour la bande 2.4 GHz, la puissance est limitée à 10 mW en p.i.r.e. pour les équipements utilisés en extérieur dans la bande 2454 - 2483.5 MHz. Il n'y a pas de restrictions pour des utilisations en intérieur ou dans d'autres parties de la bande 2.4 GHz.
  • Page 200 Appendix E Legal Information • Place connecting cables carefully so that no one will step on them or stumble over them. • Always disconnect all cables from this device before servicing or disassembling. • Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
  • Page 201: Index

    Index Index Numbers 11, 12, 56, 179 802.1x-Only 802.1x-Static128 802.1x-Static64 Certificate authentication file format Certificate Authority access privileges See CA. Accounting Server Certificates Advanced Encryption Standard Fingerprint See AES. public key Alerts SHA1 Alternative subnet mask notation Certification Authority Antenna certifications antenna notices...
  • Page 202 Index IEEE 802.11g IEEE 802.1x Import Certificate Independent Basic Service Set EAP Authentication See IBSS Encryption 59, 76, 80, 83, 85 initialization vector (IV) encryption 14, 187 Internet Assigned Numbers Authority 56, 180 See IANA Ethernet device Internet Protocol version 6, see IPv6 Extended Service Set Internet telephony Extended Service Set, See ESS...
  • Page 203 Index Syslog Password Logs, Uses of PEAP Personal Information Exchange Syntax Standard PFX PKCS#12 Preamble preamble mode MAC Filter Preamble Type 63, 66, 68, 71 Allow Association Pre-Shared Key Deny Association priorities Maintenance Association List product registration Backup Protected Extensible Authentication Protocol Restore 59, 188 Management Information Base (MIB)
  • Page 204 Index RootAP subnetting RTS (Request To Send) Syslog Logging threshold System Screens 181, 182 RTS/CTS Threshold General 63, 66, 68, 71, 91 Password Time Time and Date Setup Time Zone Security Mode, Choosing the Security Modes 802.1x-Static64 IEEE 802.1x-Only telnet IEEE 802.1x-Static128 IEEE 802.1x-Static64 Temporal Key Integrity Protocol...
  • Page 205 187, 188 Wireless Client 78, 82 application example 802.1x Static 64-bit, 802.1x Static 128-bit Access Point Wireless Client WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ZyXEL Device Wireless Settings Screen Ethernet parameters Access Point Mode good habits Antenna Introduction AP + Bridge Mode managing...
  • Page 206 Index NWA1121-NI User’s Guide...

Table of Contents