ZyXEL Communications NWA3560-N User Manual

ZyXEL Communications NWA3560-N User Manual

Nwa3000-n series wireless n business wlan 3000 series access point
Hide thumbs Also See for NWA3560-N:
Table of Contents

Advertisement

NWA3000-N Series
Wireless N Business WLAN 3000 Series Access Point
NWA3560-N: 802.11 a/b/g/n Dual-Radio Business
Access Point (Indoor)
NWA3160-N: 802.11 a/b/g/n Business Access
Point (Indoor)
NWA3550-N: 802.11 a/b/g/n Dual-Radio Outdoor
Business Access Point (Outdoor)
Default Login Details
I P Address
ht t ps: / / 192.168.1.2
User Nam e
Password
Version 2.23
www.zyxel.com
Edit ion 1, 7/ 2011
www.zyxel.com
adm in
1234
Copyright © 2011
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NWA3560-N

  • Page 1 NWA3000-N Series Wireless N Business WLAN 3000 Series Access Point NWA3560-N: 802.11 a/b/g/n Dual-Radio Business Access Point (Indoor) NWA3160-N: 802.11 a/b/g/n Business Access Point (Indoor) NWA3550-N: 802.11 a/b/g/n Dual-Radio Outdoor Business Access Point (Outdoor) Default Login Details I P Address ht t ps: / / 192.168.1.2...
  • Page 3: About This User's Guide

    About This User's Guide About This User's Guide Intended Audience This m anual is int ended for people who want t o configure a device using t he web configurat or. You should have at least a basic knowledge of TCP/ I P net working concept s and t opology. Related Documentation •...
  • Page 4: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and not es are shown in t his User ’s Guide. Warnings tell you about things that could harm you or your device. Not e: Not es t ell you ot her im port ant inform at ion ( for exam ple, ot her t hings you m ay need t o configure or helpful t ips) or recom m endat ions.
  • Page 5 Document Conventions Icons Used in Figures Figures in t his User ’s Guide m ay use t he following generic icons. The device icon is not an exact represent at ion of your device. device Com put er Not ebook com put er Server Print er Firewall...
  • Page 6: Safety Warnings

    Safety Warnings Safety Warnings • Do NOT use t his product near wat er, for exam ple, in a wet basem ent or near a swim m ing pool. • Do NOT expose your device t o da m pness, dust or corrosive liquids. •...
  • Page 7: Table Of Contents

    Contents Overview Contents Overview User’s Guide ........................... 17 Introduction ..........................19 The Web Configurator ........................27 Configuration Basics ........................43 Tutorials ............................49 Technical Reference ......................67 Dashboard ..........................69 Monitor .............................75 Management Mode ........................93 LAN Setting ..........................97 Wireless ...........................101 Device HA ..........................117 User ............................127 AP Profile ..........................135 MON Profile ..........................151 Certificates ..........................157...
  • Page 8 Contents Overview NWA3000-N Series User’s Guide...
  • Page 9: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions ......................4 Safety Warnings........................6 Contents Overview ........................7 Table of Contents ........................9 Part I: User’s Guide ................17 Chapter 1 Introduction..........................19 1.1 Overview ..........................19 1.2 Applications for the device ....................20 1.2.1 AP + Bridge ........................20 1.2.2 MBSSID ........................21...
  • Page 10 Table of Contents 3.1 Overview ..........................43 3.2 Object-based Configuration ....................43 3.3 Feature Configuration Overview ..................43 3.3.1 Feature ........................43 3.3.2 MGNT Mode .......................44 3.3.3 LAN Setting ........................44 3.3.4 Wireless ........................44 3.3.5 Device HA ........................44 3.4 Objects ..........................45 3.4.1 User ..........................45 3.4.2 AP Profile ........................45 3.4.3 MON Profile ........................46 3.5 System ..........................46 3.5.1 WWW, SSH, TELNET, FTP, SNMP, and Auth.
  • Page 11 Table of Contents Chapter 6 Monitor........................... 75 6.1 Overview ..........................75 6.1.1 What You Can Do in this Chapter ................75 6.2 What You Need to Know ......................75 6.3 LAN Status ...........................76 6.3.1 LAN Status Graph ......................78 6.4 AP List ..........................79 6.4.1 Station Count of AP ....................80 6.5 Radio List ..........................81 6.5.1 AP Mode Radio Information ..................82...
  • Page 12 Table of Contents 9.3.1 Edit AP List ......................104 9.4 MON Mode .........................105 9.4.1 Add/Edit Rogue/Friendly List ..................107 9.5 Load Balancing ........................108 9.5.1 Disassociating and Delaying Connections ...............109 9.6 DCS ........................... 111 9.7 Technical Reference ......................113 Chapter 10 Device HA ..........................117 10.1 Overview ..........................
  • Page 13 Table of Contents 13.1 Overview ..........................151 13.1.1 What You Can Do in this Chapter ................151 13.1.2 What You Need To Know ..................151 13.2 MON Profile ........................152 13.2.1 Add/Edit MON Profile .....................153 13.3 Technical Reference ......................154 Chapter 14 Certificates ........................... 157 14.1 Overview ..........................157 14.1.1 What You Can Do in this Chapter ................157 14.1.2 What You Need to Know ..................157...
  • Page 14 Table of Contents 15.7 Telnet ..........................195 15.8 FTP ..........................195 15.9 SNMP ..........................196 15.9.1 Supported MIBs ......................198 15.9.2 SNMP Traps ......................198 15.9.3 Configuring SNMP ....................198 15.9.4 Adding or Editing an SNMPv3 User Profile ............200 15.10 Internal RADIUS Server ....................200 15.10.1 Configuring the Internal RADIUS Server ..............201 15.10.2 Adding or Editing a Trusted AP Profile ..............203 15.11 Technical Reference .......................204 Chapter 16...
  • Page 15 Table of Contents Chapter 19 Reboot ........................... 237 19.1 Overview ..........................237 19.1.1 What You Need To Know ..................237 19.2 Reboot ..........................237 Chapter 20 Shutdown..........................239 20.1 Overview ..........................239 20.1.1 What You Need To Know ..................239 20.2 Shutdown .........................239 Chapter 21 Troubleshooting........................
  • Page 16 Table of Contents NWA3000-N Series User’s Guide...
  • Page 17: User's Guide

    User’s Guide...
  • Page 19: Introduction

    H A P TE R Introduction 1.1 Overview Your device’s business- class reliabilit y, SMB feat ures, and cent ralized wireless m anagem ent m ake it ideally suit ed for advanced service delivery in m ission- crit ical net works. The device provides secure m obilit y across t he 2.4GHz and 5GHz spect rum s and t he I EEE 802.11n st andard’s high bandwidt h t o support high- perform ance applicat ions.
  • Page 20: Applications For The Device

    Chapter 1 Introduction 1.2 Applications for the device The device can be configured t o use t he following operat ing m odes • AP + Bridge • MBSSI D Applicat ions for each operat ing m ode are shown below. Not e: A different channel should be configured for each WLAN int erface t o reduce t he effect s of radio int erference.
  • Page 21: Mbssid

    Chapter 1 Introduction Unless specified, t he t erm “ securit y set t ings” refers t o t he t raffic bet ween t he wireless st at ions and t he device. Figure 1 AP + Bridge Applicat ion 1.2.2 MBSSID A Basic Service Set ( BSS) is t he set of devices form ing a single wireless net work ( usually an access point and one or m ore wireless client s) .
  • Page 22: Management Mode

    Chapter 1 Introduction 1.3 Management Mode One device uses Cont rol And Provisioning of Wireless Access Point s ( CAPWAP , see RFC 5415) t o allow one AP t o configure and m anage up t o 24 ot hers. This cent ralized m anagem ent can great ly reduce t he effort of set t ing up and m aint aining m ult iple devices.
  • Page 23: Good Habits For Managing The Device

    Chapter 1 Introduction Web Configurator The Web Configurat or allows easy device set up and m anagem ent using an I nt ernet browser. This User ’s Guide provides inform at ion about t he Web Configurat or. Command-Line Interface (CLI) The CLI allows you t o use t ext- based com m ands t o configure t he device.
  • Page 24: Hardware Connections

    Chapter 1 Introduction • Back up t he configurat ion ( and m ake sure you know how t o rest ore it ) . Rest oring an earlier working configurat ion m ay be useful if t he device becom es unst able or even crashes. I f you forget your password, you will have t o reset t he device t o it s fact ory default set t ings.
  • Page 25: Leds

    Chapter 1 Introduction 1.7 LEDs The following are t he LED descript ions for your device. Figure 3 LEDs Table 2 LEDs LABEL COLOR STATUS DESCRIPTION WLAN Green The wireless LAN is act ive. Blinking The wireless LAN is act ive, and t ransm it t ing or receiving dat a.
  • Page 26: Starting And Stopping The Device

    Chapter 1 Introduction Table 2 LEDs ( cont inued) LABEL COLOR STATUS DESCRIPTION POWER/ SYS Green The device is receiving power and funct ioning properly. The device is not receiving power. Blinking Eit her • I f t he LED blinks during t he boot up process, t he syst em is st art ing up.
  • Page 27: The Web Configurator

    H A P TE R The Web Configurator 2.1 Overview The device Web Configurat or allows easy m anagem ent using an I nt ernet browser. I n order t o use t he Web Configurat or, you m ust : •...
  • Page 28 Chapter 2 The Web Configurator Click Login . I f you logged in using t he default user nam e and password, t he Upda t e Adm in I nfo screen appears. Ot herwise, t he dashboard appears. This screen appears every t im e you log in using t he default user nam e and default password. I f you change t he password for t he default user account , t his screen does not appear anym ore.
  • Page 29: The Main Screen

    Chapter 2 The Web Configurator 2.3 The Main Screen The Web Configurat or ’s m ain screen is divided int o t hese part s: Figure 4 The Web Configurat or ’s Main Screen • A - Tit le Bar •...
  • Page 30: Navigation Panel

    Chapter 2 The Web Configurator The icons provide t he following funct ions. Table 4 Tit le Bar: Web Configurat or I cons LABEL DESCRIPTION Logout Click t his t o log out of t he Web Configurat or. Help Click t his t o open t he help page for t he current screen.
  • Page 31 Chapter 2 The Web Configurator 2.3.2.2 Monitor Menu The m onit or m enu screens display st at us and st at ist ics inform at ion. Table 5 Monit or Menu Screens Sum m ary FOLDER OR LINK FUNCTION LAN St at us Displays general LAN int erface inform at ion and packet st at ist ics.
  • Page 32 Chapter 2 The Web Configurator Table 6 Configurat ion Menu Screens Sum m ary ( cont inued) FOLDER OR LINK FUNCTION AP Profile Radio Creat e and m anage wireless radio set t ings files t hat can be associat ed wit h different APs. SSI D Creat e and m anage wireless SSI D, securit y, and MAC filt ering set t ings files t hat can be associat ed wit h...
  • Page 33: Warning Messages

    Chapter 2 The Web Configurator 2.3.3 Warning Messages Warning m essages, such as t hose result ing from m isconfigurat ion, display in a popup window. Figure 7 Warning Message 2.3.4 Site Map Click Sit e M AP t o see an overview of links t o t he Web Configurat or screens. Click a screen’s link t o go t o t hat screen.
  • Page 34 Chapter 2 The Web Configurator following exam ple shows which configurat ion set t ings reference t he ldap- users user obj ect ( in t his case t he first firewall rule) . Figure 9 Obj ect Reference The fields vary wit h t he t ype of obj ect . The following t able describes labels t hat can appear in t his screen.
  • Page 35 Chapter 2 The Web Configurator 2.3.5.1 CLI Messages Click CLI t o look at t he CLI com m ands sent by t he Web Configurat or. These com m ands appear in a popup window, such as t he following. Figure 10 CLI Messages Click Cle a r t o rem ove t he current ly displayed inform at ion.
  • Page 36 Chapter 2 The Web Configurator Not e: To view t he funct ions in t he Web Configurat or user int erface t hat correspond direct ly t o specific device CLI com m ands, use t he CLI Messages window ( see Sect ion 2.3.5.1 on page 35) in t andem wit h t his one.
  • Page 37 Chapter 2 The Web Configurator Table 9 Console ( cont inued) LABEL DESCRIPTION Connect ion St at us This displays t he connect ion st at us of t he account current ly logged in. I f you are logged in and connect ed, t hen t his displays ‘Connect ed’. I f you lose t he connect ion, get disconnect ed, or logout , t hen t his displays ‘Not Connect ed’.
  • Page 38 Chapter 2 The Web Configurator Next , ent er t he Use r N a m e of t he account being used t o log int o your t arget device and t hen click You m ay be prom pt ed t o aut hent icat e your account password, depending on t he t ype of device t hat you are logging int o.
  • Page 39: Tables And Lists

    Chapter 2 The Web Configurator 2.3.6 Tables and Lists The Web Configurat or t ables and list s are quit e flexible and provide several opt ions for how t o display t heir ent ries. 2.3.6.1 Manipulating Table Display Here are som e of t he ways you can m anipulat e t he Web Configurat or t ables.
  • Page 40 Chapter 2 The Web Configurator Select a colum n heading cell’s right border and drag t o re- size t he colum n. Select a colum n heading and drag and drop it t o change t he colum n order. A green check m ark displays next t o t he colum n’s t it le when you drag t he colum n t o a valid new locat ion.
  • Page 41 Chapter 2 The Web Configurator Table 10 Com m on Table I cons Here are descript ions for t he m ost com m on t able icons. Table 11 Com m on Table I cons LABEL DESCRIPTION Click t his t o creat e a new ent ry. For feat ures where t he ent ry’s posit ion in t he num bered list is im port ant ( feat ures where t he device applies t he t able’s ent ries in order like t he firewall for exam ple) , you can select an ent ry and click Add t o creat e a new ent ry aft er t he select ed ent ry.
  • Page 42 Chapter 2 The Web Configurator NWA3000-N Series User’s Guide...
  • Page 43: Configuration Basics

    H A P TE R Configuration Basics 3.1 Overview This sect ion provides inform at ion t o help you configure t he device effect ively. Som e of it is helpful when you are j ust get t ing st art ed. Som e of it is provided for your reference when you configure various feat ures in t he device.
  • Page 44: Mgnt Mode

    Chapter 3 Configuration Basics These are ot her feat ures you should configure before you configure t he m ain screen( s) for t his feat ure. I f you did not configure one of t he prerequisit es first , you can oft en select an opt ion t o creat e a new obj ect .
  • Page 45: Objects

    Chapter 3 Configuration Basics 3.4 Objects Obj ect s st ore inform at ion and are referenced by ot her feat ures. I f you updat e t his inform at ion in response t o changes, t he device aut om at ically propagat es t he change t hrough t he feat ures t hat use t he obj ect .
  • Page 46: Mon Profile

    Chapter 3 Configuration Basics 3.4.3 MON Profile Use t hese screens t o set up m onit or m ode configurat ions t hat allow your connect ed APs t o scan for ot her wireless devices in t he vicinit y. Table 15 MON Profile Types TYPE ABILITIES...
  • Page 47: Diagnostics

    Chapter 3 Configuration Basics 3.5.4 Diagnostics The device can generat e a file cont aining t he device’s configurat ion and diagnost ic inform at ion. I t can also capt ure packet s going t hrough t he device’s int erfaces so you can analyze t hem t o ident ify net work problem s M a in t e n a n ce >...
  • Page 48 Chapter 3 Configuration Basics NWA3000-N Series User’s Guide...
  • Page 49: Tutorials

    H A P TE R Tutorials 4.1 Sample Network Setup This t ut orial shows you how t o use CAPWAP t o have one device cont rol ot her devices t o creat e a wireless net work t hat allows t wo t ypes of connect ions: st aff and guest . St aff connect ions have full access t o t he net work, while guest s are lim it ed t o I nt ernet access ( DNS, HTTP and HTTPS services) .
  • Page 50: Set The Management Modes

    Chapter 4 Tutorials The following VLAN set t ings are used in t his t ut orial: Table 16 Tut orial Topology Sum m ary VLAN VLAN ID IP ADDRESS Managem ent 10.10.99.10/ 24 St aff 10.1.101.254/ 24 Guest 10.1.102.254/ 24 Figure 14 Tut orial Guest VLAN Exam ple vlan 102 Con t r olle r...
  • Page 51: Set The Lan Ip Address And Management Vlan (Vlan99)

    Chapter 4 Tutorials 4.1.1.1 Controller Use t he Con figu r a t ion > M GN T M OD E screen t o set t he device t o cont roller m ode. The device reset s t o it s default set t ings for t he cont roller m ode including t he I P address of 192.168.1.2 and rest art s.
  • Page 52: Set Up Wireless User Authentication

    Chapter 4 Tutorials Open t he cont roller ’s Configur a t ion > LAN Se t t ing screen. • I P Addr e ss: Ent er 10.10.99.10. • Subne t M a sk : Ent er 255.255.255.0. • Ga t e w a y: Ent er 10.10.99.10. •...
  • Page 53 Chapter 4 Tutorials Open t he Con figu r a t ion > Syst e m > Au t h . Se r ve r screen. Turn on t he aut hent icat ion server and select t he cert ificat e t o use. Click Apply. Open t he Con figu r a t ion >...
  • Page 54: Create The Ap Profiles (Staff, Guest)

    Chapter 4 Tutorials Use r N a m e : Ent er ‘guest 1’. Use r Type : Use r Pa ssw or d: Ent er ‘guest 1’, and re- ent er it in t he Re t ype field t o confirm . Click OK t o save t hese set t ings.
  • Page 55 Chapter 4 Tutorials The Add Se cur it y Pr ofile window opens. Pr ofile N a m e : Ent er w a p2 . Se cur it y M ode : Select w pa 2 from t he list of available wireless securit y encrypt ion m et hods. Under Se cur it y M ode , select 8 0 2 .1 X t hen set t he Ra diu s Se r ve r Type t o I nt e r na l.
  • Page 56 Chapter 4 Tutorials The Add SSI D Pr ofile window opens. Pr ofile N a m e : Ent er ‘st aff’. SSI D : Ent er ‘st aff’. This is t he wireless net work nam e t hat appears when wireless client s are looking for net works t o j oin.
  • Page 57: Rogue Ap Detection

    Chapter 4 Tutorials The Edit Ra dio Pr ofile window opens. Act iva t e : Select t his t o m ake t he radio profile act ive. M BSSI D Se t t in gs: Select an ent ry t o change it t o a drop- down list . Set # 1, t o t he st a ff SSI D profile and # 2 t o t he gue st SSI D profile.
  • Page 58 Chapter 4 Tutorials I n t his exam ple, an em ployee illicit ly connect s his own AP ( RG) t o t he net work t hat t he device m anages. While not necessarily a m alicious act , it can nonet heless have severe securit y consequences on t he net work.
  • Page 59 Chapter 4 Tutorials Here, an at t acker set s up a rogue AP ( RG) out side t he net work, which he uses in an at t em pt t o m im ic an device- cont rolled SSI D in order t o capt ure passwords and ot her inform at ion when aut horized wireless client s m ist akenly connect t o it .
  • Page 60 Chapter 4 Tutorials Click t he Add but t on. When t he Add M on Pr ofile window opens, configure t he following: Act iva t e : Select t his t o allow your m onit or APs t o use t his profile. Pr ofile N a m e : For t he purposes of t his t ut orial set t his t o ‘Monit or01’.
  • Page 61: Rogue Ap Containment

    Chapter 4 Tutorials Select an AP and click Edit . When t he Edit AP List window opens, configure t he following: Ra dio 1 OP M ode: Set t his t o M ON M ode t o t urn t he AP int o a rogue AP m onit oring device. Ra dio 1 Pr ofile: Select your newly creat ed ‘Monit or01’...
  • Page 62 Chapter 4 Tutorials However, if a rogue AP independent of t he device m im ics a legit im at e one, t hen t he device can int erfere wit h it by broadcast ing dum m y packet s so t hat it cannot m akes connect ions wit h em ployee client s and capt ure dat a from t hem .
  • Page 63: Load Balancing

    Chapter 4 Tutorials Click t he Add but t on. When t he Edit Rogu e / Fr ie n dly AP List opens, past e t he M AC a ddr e ss copied from t he ot her screen in t he corresponding field, set it s Role as Rogu e AP and t hen click OK t o save your changes.
  • Page 64: Dynamic Channel Selection

    Chapter 4 Tutorials Click Configur a t ion > W ir e le ss > Loa d Ba la ncing. Select Ena ble Loa d Ba la ncing t o t urn on t his feat ure. Set t he M ode . I f you choose By St a t ion N um be r, t hen ent er t he M a x St a t ion N u m be r in t he available field.
  • Page 65 Chapter 4 Tutorials Click Configur a t ion > W ir e le ss > D CS. Select Ena ble D yna m ic Cha nne l Se le ct ion t o t urn on t his feat ure. Set t he D CS Tim e I nt e r va l.
  • Page 66 Chapter 4 Tutorials NWA3000-N Series User’s Guide...
  • Page 67: Technical Reference

    Technical Reference...
  • Page 69: Dashboard

    H A P TE R Dashboard 5.1 Overview Use t he D a shboa r d screens t o check st at us inform at ion about t he device. 5.1.1 What You Can Do in this Chapter • The m ain D a shboa r d screen ( Sect ion 5.2 on page 69) displays t he device’s general device inform at ion, syst em st at us, syst em resource usage, and int erface st at us.
  • Page 70 Chapter 5 Dashboard inform at ion, syst em st at us, syst em resource usage, and int erface st at us in widget s t hat you can re- arrange t o suit your needs. You can also collapse, refresh, and close individual widget s. Figure 18 Dashboard The following t able describes t he labels in t his screen.
  • Page 71 Chapter 5 Dashboard Table 17 Dashboard ( cont inued) LABEL DESCRIPTION Syst em Resources CPU Usage This field displays what percent age of t he device’s processing capabilit y is current ly being used. Hover your cursor over t his field t o display t he Sh ow CPU Usa ge icon t hat t akes you t o a chart of t he device’s recent CPU usage.
  • Page 72 Chapter 5 Dashboard Table 17 Dashboard ( cont inued) LABEL DESCRIPTION Boot St at us This field displays det ails about t he device’s st art up st at e. OK - The device st art ed up successfully. Fir m w a r e u pda t e OK - A firm ware updat e was successful. Pr oble m a t ic con figu r a t ion a ft e r fir m w a r e u pda t e - The applicat ion of t he configurat ion failed aft er a firm ware upgrade.
  • Page 73: Cpu Usage

    Chapter 5 Dashboard Table 17 Dashboard ( cont inued) LABEL DESCRIPTION Act ion Use t his field t o get or t o updat e t he I P address for t he int erface. Click Re n e w t o send a new DHCP request t o a DHCP server. Top 5 St at ion When t he device is in cont roller m ode t his displays t he t op 5 Access Point s ( AP) wit h t he highest num ber of st at ion ( aka wireless client ) connect ions...
  • Page 74: Memory Usage

    Chapter 5 Dashboard The following t able describes t he labels in t his screen. Table 18 Dashboard > CPU Usage LABEL DESCRIPTION The y- axis represent s t he percent age of CPU usage. t im e The x- axis shows t he t im e period over which t he CPU usage occurred Refresh I nt erval Ent er how oft en you want t his window t o be aut om at ically updat ed.
  • Page 75: Monitor

    H A P TE R Monitor 6.1 Overview Use t he M on it or screens t o check st at us and st at ist ics inform at ion. 6.1.1 What You Can Do in this Chapter • The LAN St a t u s screen ( Sect ion 6.3 on page 76) displays general LAN int erface inform at ion and packet st at ist ics.
  • Page 76: Lan Status

    Chapter 6 Monitor 6.3 LAN Status Use t his screen t o look at general LAN int erface inform at ion and packet st at ist ics. To access t his screen, click M onit or > LAN St a t us. Figure 21 Monit or >...
  • Page 77 Chapter 6 Monitor Table 20 Monit or > LAN St at us ( cont inued) LABEL DESCRIPTION I P Addr/ Net m ask This field displays t he current I P address and subnet m ask assigned t o t he int erface.
  • Page 78: Lan Status Graph

    Chapter 6 Monitor 6.3.1 LAN Status Graph Use t he port st at ist ics graph t o look at a line graph of packet st at ist ics for t he device’s physical LAN port . To view, in t he LAN St a t u s screen click t he Sw it ch t o Gr a phic Vie w but t on. Figure 22 Monit or >...
  • Page 79: Ap List

    Chapter 6 Monitor 6.4 AP List Use t his screen t o view which APs are current ly connect ed t o t he device. This is available when t he device is in cont roller m ode. To access t his screen, click M onit or > W ir e le ss > AP I nfor m a t ion > AP List .
  • Page 80: Station Count Of Ap

    Chapter 6 Monitor 6.4.1 Station Count of AP Use t his screen t o look at st at ion st at ist ics for t he connect ed AP . To access t his screen, click t he M or e I nfor m a t ion but t on in t he AP List screen. Figure 24 Monit or >...
  • Page 81: Radio List

    Chapter 6 Monitor 6.5 Radio List Use t his screen t o view st at ist ics for t he device’s wireless radio t ransm it t ers when it is in st andalone m ode or t he radios in each of t he APs connect ed t o t he device when it is in cont roller m ode. To access t his screen, click M onit or >...
  • Page 82: Ap Mode Radio Information

    Chapter 6 Monitor 6.5.1 AP Mode Radio Information This screen allows you t o view a select ed radio’s MBSSI D det ails, wireless t raffic st at ist ics and st at ion count for t he preceding 24 hours. To access t his window, click t he M or e I nfor m a t ion but t on in t he Ra dio List St a t ist ics screen.
  • Page 83 Chapter 6 Monitor The following t able describes t he labels in t his screen. Table 26 Monit or > Wireless > AP I nform at ion > Radio List > More I nform at ion LABEL DESCRIPTION MBSSI D Det ail This list shows inform at ion about all t he wireless client s t hat have connect ed t o t he specified radio over t he preceding 24 hours.
  • Page 84: Station List

    Chapter 6 Monitor 6.6 Station List Use t his screen t o view st at ist ics pert aining t o t he associat ed st at ions ( or “ wireless client s” ) . Click M onit or > W ir e le ss > St a t ion I n fo t o access t his screen. Figure 27 Monit or >...
  • Page 85: Legacy Device Info

    Chapter 6 Monitor Not e: The device or at least one of t he APs t he device is m anaging m ust be set t o M on it or m ode in order t o det ect ot her wireless devices in it s vicinit y. Figure 28 Monit or >...
  • Page 86: Legacy Device Info Add Or Edit

    Chapter 6 Monitor • NWA- 3160 • NWA- 3163 • NWA- 3500 • NWA- 3550 • NWA- 3166 Figure 29 Monit or > Wireless > Legacy Device I nfo The following t able describes t he labels in t his screen. Table 29 Monit or >...
  • Page 87: View Log

    Chapter 6 Monitor The following t able describes t he labels in t his screen. Table 30 Monit or > Wireless > Legacy Device I nfo LABEL DESCRIPTION Device I P Ent er t he legacy AP’s I P address. Address Descript ion Ent er a descript ion t o help you ident ify t he legacy AP .
  • Page 88 Chapter 6 Monitor Event s t hat generat e an alert ( as well as a log m essage) display in red. Regular logs display in black. Click a colum n’s heading cell t o sort t he t able ent ries by t hat colum n’s crit eria. Click t he heading cell again t o reverse t he sort order.
  • Page 89 Chapter 6 Monitor Table 31 Monit or > Log > View Log ( cont inued) LABEL DESCRIPTION Source I nt erface This displays when you show t he filt er. Select t he source int erface of t he packet t hat generat ed t he log m essage.
  • Page 90: View Ap Log

    Chapter 6 Monitor 6.10 View AP Log Use t his screen t o view a m anaged AP’s log. Click M onit or > Log > Vie w AP Log t o access t his screen. Figure 32 Monit or > Log > View AP Log The following t able describes t he labels in t his screen.
  • Page 91 Chapter 6 Monitor Table 32 Monit or > Log > View AP Log ( cont inued) LABEL DESCRIPTION Display Select t he log file from t he specified AP t hat you want displayed. Note: This criterion only appears when you Show Filter. Priorit y Select a priorit y level t o use for filt ering displayed log m essages.
  • Page 92 Chapter 6 Monitor NWA3000-N Series User’s Guide...
  • Page 93: Management Mode

    H A P TE R Management Mode 7.1 Overview This chapt er discusses using t he device in m anagem ent m ode, which det erm ines whet her t he device is used in it s default st andalone m ode, or as part of a Cont rol And Provisioning of Wireless Access Point s ( CAPWAP) net work.
  • Page 94: Managed Ap Finds The Controller

    Chapter 7 Management Mode An AP in m anaged AP m ode j oins a wired net work ( receives a dynam ic I P address) . The AP sends out a discovery request , looking for an AP in CAPWAP AP cont roller m ode. I f t here is an AP cont roller on t he net work, it receives t he discovery request .
  • Page 95: Notes On Capwap

    Chapter 7 Management Mode DHCP Opt ion 138 allows t he CAPWAP m anagem ent request ( from t he AP in m anaged AP m ode) t o reach t he AP cont roller in a different subnet , as shown in t he following figure. Figure 34 CAPWAP and DHCP Opt ion 138 SUBNET 1 SUBNET 2...
  • Page 96 Chapter 7 Management Mode Click Configur a t ion > M GN T M OD E in t he device’s navigat ion m enu. The following screen displays. Figure 35 Configurat ion > MGNT MODE The following t able describes t he labels in t his screen. Table 33 Configurat ion >...
  • Page 97: Lan Setting

    H A P TE R LAN Setting 8.1 LAN Setting Overview Use t hese screens t o configure t he device’s LAN Et hernet int erface including VLAN set t ings. 8.1.1 What You Can Do in this Chapter • The LAN Se t t ing screens ( Sect ion 8.2 on page 98) m anage t he LAN Et hernet int erface including...
  • Page 98: Lan Setting

    Chapter 8 LAN Setting 8.2 LAN Setting This screen list s every Et hernet int erface. To access t his screen, click Configu r a t ion > LAN Se t t in g. Figure 36 Configurat ion > LAN Set t ing NWA3000-N Series User’s Guide...
  • Page 99 Chapter 8 LAN Setting Each field is described in t he following t able. Table 34 Configurat ion > LAN Set t ing LABEL DESCRIPTION I P Address Assignm ent This opt ion appears when t he M GN T M ode is set t o St a n d Alon e AP. Select Aut om at ically t his t o m ake t he int erface a DHCP client and aut om at ically get t he I P address, subnet m ask, and gat eway address from a DHCP server.
  • Page 100: Add Or Edit A Dns Setting

    Chapter 8 LAN Setting 8.2.1 Add or Edit a DNS Setting Use t his screen t o configure a DNS server ent ry for t he LAN. Click Con figu r a t ion > LAN Se t t in g and t hen click t he Add but t on or select a DNS server ent ry from t he list and click t he Edit but t on t o access t his screen.
  • Page 101: Wireless

    H A P TE R Wireless 9.1 Overview Use t he W ir e le ss screens t o configure how t he device m anages t he Access Point t hat are connect ed t o it . 9.1.1 What You Can Do in this Chapter •...
  • Page 102: Controller

    Chapter 9 Wireless 9.2 Controller Use t his screen t o set how t he device allows new APs t o connect t o t he net work. This is available when t he device is in cont roller m ode. Click Configur a t ion > W ir e le ss > Cont r olle r t o access t his screen.
  • Page 103 Chapter 9 Wireless set t ings if it is in st andalone m ode or t he general wireless set t ings of all of t he device’s m anaged APs if t he device is in cont roller m ode. Figure 39 Configurat ion >...
  • Page 104: Edit Ap List

    Chapter 9 Wireless The following fields display if t he Ndevice is in st andalone m ode. Table 38 Configurat ion > Wireless > AP Managem ent ( St andalone Mode) LABEL DESCRIPTION Model This field displays t he AP’s hardware m odel inform at ion. I t displays “ N/ A” ( not applicable) only when t he AP disconnect s from t he device and t he inform at ion is unavailable as a result .
  • Page 105: Mon Mode

    Chapter 9 Wireless Table 39 Configurat ion > Wireless > Edit AP List ( cont inued) LABEL DESCRIPTION Radio 1 OP Mode Select t he operat ing m ode for radio 1. AP M ode m eans t he AP can receive connect ions from wireless client s and pass t heir dat a t raffic t hrough t o t he device t o be m anaged ( or subsequent ly passed on t o an upst ream gat eway for m anaging) .
  • Page 106 Chapter 9 Wireless Click Configur a t ion > W ir e le ss > M ON M ode t o access t his screen. Figure 42 Configurat ion > Wireless > MON Mode Each field is described in t he following t able. Table 40 Configurat ion >...
  • Page 107: Add/Edit Rogue/Friendly List

    Chapter 9 Wireless Table 40 Configurat ion > Wireless > MON Mode ( cont inued) LABEL DESCRIPTION I m port ing/ Export ing These cont rols allow you t o export t he current list of rogue and friendly APs or im port exist ing list s. File Pat h / Browse / Ent er t he file nam e and pat h of t he list you want t o im port or click t he I m port ing...
  • Page 108: Load Balancing

    Chapter 9 Wireless 9.5 Load Balancing Use t his screen t o configure wireless net work t raffic load balancing bet ween t he APs on your net work. Click Configur a t ion > W ir e le ss > Loa d Ba la ncing t o access t his screen. Figure 44 Configurat ion >...
  • Page 109: Disassociating And Delaying Connections

    Chapter 9 Wireless Table 42 Configurat ion > Wireless > Load Balancing ( cont inued) LABEL DESCRIPTION Apply Click Apply t o save your changes back t o t he device. Reset Click Re se t t o ret urn t he screen t o it s last- saved set t ings. 9.5.1 Disassociating and Delaying Connections When your AP becom es overloaded, t here are t wo basic responses it can t ake.
  • Page 110 Chapter 9 Wireless The second response your AP can t ake is t o kick t he connect ions t hat are pushing it over it s balanced bandwidt h allot m ent . Figure 46 Kicking a Connect ion Connect ions are kicked based on eit her idle t im e ou t or sign a l st r e n gt h .
  • Page 111: Dcs

    Chapter 9 Wireless 9.6 DCS Use t his screen t o configure dynam ic radio channel select ion. Click Configur a t ion > W ir e le ss > D CS t o access t his screen. Figure 47 Configurat ion > Wireless > DCS Each field is described in t he following t able.
  • Page 112 Chapter 9 Wireless Table 43 Configurat ion > Wireless > DCS ( cont inued) LABEL DESCRIPTION DCS Sensit ivit y Select t he AP’s sensit ivit y level t oward ot her channels. Opt ions are H igh, Level M e diu m , and Low . Generally, as long as t he area in which your AP is locat ed has m inim al int erference from ot her devices you can set t he D CS Se n sit ivit y Le ve l t o Low .
  • Page 113: Technical Reference

    Chapter 9 Wireless Table 43 Configurat ion > Wireless > DCS ( cont inued) LABEL DESCRIPTION 5- GHz Channel Select how you want t o specify t he channels t he device swit ches bet ween for 5 Select ion Met hod GHz operat ion.
  • Page 114 Chapter 9 Wireless Three channels are sit uat ed in such a way as t o creat e alm ost no int erference wit h one anot her if used exclusively: 1, 6 and 11. When an AP broadcast s on any of t hese t hree channels, it should not int erfere wit h neighboring APs as long as t hey are also lim it ed t o sam e t rio.
  • Page 115 Chapter 9 Wireless Loa d ba la ncin g by t r a ffic le ve l lim it s t he num ber of connect ions t o t he AP based on m axim um bandwidt h available. I f you are uncert ain as t o t he exact num ber of wireless connect ions you will have t hen choose t his opt ion.
  • Page 116 Chapter 9 Wireless NWA3000-N Series User’s Guide...
  • Page 117: Device Ha

    HAPTER Device HA 10.1 Overview Device HA is available when t he device is in cont roller m ode. Device HA let s a backup device ( also in cont roller m ode) aut om at ically t ake over if t he m ast er device fails. Figure 51 Device HA Backup Taking Over for t he Mast er I n t his exam ple, device B is t he backup for device A in t he event som et hing happens t o it and prevent s it from m anaging t he wireless net work.
  • Page 118: Before You Begin

    Chapter 10 Device HA Synchronization Use synchronizat ion t o have a backup device copy t he m ast er device’s configurat ion, and cert ificat es. Not e: Only devices of t he sam e m odel and firm ware version can synchr onize. Ot herwise you m ust m anually configure t he m ast er device’s set t ings on t he backup ( by edit ing copies of t he configurat ion files in a t ext edit or for exam ple) .
  • Page 119 Chapter 10 Device HA Table 44 Configurat ion > Device HA > General ( cont inued) LABEL DESCRIPTION Virt ual Rout er I P This is t he int erface’s I P address and subnet m ask. Whichever device is t he / Net m ask m ast er uses t his virt ual rout er I P address and subnet m ask.
  • Page 120: Active-Passive Mode

    Chapter 10 Device HA 10.3 Active-Passive Mode The D e vice H A Act ive - Pa ssive M ode screen let s you configure general act ive- passive m ode device HA set t ings, view and m anage t he list of m onit ored int erfaces, and synchronize backup devices.
  • Page 121 Chapter 10 Device HA The following t able describes t he labels in t his screen. Table 45 Configurat ion > Device HA > Act ive- Passive Mode LABEL DESCRIPTION Show / Hide Click t his but t on t o display a great er or lesser num ber of configurat ion fields. Advanced Set t ings Device Role...
  • Page 122 Chapter 10 Device HA Table 45 Configurat ion > Device HA > Act ive- Passive Mode ( cont inued) LABEL DESCRIPTION Virt ual Rout er I P / This is t he m ast er device’s ( st at ic) I P address and subnet m ask for t his int erface. Net m ask I f a backup t akes over for t he m ast er, it uses t his I P address.
  • Page 123: Edit Monitored Interface

    Chapter 10 Device HA 10.3.1 Edit Monitored Interface This screen let s you enable or disable m onit oring of an int erface and set t he int erface’s m anagem ent I P address and subnet m ask. To access t his screen, click Configu r a t ion > D e vice H A >...
  • Page 124 Chapter 10 Device HA Virtual Router The m ast er and backup device form a single ‘virt ual rout er ’. I n t he following exam ple, m ast er device A and backup device B form a virt ual rout er. Figure 55 Virt ual Rout er Cluster ID You can have m ult iple device virt ual rout ers on your net work.
  • Page 125 Chapter 10 Device HA Virtual Router and Management IP Addresses • I f a backup t akes over for t he m ast er, it uses t he m ast er ’s I P addresses. These I P addresses are know as t he virt ual rout er I P addresses.
  • Page 126 Chapter 10 Device HA NWA3000-N Series User’s Guide...
  • Page 127: User

    HAPTER User 11.1 Overview This chapt er describes how t o set up user account s and user set t ings for t he device. You can also set up rules t hat cont rol when users have t o log in t o t he device before t he device rout es t raffic for t hem .
  • Page 128: User Summary

    Chapter 11 User 11.2 User Summary The Use r screen provides a sum m ary of all user account s. To access t his screen click Con figu r a t ion > Obj e ct > Use r. Figure 57 Configurat ion > Obj ect > User The following t able describes t he labels in t his screen.
  • Page 129 Chapter 11 User • _ [ underscores] • - [ dashes] The first charact er m ust be alphabet ical ( A- Z a- z) , an underscore ( _) , or a dash ( - ) . Ot her lim it at ions on user nam es are: •...
  • Page 130: Setting

    Chapter 11 User The following t able describes t he labels in t his screen. Table 49 Configurat ion > User > User > Add/ Edit A User LABEL DESCRIPTION User Nam e Type t he user nam e for t his user account . You m ay use 1- 31 alphanum eric charact ers, underscores( ) , or dashes ( - ) , but t he first charact er cannot be a num ber.
  • Page 131 Chapter 11 User To access t his screen, login t o t he Web Configurat or, and click Con figu r a t ion > Obj e ct > Use r > Se t t in g. Figure 59 Configurat ion > Obj ect > User > Set t ing The following t able describes t he labels in t his screen.
  • Page 132: Edit User Authentication Timeout Settings

    Chapter 11 User Table 50 Configurat ion > Obj ect > User > Set t ing ( cont inued) LABEL DESCRIPTION User Type These are t he kinds of user account t he device support s. • a dm in - t his user can look at and change t he configurat ion of t he device •...
  • Page 133 Chapter 11 User To access t his screen, go t o t he Configur a t ion > Obj e ct > Use r > Se t t ing screen, and click one of t he D e fa ult Aut he nt ica t ion Tim e out Se t t ings sect ion’s Edit icons. Figure 60 User >...
  • Page 134 Chapter 11 User NWA3000-N Series User’s Guide...
  • Page 135: Ap Profile

    HAPTER AP Profile 12.1 Overview This chapt er shows you how t o configure preset profiles for t he Access Point s ( APs) connect ed t o your device’s wireless net work. 12.1.1 What You Can Do in this Chapter •...
  • Page 136: Radio

    Chapter 12 AP Profile WEP ( Wired Equivalent Privacy) encrypt ion scram bles all dat a packet s t ransm it t ed bet ween t he AP and t he wireless st at ions associat ed wit h it in order t o keep net work com m unicat ions privat e. Bot h t he wireless st at ions and t he access point s m ust use t he sam e WEP key for dat a encrypt ion and decrypt ion.
  • Page 137 Chapter 12 AP Profile The following t able describes t he labels in t his screen. Table 52 Configurat ion > Obj ect > AP Profile > Radio LABEL DESCRIPTION Click t his t o add a new radio profile. Edit Click t his t o edit t he select ed radio profile.
  • Page 138: Add/Edit Radio Profile

    Chapter 12 AP Profile 12.2.1 Add/Edit Radio Profile This screen allows you t o creat e a new radio profile or edit an exist ing one. To access t his screen, click t he Add but t on or select a radio profile from t he list and click t he Edit but t on. Figure 62 Configurat ion >...
  • Page 139 Chapter 12 AP Profile Table 53 Configurat ion > Obj ect > AP Profile > Add/ Edit Profile ( cont inued) LABEL DESCRIPTION Act ivat e Select t his opt ion t o m ake t his profile act ive. Profile Nam e Ent er up t o 31 alphanum eric charact ers t o be used as t his profile’s nam e.
  • Page 140 Chapter 12 AP Profile Table 53 Configurat ion > Obj ect > AP Profile > Add/ Edit Profile ( cont inued) LABEL DESCRIPTION RTS/ CTS Use RTS/ CTS t o reduce dat a collisions on t he wireless net work if you have Threshold wireless client s t hat are associat ed wit h t he sam e AP but out of range of one anot her.
  • Page 141 Chapter 12 AP Profile Table 53 Configurat ion > Obj ect > AP Profile > Add/ Edit Profile ( cont inued) LABEL DESCRIPTION WDS Set t ings This sect ion displays if you set t he Ope r a t in g M ode t o AP+ Br idge . Configure t he securit y set t ings for t he device’s Wireless Dist ribut ion Syst em ( WDS) , t he wireless connect ion bet ween t wo or m ore APs.
  • Page 142: Ssid

    Chapter 12 AP Profile 12.3 SSID The SSI D screens allow you t o configure t hree different t ypes of profiles for your net worked APs: an SSI D list , which can assign specific SSI D configurat ions t o your APs; a securit y list , which can assign specific encrypt ion m et hods t o t he APs when allowing wireless client s t o connect t o t hem ;...
  • Page 143 Chapter 12 AP Profile 12.3.1.1 Add/Edit SSID Profile This screen allows you t o creat e a new SSI D profile or edit an exist ing one. To access t his screen, click t he Add but t on or select an SSI D profile from t he list and click t he Edit but t on. Figure 64 Configurat ion >...
  • Page 144: Security List

    Chapter 12 AP Profile Table 55 Configurat ion > Obj ect > AP Profile > Add/ Edit SSI D Profile ( cont inued) LABEL DESCRIPTION Select a Qualit y of Service ( QoS) access cat egory t o associat e wit h t his SSI D. Access cat egories m inim ize t he delay of dat a packet s across a wireless net work.
  • Page 145 Chapter 12 AP Profile Not e: You can have a m axim um of 32 securit y pr ofiles on t he device. Figure 65 Configurat ion > Obj ect > AP Profile > SSI D > Securit y List The following t able describes t he labels in t his screen.
  • Page 146 Chapter 12 AP Profile The following t able describes t he labels in t his screen. Table 57 SSI D > Securit y Profile > Add/ Edit Securit y Profile LABEL DESCRIPTION Profile Nam e Ent er up t o 31 alphanum eric charact ers for t he profile nam e. This nam e is only visible in t he Web Configurat or and is only for m anagem ent purposes.
  • Page 147: Mac Filter List

    Chapter 12 AP Profile Table 57 SSI D > Securit y Profile > Add/ Edit Securit y Profile ( cont inued) LABEL DESCRIPTION Key Lengt h Select t he bit- lengt h of t he encrypt ion key t o be used in WEP connect ions. I f you select W EP- 6 4 : •...
  • Page 148 Chapter 12 AP Profile Not e: You can have a m axim um of 32 MAC filt ering profiles on t he device. Figure 67 Configurat ion > Obj ect > AP Profile > SSI D > MAC Filt er List The following t able describes t he labels in t his screen.
  • Page 149 Chapter 12 AP Profile Not e: Each MAC filt ering profile can include a m axim um of 512 MAC addresses. Figure 68 SSI D > MAC Filt er List > Add/ Edit MAC Filt er Profile The following t able describes t he labels in t his screen. Table 59 SSI D >...
  • Page 150 Chapter 12 AP Profile NWA3000-N Series User’s Guide...
  • Page 151: Mon Profile

    HAPTER MON Profile 13.1 Overview This screen allows you t o set up m onit or m ode configurat ions t hat allow your connect ed APs t o scan for ot her wireless devices in t he vicinit y. Once det ect ed, you can use t he MON Mode screen Chapt er 9 on page 101) t o classify t hem as eit her rogue or friendly and t hen m anage t hem accordingly.
  • Page 152: Mon Profile

    Chapter 13 MON Profile 13.2 MON Profile This screen allows you t o creat e m onit or m ode configurat ions t hat can be used by t he APs. To access t his screen, login t o t he Web Configurat or, and click Con figu r a t ion > Obj e ct > M ON Pr ofile .
  • Page 153: Add/Edit Mon Profile

    Chapter 13 MON Profile 13.2.1 Add/Edit MON Profile This screen allows you t o creat e a new m onit or m ode profile or edit an exist ing one. To access t his screen, click t he Add but t on or select and exist ing m onit or m ode profile and click t he Edit but t on. Figure 70 Configurat ion >...
  • Page 154: Technical Reference

    Chapter 13 MON Profile Table 61 Configurat ion > Obj ect > MON Profile > Add/ Edit MON Profile ( cont inued) LABEL DESCRIPTION Set Scan Channel Move a channel from t he Ava ila ble ch a n n e ls colum n t o t he Ch a n n e ls List ( 2.4 G) se le ct e d colum n t o have t he APs using t his profile scan t hat channel when Sca n Ch a n n e l M ode is set t o m anual.
  • Page 155 Chapter 13 MON Profile encrypt ion- cracking soft ware. I n t his exam ple, t he at t acker now has access t o t he com pany net work, including sensit ive dat a st ored on t he file server ( C) . Friendly APs I f you have m ore t han one AP in your wireless net work, you should also configure a list of “...
  • Page 156 Chapter 13 MON Profile NWA3000-N Series User’s Guide...
  • Page 157: Certificates

    HAPTER Certificates 14.1 Overview The device can use cert ificat es ( also called digit al I Ds) t o aut hent icat e users. Cert ificat es are based on public- privat e key pairs. A cert ificat e cont ains t he cert ificat e owner ’s ident it y and public key. Cert ificat es provide a way t o exchange public keys for use in aut hent icat ion.
  • Page 158 Chapter 14 Certificates Addit ionally, Jenny uses her own privat e key t o sign a m essage and Tim uses Jenny’s public key t o verify t he m essage. The device uses cert ificat es based on public- key crypt ology t o aut hent icat e users at t em pt ing t o est ablish a connect ion, not t o encrypt t he dat a t hat you send aft er est ablishing a connect ion.
  • Page 159: Verifying A Certificate

    Chapter 14 Certificates • Binary PKCS# 12: This is a form at for t ransferri n g public key and privat e key cert ificat es.The privat e key in a PKCS # 12 file is wit hin a password- encrypt ed envelope. The file’s password is not connect ed t o your cert ificat e’s public or privat e passwords.
  • Page 160: My Certificates

    Chapter 14 Certificates 14.2 My Certificates Click Configur a t ion > Obj e ct > Ce r t ifica t e > M y Ce r t ifica t e s t o open t his screen. This is t he device’s sum m ary list of cert ificat es and cert ificat ion request s.
  • Page 161 Chapter 14 Certificates Table 62 Configurat ion > Obj ect > Cert ificat e > My Cert ificat es ( cont inued) LABEL DESCRIPTION Type This field displays what kind of cert ificat e t his is. REQ represent s a cert ificat ion request and is not yet a valid cert ificat e. Send a cert ificat ion request t o a cert ificat ion aut horit y, which t hen issues a cert ificat e.
  • Page 162: Add My Certificates

    Chapter 14 Certificates 14.2.1 Add My Certificates Click Configur a t ion > Obj e ct > Ce r t ifica t e > M y Ce r t ifica t e s and t hen t he Add icon t o open t he M y Ce r t ifica t e s Add screen.
  • Page 163 Chapter 14 Certificates The following t able describes t he labels in t his screen. Table 63 Configurat ion > Obj ect > Cert ificat e > My Cert ificat es > Add LABEL DESCRIPTION Nam e Type a nam e t o ident ify t his cert ificat e. You can use up t o 31 alphanum eric and ;...
  • Page 164 Chapter 14 Certificates Table 63 Configurat ion > Obj ect > Cert ificat e > My Cert ificat es > Add ( cont inued) LABEL DESCRIPTION Creat e a cert ificat ion Select t his t o have t he device generat e a request for a cert ificat e and apply request and enroll for t o a cert ificat ion aut horit y for a cert ificat e.
  • Page 165: Edit My Certificates

    Chapter 14 Certificates 14.2.2 Edit My Certificates Click Configur a t ion > Obj e ct > Ce r t ifica t e > M y Ce r t ifica t e s and t hen t he Edit icon t o open t he M y Ce r t ifica t e Edit screen.
  • Page 166 Chapter 14 Certificates The following t able describes t he labels in t his screen. Table 64 Configurat ion > Obj ect > Cert ificat e > My Cert ificat es > Edit LABEL DESCRIPTION Nam e This field displays t he ident ifying nam e of t his cert ificat e. You can use up t o 31 alphanum eric and ;...
  • Page 167: Import Certificates

    Chapter 14 Certificates Table 64 Configurat ion > Obj ect > Cert ificat e > My Cert ificat es > Edit LABEL DESCRIPTION Key Usage This field displays for what funct ions t he cert ificat e’s key can be used. For exam ple, “...
  • Page 168: Trusted Certificates

    Chapter 14 Certificates The cert ificat e you im port replaces t he corresponding request in t he M y Ce r t ifica t e s screen. You m ust rem ove any spaces in t he cert ificat e’s filenam e before you can im port it . Figure 75 Configurat ion >...
  • Page 169 Chapter 14 Certificates as being t rust wort hy; t hus you do not need t o im port any cert ificat e t hat is signed by one of t hese cert ificat es. Figure 76 Configurat ion > Obj ect > Cert ificat e > Trust ed Cert ificat es The following t able describes t he labels in t his screen.
  • Page 170: Edit Trusted Certificates

    Chapter 14 Certificates 14.3.1 Edit Trusted Certificates Click Con figu r a t ion > Obj e ct > Ce r t ifica t e > Tr ust e d Ce r t ifica t e s and t hen a cert ificat e’s Edit icon t o open t he Tr ust e d Ce r t ifica t e s Edit screen.
  • Page 171 Chapter 14 Certificates The following t able describes t he labels in t his screen. Table 67 Configurat ion > Obj ect > Cert ificat e > Trust ed Cert ificat es > Edit LABEL DESCRIPTION Nam e This field displays t he ident ifying nam e of t his cert ificat e. You can change t he nam e.
  • Page 172 Chapter 14 Certificates Table 67 Configurat ion > Obj ect > Cert ificat e > Trust ed Cert ificat es > Edit ( cont inued) LABEL DESCRIPTION I ssuer This field displays ident ifying inform at ion about t he cert ificat e’s issuing cert ificat ion aut horit y, such as Com m on Nam e, Organizat ional Unit , Organizat ion and Count ry.
  • Page 173: Import Trusted Certificates

    Chapter 14 Certificates 14.3.2 Import Trusted Certificates Click Configur a t ion > Obj e ct > Ce r t ifica t e > Tr u st e d Ce r t ifica t e s > I m por t t o open t he Tr u st e d Ce r t ifica t e s I m por t screen.
  • Page 174 Chapter 14 Certificates NWA3000-N Series User’s Guide...
  • Page 175: System

    HAPTER System 15.1 Overview Use t he syst em screens t o configure general device set t ings. 15.1.1 What You Can Do in this Chapter • The H ost N a m e screen ( Sect ion 15.2 on page 176) configures a unique nam e for t he device in your net work.
  • Page 176: Host Name

    Chapter 15 System 15.2 Host Name A host nam e is t he unique nam e by which a device is known on a net work. Click Con figu r a t ion > Syst e m > H ost N a m e t o open t his screen. Figure 79 Configurat ion >...
  • Page 177 Chapter 15 System To change your device’s t im e based on your local t im e zone and dat e, click Con figu r a t ion > Syst e m > D a t e / Tim e . The screen displays as shown. You can m anually set t he device’s t im e and dat e or have t he device get t he dat e and t im e from a t im e server.
  • Page 178 Chapter 15 System Table 70 Configurat ion > Syst em > Dat e/ Tim e ( cont inued) LABEL DESCRIPTION Get from Tim e Select t his radio but t on t o have t he device get t he t im e and dat e from t he t im e Server server you specify below.
  • Page 179: Pre-Defined Ntp Time Servers List

    Chapter 15 System 15.3.1 Pre-defined NTP Time Servers List When you t urn on t he device for t he first t im e, t he dat e and t im e st art at 2003- 01- 01 00: 00: 00. The device t hen at t em pt s t o synchronize wit h one of t he following pre- defined list of Net work Tim e Prot ocol ( NTP) t im e servers.
  • Page 180: Console Speed

    Chapter 15 System To get t he device dat e and t im e from a t im e server: Click Syst e m > D a t e / Tim e . Select Ge t fr om Tim e Se r ve r under Tim e a n d D a t e Se t u p. Under Tim e Zone Se t u p, select your Tim e Zon e from t he list .
  • Page 181: Www Overview

    Chapter 15 System 15.5 WWW Overview The following figure shows secure and insecure m anagem ent of t he device com ing in from t he WAN. HTTPS and SSH access are secure. HTTP , and Telnet m anagem ent access are not secure. Figure 83 Secure and I nsecure Service Access From t he WAN 15.5.1 Service Access Limitations A service cannot be used t o access t he device when you have disabled t hat service in t he...
  • Page 182: Configuring Www Service Control

    Chapter 15 System HTTPS client only should aut hent icat e it self when t he HTTPS server requires it t o do so ( select Aut he nt ica t e Clie nt Ce r t ifica t e s in t he W W W screen) . Aut he nt ica t e Clie nt Ce r t ifica t e s is opt ional and if select ed m eans t he HTTPS client m ust send t he device a cert ificat e.
  • Page 183: Https Example

    Chapter 15 System The following t able describes t he labels in t his screen. Table 73 Configurat ion > Syst em > WWW > Service Cont rol LABEL DESCRIPTION HTTPS Enable Select t he check box t o allow or disallow t he com put er wit h t he I P address t hat m at ches t he I P address( es) in t he Se r vice Con t r ol t able t o access t he device Web Configurat or using secure HTTPs connect ions.
  • Page 184 Chapter 15 System You see t he following Se cu r it y Ale r t screen in I nt ernet Explorer. Select Ye s t o proceed t o t he Web Configurat or login screen; if you select N o, t hen Web Configurat or access is blocked. Figure 86 Securit y Alert Dialog Box ( I nt ernet Explorer) 15.5.5.2 Avoiding Browser Warning Messages Here are t he m ain reasons your browser displays warnings about t he device’s HTTPS server...
  • Page 185 Chapter 15 System 15.5.5.3 Login Screen Aft er you accept t he cert ificat e, t he device login screen appears. The lock displayed in t he bot t om of t he browser st at us bar denot es a secure connect ion. Figure 87 Login Screen ( I nt ernet Explorer) 15.5.5.4 Enrolling and Importing SSL Client Certificates The SSL client needs a cert ificat e if Aut he nt ica t e Clie nt Ce r t ifica t e s is select ed on t he device.
  • Page 186 Chapter 15 System 15.5.5.5 Installing the CA’s Certificate Double click t he CA’s t rust ed cert ificat e t o produce a screen sim ilar t o t he one shown next . Click I n st a ll Ce r t ifica t e and follow t he wizard as shown earlier in t his appendix. 15.5.5.6 Installing a Personal Certificate You need a password in advance.
  • Page 187 Chapter 15 System Click N e x t t o begin t he wizard. The file nam e and pat h of t he cert ificat e you double- clicked should aut om at ically appear in t he File na m e t ext box.
  • Page 188 Chapter 15 System Ent er t he password given t o you by t he CA. Have t he wizard det erm ine where t he cert ificat e should be saved on your com put er or select Pla ce a ll ce r t ifica t e s in t h e follow ing st or e and choose a different locat ion.
  • Page 189 Chapter 15 System Click Finish t o com plet e t he wizard and begin t he im port process. You should see t he following screen when t he cert ificat e is correct ly inst alled on your com put er. 15.5.5.7 Using a Certificate When Accessing the device To access t he device via HTTPS: Ent er ‘ht t ps: / / device I P Address/ in your browser ’s web address field.
  • Page 190: Ssh

    Chapter 15 System When Aut he nt ica t e Clie nt Ce r t ifica t e s is select ed on t he device, t he following screen asks you t o select a personal cert ificat e t o send t o t he device. This screen displays even if you only have a single cert ificat e as in t he exam ple.
  • Page 191: How Ssh Works

    Chapter 15 System following figure, com put er B on t he I nt ernet uses SSH t o securely connect t o t he WAN port of t he device ( A) for a m anagem ent session. Figure 89 SSH Com m unicat ion Over t he WAN Exam ple 15.6.1 How SSH Works The following figure is an exam ple of how a secure connect ion is est ablished bet ween t wo rem ot e host s using SSH v1.
  • Page 192: Ssh Implementation On The Device

    Chapter 15 System Aut hent icat ion and Dat a Transm ission Aft er t he ident ificat ion is verified and dat a encrypt ion act ivat ed, a secure t unnel is est ablished bet ween t he client and t he server. The client t hen sends it s aut hent icat ion inform at ion ( user nam e and password) t o t he server t o log in t o t he server.
  • Page 193: Examples Of Secure Telnet Using Ssh

    Chapter 15 System The following t able describes t he labels in t his screen. Table 74 Configurat ion > Syst em > SSH LABEL DESCRIPTION Enable Select t he check box t o allow or disallow t he com put er wit h t he I P address t hat m at ches t he I P address( es) in t he Se r vice Con t r ol t able t o access t he device CLI using t his service.
  • Page 194 Chapter 15 System 15.6.5.2 Example 2: Linux This sect ion describes how t o access t he device using t he OpenSSH client program t hat com es wit h m ost Linux dist ribut ions. Test whet her t he SSH service is available on t he device. Ent er “...
  • Page 195: Telnet

    Chapter 15 System 15.7 Telnet You can use Telnet t o access t he device’s com m and line int erface. Click Con figu r a t ion > Syst e m > TELN ET t o configure your device for rem ot e Telnet access. Use t his screen t o enable or disable Telnet and set t he server port num ber.
  • Page 196: Snmp

    Chapter 15 System To change your device’s FTP set t ings, click Con figu r a t ion > Syst e m > FTP t ab. The screen appears as shown. Use t his screen t o specify FTP set t ings. Figure 96 Configurat ion >...
  • Page 197 Chapter 15 System one ( SNMPv1) , version t wo ( SNMPv2c) , and version t hree ( SNMPv3) . The next figure illust rat es an SNMP m anagem ent operat ion. Figure 97 SNMP Managem ent Model An SNMP m anaged net work consist s of t wo m ain t ypes of com ponent : agent s and a m anager. An agent is a m anagem ent soft ware m odule t hat resides in a m anaged device ( t he device) .
  • Page 198: Supported Mibs

    Chapter 15 System 15.9.1 Supported MIBs The device support s MI B I I t hat is defined in RFC- 1213 and RFC- 1215. The device also support s privat e MI Bs ( ZYXEL- ES- CAPWAP .MI B, ZYXEL- ES- COMMON.MI B, ZYXEL- ES- HYBRI DAP .MI B, ZYXEL- ES- PROWLAN.MI B, ZYXEL- ES- RFMGMT.MI B, ZYXEL- ES- SMI .MI B, and ZYXEL- ES- WI RELESS.MI B) t o collect inform at ion about CPU and m em ory usage and VPN t ot al t hroughput .
  • Page 199 Chapter 15 System The following t able describes t he labels in t his screen. Table 78 Configurat ion > Syst em > SNMP LABEL DESCRIPTION Enable Select t he check box t o allow or disallow users t o access t he device using SNMP . Server Port You m ay change t he server port num ber for a service if needed, however you m ust use t he sam e port num ber in order t o use t hat service for rem ot e...
  • Page 200: Adding Or Editing An Snmpv3 User Profile

    Chapter 15 System 15.9.4 Adding or Editing an SNMPv3 User Profile This screen allows you t o add or edit an SNMPv3 user profile. To access t his screen, click t he Con figu r a t ion > Syst e m > SN M P screen’s Add but t on or select a SNMPv3 user profile from t he list and click t he Edit but t on.
  • Page 201: Configuring The Internal Radius Server

    Chapter 15 System The following figure shows how t his is done. Wireless client s m ake access request s t o t rust ed APs, which relay t he request s t o t he device. Figure 100 Trust ed APs Overview Trusted APs RADIUS Server Wireless clients...
  • Page 202 Chapter 15 System Click Con figu r a t ion > Syst e m > Aut h. Se r ve r. The following screen displays. Figure 101 Configurat ion > Syst em > Aut h. Server The following t able describes t he labels in t his screen. Table 80 Configurat ion >...
  • Page 203: Adding Or Editing A Trusted Ap Profile

    Chapter 15 System Table 80 Configurat ion > Syst em > Aut h. Server ( cont inued) LABEL DESCRIPTION Apply Click OK t o save your changes back t o t he device. Reset Click Re se t t o st art configuring t his screen afresh. 15.10.2 Adding or Editing a Trusted AP Profile This screen allows you t o add or edit an int ernal RADI US server t rust ed AP profile.
  • Page 204: Technical Reference

    Chapter 15 System 15.11 Technical Reference This sect ion provides som e t echnical background inform at ion about t he t opics covered in t his chapt er. Internal RADIUS Server PEAP ( Prot ect ed EAP) and MD5 aut hent icat ion is im plem ent ed on t he int ernal RADI US server using sim ple usernam e and password m et hods over a secure TLS connect ion.
  • Page 205: Log And Report

    HAPTER Log and Report 16.1 Overview Use t he syst em screens t o configure daily report ing and log set t ings. 16.1.1 What You Can Do In this Chapter • The Em a il D a ily Re por t screen ( Sect ion 16.2 on page 205) configures how and where t o send daily report s and what report s t o send.
  • Page 206 Chapter 16 Log and Report Click Configur a t ion > Log & Re por t > Em a il D a ily Re por t t o display t he following screen. Configure t his screen t o have t he device e- m ail you syst em st at ist ics every day. Figure 103 Configurat ion >...
  • Page 207: Log Setting

    Chapter 16 Log and Report The following t able describes t he labels in t his screen. Table 82 Configurat ion > Log & Report > Em ail Daily Report LABEL DESCRIPTION Enable Em ail Select t his t o send report s by e- m ail every day. Daily Report Mail Server Type t he nam e or I P address of t he out going SMTP server.
  • Page 208: Log Setting Summary

    Chapter 16 Log and Report The Log Se t t in gs Sum m a r y screen provides a sum m ary of all t he set t ings. You can use t he Log Se t t in gs Edit screen t o m aint ain t he det ailed set t ings ( such as log cat egories, e- m ail addresses, server nam es, et c.) for any log.
  • Page 209 Chapter 16 Log and Report Table 83 Configurat ion > Log & Report > Log Set t ing ( cont inued) LABEL DESCRIPTION Log Form at This field displays t he form at of t he log. I n t e r n a l - syst em log; you can view t he log on t he V ie w Log t ab. VRPT/ Syslog - ZyXEL’s Vant age Report , syslog- com pat ible form at .
  • Page 210: Edit Log Settings

    Chapter 16 Log and Report 16.3.2 Edit Log Settings This screen cont rols t he det ailed set t ings for each log in t he syst em log ( which includes t he e- m ail profiles) . Go t o t he Log Se t t ings Sum m a r y screen and click t he syst em log Edit icon. Figure 105 Configurat ion >...
  • Page 211 Chapter 16 Log and Report Table 84 Configurat ion > Log & Report > Log Set t ing > Edit ( cont inued) LABEL DESCRIPTION Mail Server Type t he nam e or I P address of t he out going SMTP server. Mail Subj ect Type t he subj ect line for t he out going e- m ail.
  • Page 212 Chapter 16 Log and Report Table 84 Configurat ion > Log & Report > Log Set t ing > Edit ( cont inued) LABEL DESCRIPTION This field is a sequent ial value, and it is not associat ed wit h a specific address.
  • Page 213: Edit Remote Server

    Chapter 16 Log and Report 16.3.3 Edit Remote Server This screen cont rols t he set t ings for each log in t he rem ot e server ( syslog) . Go t o t he Log Se t t ings Sum m a r y screen and click a rem ot e server Edit icon.
  • Page 214: Active Log Summary

    Chapter 16 Log and Report The following t able describes t he labels in t his screen. Table 85 Configurat ion > Log & Report > Log Set t ing > Edit Rem ot e Server LABEL DESCRIPTION Log Set t ings for Rem ot e Server Act ive Select t his check box t o send log inform at ion according t o t he inform at ion in t his...
  • Page 215 Chapter 16 Log and Report exam ple, where and how oft en log inform at ion is e- m ailed or rem ot e server nam es) . To access t his screen, go t o t he Log Se t t in gs Sum m a r y screen, and click t he Act ive Log Sum m a r y but t on. Figure 107 Act ive Log Sum m ary This screen provides a different view and a different way of indicat ing which m essages are included in each log and each alert .
  • Page 216 Chapter 16 Log and Report The following t able describes t he fields in t his screen. Table 86 Configurat ion > Log & Report > Log Set t ing > Act ive Log Sum m ary LABEL DESCRIPTION Act ive Log I f t he device is set t o cont roller m ode, t he AC sect ion cont rols logs generat ed by Sum m ary t he cont roller and t he AP sect ion cont rols logs generat ed by t he m anaged APs.
  • Page 217 Chapter 16 Log and Report Table 86 Configurat ion > Log & Report > Log Set t ing > Act ive Log Sum m ary ( cont inued) LABEL DESCRIPTION Syst em log Select which event s you want t o log by Log Ca t e gor y. There are t hree choices: disa ble a ll logs ( red X) - do not log any inform at ion from t his cat egory e n a ble n or m a l logs ( green checkm ark) - creat e log m essages and alert s from t his cat egory...
  • Page 218 Chapter 16 Log and Report NWA3000-N Series User’s Guide...
  • Page 219: File Manager

    HAPTER File Manager 17.1 Overview Configurat ion files define t he device’s set t ings. Shell script s are files of com m ands t hat you can st ore on t he device and run when you need t hem . You can apply a configurat ion file or run a shell script wit hout t he device rest art ing.
  • Page 220: Configuration File

    Chapter 17 File Manager While configurat ion files and shell script s have t he sam e synt ax, t he device applies configurat ion files different ly t han it runs shell script s. This is explained below. Table 87 Configurat ion Files and Shell Script s in t he device Configurat ion Files ( .conf ) Shell Script s ( .zysh) •...
  • Page 221 Chapter 17 File Manager configurat ion files from t he device t o your com put er and upload configurat ion files from your com put er t o t he device. Once your device is configured and funct ioning properly, it is highly recom m ended t hat you back up your configurat ion file before m aking furt her configurat ion changes.
  • Page 222 Chapter 17 File Manager The following t able describes t he labels in t his screen. Table 88 Maint enance > File Manager > Configurat ion File LABEL DESCRIPTION Renam e Use t his but t on t o change t he label of a configurat ion file on t he device. You can only renam e m anually saved configurat ion files.
  • Page 223 Chapter 17 File Manager Table 88 Maint enance > File Manager > Configurat ion File ( cont inued) LABEL DESCRIPTION Apply Use t his but t on t o have t he device use a specific configurat ion file. Click a configurat ion file’s row t o select it and click Apply t o have t he device use t hat configurat ion file.
  • Page 224: Firmware Package

    Chapter 17 File Manager Table 88 Maint enance > File Manager > Configurat ion File ( cont inued) LABEL DESCRIPTION File Nam e This colum n displays t he label t hat ident ifies a configurat ion file. You cannot delet e t he following configurat ion files or change t heir file nam es. The syst e m - de fa u lt .con f file cont ains t he device’s default set t ings.
  • Page 225 Chapter 17 File Manager The firmware update can take up to five minutes. Do not turn off or reset the device while the firmware update is in progress! Figure 109 Maint enance > File Manager > Firm ware Package The following t able describes t he labels in t his screen. Table 89 Maint enance >...
  • Page 226: Shell Script

    Chapter 17 File Manager 17.4 Shell Script Use shell script files t o have t he device use com m ands t hat you specify. Use a t ext edit or t o creat e t he shell script files. They m ust use a “ .zysh” filenam e ext ension. Click M a in t e n a n ce >...
  • Page 227 Chapter 17 File Manager Table 90 Maint enance > File Manager > Shell Script ( cont inued) LABEL DESCRIPTION Use t his but t on t o have t he device use a specific shell script file. Click a shell script file’s row t o select it and click Ru n t o have t he device use t hat shell script file.
  • Page 228 Chapter 17 File Manager NWA3000-N Series User’s Guide...
  • Page 229: Diagnostics

    HAPTER Diagnostics 18.1 Overview Use t he diagnost ics screens for t roubleshoot ing. 18.1.1 What You Can Do in this Chapter • The D ia gnost ics screen ( Sect ion 18.2 on page 229) generat es a file cont aining t he device’s configurat ion and diagnost ic inform at ion if you need t o provide it t o cust om er support during t roubleshoot ing.
  • Page 230: Packet Capture

    Chapter 18 Diagnostics The following t able describes t he labels in t his screen. Table 91 Maint enance > Diagnost ics LABEL DESCRIPTION Filenam e This is t he nam e of t he m ost recent ly creat ed diagnost ic file. Last m odified This is t he dat e and t im e t hat t he last diagnost ic file was creat ed.
  • Page 231 Chapter 18 Diagnostics The following t able describes t he labels in t his screen. Table 92 Maint enance > Diagnost ics > Packet Capt ure LABEL DESCRIPTION I nt erfaces Enabled int erfaces ( except for virt ual int erfaces) appear under Ava ila ble I n t e r fa ce s.
  • Page 232: Packet Capture Files

    Chapter 18 Diagnostics 18.3.1 Packet Capture Files Click M a in t e na n ce > D ia gn ost ics > Pa ck e t Ca pt ur e > File s t o open t he packet capt ure files screen.
  • Page 233: Wireless Frame Capture

    Chapter 18 Diagnostics t runcat ed t he fram e because t he capt ure screen’s N u m be r Of Byt e s To Ca pt u r e ( Pe r Pa ck e t ) field was set t o 1500 byt es. Figure 115 Packet Capt ure File Exam ple 18.4 Wireless Frame Capture Use t his screen t o capt ure wireless net work t raffic going t hrough t he AP int erfaces connect ed t o...
  • Page 234 Chapter 18 Diagnostics Not e: New capt ure files overwr it e exist ing files of t he sam e nam e. Change t he File Su ffix field’s set t ing t o avoid t his. Figure 116 Maint enance > Diagnost ics > Wireless Fram e Capt ure > Capt ure The following t able describes t he labels in t his screen.
  • Page 235: Wireless Frame Capture Files

    Chapter 18 Diagnostics Table 94 Maint enance > Diagnost ics > Wireless Fram e Capt ure > Capt ure ( cont inued) LABEL DESCRIPTION File Prefix Specify t ext t o add t o t he front of t he file nam e in order t o help you ident ify fram e capt ure files.
  • Page 236 Chapter 18 Diagnostics Table 95 Maint enance > Diagnost ics > Wireless Fram e Capt ure > Files ( cont inued) LABEL DESCRIPTION File Nam e This colum n displays t he label t hat ident ifies t he file. The file nam e form at is int erface nam e- file suffix.cap.
  • Page 237: Reboot

    HAPTER Reboot 19.1 Overview Use t his t o rest art t he device. 19.1.1 What You Need To Know I f you applied changes in t he Web configurat or, t hese were saved aut om at ically and do not change when you reboot .
  • Page 238 Chapter 19 Reboot NWA3000-N Series User’s Guide...
  • Page 239: Shutdown

    HAPTER Shutdown 20.1 Overview Use t his screen t o shut down t he device. Always use Maintenance > Shutdown > Shutdown or the shutdown command before you turn off the device or remove the power. Not doing so can cause the firmware to become corrupt. 20.1.1 What You Need To Know Shut down writ es all cached dat a t o t he local st orage and st ops t he syst em processes.
  • Page 240 Chapter 20 Shutdown NWA3000-N Series User’s Guide...
  • Page 241: Troubleshooting

    HAPTER Troubleshooting 21.1 Overview This chapt er offers som e suggest ions t o solve problem s you m ight encount er. The pot ent ial problem s are divided int o t he following cat egories. • Power, Hardware Connect ions, and LEDs •...
  • Page 242: Device Access And Login

    Chapter 21 Troubleshooting I f t he problem cont inues, cont act t he vendor. 21.3 device Access and Login I forgot t he I P address for t he device. The default I P address is 1 9 2 .1 6 8 .1 .2 . Use t he com m ands t hrough t he console port t o check t he I P address.
  • Page 243 Chapter 21 Troubleshooting • Try t o access t he device using anot her service, su ch as Telnet . I f you can access t he device, check t he rem ot e m anagem ent set t ings t o find out why t he device does not respond t o HTTP . •...
  • Page 244: Internet Access

    Chapter 21 Troubleshooting I cannot use FTP t o upload / download t he configurat ion file. / I cannot use FTP t o upload new firm ware. See t he t roubleshoot ing suggest ions for I cannot see or access t he Login screen in t he web configurat or.
  • Page 245: Wireless Ap Troubleshooting

    Chapter 21 Troubleshooting Check t he signal st rengt h. I f t he signal is weak, t ry m oving t he device closer t o t he AP ( if possible) , and look around t o see if t here are any devices t hat m ight be int erfering wit h t he wireless net work ( m icrowaves, ot her wireless net works, and so on) .
  • Page 246 Chapter 21 Troubleshooting I f a RADI US server aut hent icat es wireless st at ions, t he re- aut hent icat ion t im er on t he RADI US server has priorit y. Change t he RADI US server ’s configurat ion if you need t o use a different re- aut hent icat ion t im er set t ing.
  • Page 247 Chapter 21 Troubleshooting • Binary PKCS# 7: This is a st andard t hat defines t he general synt ax for dat a ( including digit al signat ures) t hat m ay be encrypt ed. A PKCS # 7 file is used t o t ransfer a public key cert ificat e. The privat e key is not included.
  • Page 248 Chapter 21 Troubleshooting generat e. I f you have exist ing capt ure files you m ay need t o set t his size larger or delet e exist ing capt ure files. The device st ops t he capt ure and generat es t he capt ure file when eit her t he capt ure files reach t he File Size or t he t im e period specified in t he D ur a t ion field expires.
  • Page 249: Resetting The Device

    Chapter 21 Troubleshooting Wireless client s are not being load balanced am ong m y APs. • Make sure t hat all t he APs used by t he wireless cl i ent s in quest ion share t he sam e SSI D, securit y, and radio set t ings.
  • Page 250 Chapter 21 Troubleshooting NWA3000-N Series User’s Guide...
  • Page 251: Product Specifications

    HAPTER Product Specifications The following t ables sum m arize t he device’s hardware and firm ware feat ures. Table 96 Hardware Specificat ions Power Specificat ion 12 V DC, 1.5 A Reset but t on Ret urns all set t ings t o t heir fact ory default s. Et hernet Port Gigabit Et hernet , full duplex, RJ- 45 connect ors, aut o- negot iat ing, aut o- MDI / MDI X ( aut o- crossover, uses eit her crossover or st raight- t hrough...
  • Page 252 Chapter 22 Product Specifications Table 96 Hardware Specificat ions St orage Hum idit y 10 ~ 90 % ( non- condensing) Dim ensions 198.5 m m ( L) x 138.5m m ( W) x 47.5m m ( H) Weight 450 g Dist ance bet ween t he 140 m m cent ers of wall-...
  • Page 253: Wall-Mounting Instructions

    Chapter 22 Product Specifications Table 97 Firm ware Specificat ions STP ( Spanning Tree ( R) STP det ect s and breaks net work loops and provides backup links Prot ocol) / RSTP ( Rapid bet ween swit ches, bridges or rout ers. I t allows a bridge t o int eract wit h STP) ot her ( R) STP- com pliant bridges in your net work t o ensure t hat only one pat h exist s bet ween any t wo st at ions on t he net work.
  • Page 254 Chapter 22 Product Specifications Do not insert t he screws all t he way int o t he wall. Leave a sm all gap of about 0.5 cm bet ween t he heads of t he screws and t he wall. Make sure t he screws are snugly fast ened t o t he wall.
  • Page 255: Appendix A Log Descriptions

    PP E N D I X Log Descriptions This appendix provides descript ions of exam ple log m essages. The ZySH logs deal wit h int ernal syst em errors. Table 98 ZySH Logs LOG MESSAGE DESCRIPTION Invalid message queue. Maybe someone starts another zysh daemon.
  • Page 256 Appendix A Log Descriptions Table 98 ZySH Logs ( cont inued) LOG MESSAGE DESCRIPTION 1st : zysh list nam e can't get reference count: %s! 1st : zysh ent ry nam e can't print entry name: 1st : zysh ent ry nam e Can't append entry: %s! Can't set entry: %s! 1st : zysh ent ry nam e...
  • Page 257 Appendix A Log Descriptions Table 99 User Logs LOG MESSAGE DESCRIPTION A user logged int o t he device. %s %s from %s has logged in 1st % s: The t ype of user account . EnterpriseWLAN 2nd % s: The user ’s user nam e. 3rd % s: The nam e of t he service t he user is using ( HTTP , HTTPS, FTP , Telnet , SSH, or console) .
  • Page 258 Appendix A Log Descriptions Table 99 User Logs ( cont inued) LOG MESSAGE DESCRIPTION The device blocked a login because t he m axim um sim ult aneous Failed login attempt to login capacit y for t he adm inist rat or or access account has already EnterpriseWLAN from %s been reached.
  • Page 259 Appendix A Log Descriptions Table 100 Built - in Services Logs ( cont inued) LOG MESSAGE DESCRIPTION Aft er an adm inist rat or assigns a cert ificat e for SSH, t he device needs SSH certificate:%s t o convert it t o a key used for SSH. format is wrong.
  • Page 260 Appendix A Log Descriptions Table 100 Built - in Services Logs ( cont inued) LOG MESSAGE DESCRIPTION Ping check failed, rem ove DNS servers from bind. Interface %s ping check is failed. Zone % s is int erface nam e Forwarder removes DNS servers in records.
  • Page 261 Appendix A Log Descriptions Table 101 Syst em Logs ( cont inued) LOG MESSAGE DESCRIPTION The device accept ed a request . The request IP is: %s, sent from %s The device received an ARP response t hat is NOT for t he request ed I P Received ARP response address.
  • Page 262 Appendix A Log Descriptions Table 102 Device HA Logs LOG MESSAGE DESCRIPTION An VRRP group has been creat ed, % s: t he nam e of VRRP group. Device HA VRRP Group %s has been added. Device HA VRRP group An VRRP group has been m odified, % s: t he nam e of VRRP group.
  • Page 263 Appendix A Log Descriptions Table 102 Device HA Logs ( cont inued) LOG MESSAGE DESCRIPTION The firm ware version on t he Backup cannot be resolved t o check if it Backup firmware is t he sam e as on t he Mast er. A Backup device only synchronizes from version can not be t he Mast er if t he Mast er and t he Backup have t he sam e firm ware recognized.
  • Page 264 Appendix A Log Descriptions Table 102 Device HA Logs ( cont inued) LOG MESSAGE DESCRIPTION Master configuration file does not exist. Skip updating ZySH Startup Configuration. 1st % s: error st ring, 2ed % s: t he syncing obj ect System internal error: %s.
  • Page 265 Appendix A Log Descriptions Table 103 Cert ificat e Pat h Verificat ion Failure Reason Codes ( cont inued) CODE DESCRIPTION CRL decoding failed. CRL is not current ly valid, but in t he fut ure. CRL cont ains duplicat e serial num bers. Tim e int erval is not cont inuous.
  • Page 266 Appendix A Log Descriptions Table 104 WLAN Logs ( cont inued) LOG MESSAGE DESCRIPTION A wireless client wit h t he specified MAC address ( second % s) failed Station association t o connect t o t he specified WLAN int erface ( first % s) because t he has failed.
  • Page 267 Appendix A Log Descriptions Table 106 File Manager Logs LOG MESSAGE DESCRIPTION Apply configurat ion failed, t his log will be what CLI com m and is and ERROR:#%s, %s what error m essage is. 1st % s is CLI com m and. 2nd % s is error m essage when apply CLI com m and.
  • Page 268 Appendix A Log Descriptions Table 108 E- m ail Daily Report Logs LOG MESSAGE DESCRIPTION The daily e- m ail report funct ion has been t urned on. The device will Email Daily Report has e- m ail a daily report about t he select ed it em s at t he scheduled t im e been activated.
  • Page 269 Appendix A Log Descriptions Table 109 CAPWAP Server Logs LOG MESSAGE DESCRIPTION The specified AP from m anaged list was delet ed. Delete a Managed AP. MACAddr:%02x%02x%02x%0 1st % 02x ~ 6t h % 02x: Managed AP MAC Address. 2x%02x%02x, Model:%s 7t h % s: Managed AP Model Nam e.
  • Page 270 Appendix A Log Descriptions Table 109 CAPWAP Server Logs LOG MESSAGE DESCRIPTION I ndicat es t hat a Send Updat ing Configurat ion Response was received Sucess Send Updating from an AP on t he Managed List . Configuration to Managed AP.
  • Page 271 Appendix A Log Descriptions Table 110 CAPWAP Client Logs LOG MESSAGE DESCRIPTION The configurat ion was upgraded successfully by t he WLAN Cont roller. Updated configuration by a WLAN Controller 1st % s: Part ial Updat ing." Success. %s Updated configuration Configurat ion upgrade by t he WLAN Cont roller failed.
  • Page 272 Appendix A Log Descriptions Table 111 AP Load Balancing Logs LOG MESSAGE DESCRIPTION kick st at ion I ndicat es t hat t he specified st at ion was rem oved from an AP’s % 02x: % 02x: % 02x: % 02x: % wireless net work because t he AP becam e overloaded.
  • Page 273: Appendix B Importing Certificates

    PP E N D I X Importing Certificates This appendix shows you how t o im port public key cert ificat es int o your web browser. Public key cert ificat es are used by web browsers t o ensure t hat a secure web sit e is legit im at e. When a cert ificat e aut horit y such as VeriSign, Com odo, or Net work Solut ions, t o nam e a few, receives a cert ificat e request from a websit e operat or, t hey confirm t hat t he web dom ain and cont act inform at ion in t he request m at ch t hose on public record wit h a dom ain nam e regist rar.
  • Page 274 Appendix B Importing Certificates I f your device’s Web Configurat or is set t o use SSL cert ificat ion, t hen t he first t im e you browse t o it you are present ed wit h a cert ificat ion error. Click Cont inue t o t his w e bsit e ( not r e com m e nde d) .
  • Page 275 Appendix B Importing Certificates I n t he Ce r t ifica t e dialog box, click I n st a ll Ce r t ifica t e. I n t he Ce r t ifica t e I m por t W iza r d, click N e x t . NWA3000-N Series User’s Guide...
  • Page 276 Appendix B Importing Certificates I f you want I nt ernet Explorer t o Aut om a t ica lly se le ct ce r t ifica t e st or e ba se d on t he t ype of ce r t ifica t e , click N e x t again and t hen go t o st ep 9.
  • Page 277 Appendix B Importing Certificates I n t he Com ple t ing t he Ce r t ifica t e I m por t W iza r d screen, click Finish . 10 I f you are present ed wit h anot her Se cur it y W a r ning, click Ye s. 11 Finally, click OK when present ed wit h t he successful cert ificat e inst allat ion m essage.
  • Page 278 Appendix B Importing Certificates 12 The next t im e you st art I nt ernet Explorer and go t o a ZyXEL Web Configurat or page, a sealed padlock icon appears in t he address bar. Click it t o view t he page’s W e bsit e I de nt ifica t ion inform at ion.
  • Page 279 Appendix B Importing Certificates Removing a Certificate in Internet Explorer This sect ion shows you how t o rem ove a public key cert ificat e in I nt ernet Explorer 7 on Windows XP . Open I nt e r ne t Ex plor e r and click Tools > I nt e r ne t Opt ions. I n t he I n t e r n e t Opt ion s dialog box, click Cont e nt >...
  • Page 280 Appendix B Importing Certificates I n t he Ce r t ifica t e s dialog box, click t he Tr ust e d Root Ce r t ifica t e s Aut hor it ie s t ab, select t he cert ificat e t hat you want t o delet e, and t hen click Re m ove .
  • Page 281 Appendix B Importing Certificates Firefox The following exam ple uses Mozilla Firefox 2 on Windows XP Professional; however, t he screens can also apply t o Firefox 2 on all plat form s. I f your device’s Web Configurat or is set t o use SSL cert ificat ion, t hen t he first t im e you browse t o it you are present ed wit h a cert ificat ion error.
  • Page 282 Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rat her t han browsing t o a ZyXEL Web Configurat or and inst alling a public key cert ificat e when prom pt ed, you can inst all a st and- alone cert ificat e file if one has been issued t o you. Open Fir e fox and click Tools >...
  • Page 283 Appendix B Importing Certificates I n t he Ce r t ifica t e M a n a ge r dialog box, click W e b Sit e s > I m por t . Use t he Se le ct File dialog box t o locat e t he cert ificat e and t hen click Ope n . The next t im e you visit t he web sit e, click t he padlock in t he address bar t o open t he Pa ge I n fo >...
  • Page 284 Appendix B Importing Certificates Open Fir e fox and click Tools > Opt ion s. I n t he Opt ions dialog box, click Adva nce d > Encr ypt ion > Vie w Ce r t ifica t e s. NWA3000-N Series User’s Guide...
  • Page 285 Appendix B Importing Certificates I n t he Ce r t ifica t e M a n a ge r dialog box, select t he W e b Sit e s t ab, select t he cert ificat e t hat you want t o rem ove, and t hen click D e le t e .
  • Page 286 Appendix B Importing Certificates NWA3000-N Series User’s Guide...
  • Page 287: Appendix C Wireless Lans

    PP E N D I X Wireless LANs Wireless LAN Topologies This sect ion discusses ad- hoc and infrast ruct ure wireless LAN t opologies. Ad-hoc Wireless LAN Configuration The sim plest WLAN configurat ion is an independent ( Ad- hoc) WLAN t hat connect s a set of com put ers wit h wireless adapt ers ( A, B, C) .
  • Page 288 Appendix C Wireless LANs disabled, wireless client A and B can st ill access t he wired net work but cannot com m unicat e wit h each ot her. Figure 123 Basic Service Set An Ext ended Service Set ( ESS) consist s of a series of overlapping BSSs, each cont aining an access point , wit h each access point connect ed t oget her by a wired net work.
  • Page 289 Appendix C Wireless LANs An ESSI D ( ESS I Dent ificat ion) uniquely ident ifies each ESS. All access point s and t heir associat ed wireless client s wit hin t he sam e ESS m ust have t he sam e ESSI D in order t o com m unicat e. Figure 124 I nfrast ruct ure WLAN Channel A channel is t he radio frequency( ies) used by wireless devices t o t ransm it and receive dat a.
  • Page 290 Appendix C Wireless LANs cannot " hear" each ot her, t hat is t hey do not know if t he channel is current ly being used. Therefore, t hey are considered hidden from each ot her. Figure 125 RTS/ CTS When st at ion A sends dat a t o t he AP , it m ight not know t hat t he st at ion B is already using t he channel.
  • Page 291 Appendix C Wireless LANs I f t he Fr a gm e nt a t ion Thr e shold value is sm aller t han t he RTS/ CTS value ( see previously) you set t hen t he RTS ( Request To Send) / CTS ( Clear t o Send) handshake will never occur as dat a fram es will be fragm ent ed before t hey reach RTS/ CTS size.
  • Page 292 Appendix C Wireless LANs The following figure shows t he relat ive effect iveness of t hese wireless securit y m et hods available on your device. Table 116 Wireless Securit y Levels SECURITY SECURITY TYPE LEVEL Least Unique SSI D ( Default ) Secure Unique SSI D wit h Hide SSI D Enabled MAC Address Filt ering...
  • Page 293 Appendix C Wireless LANs RADI US is a sim ple package exchange in which your AP act s as a m essage relay bet ween t he wireless client and t he net work RADI US server. Types of RADIUS Messages The following t ypes of RADI US m essages are exchanged bet ween t he access point and t he RADI US server for user aut hent icat ion: •...
  • Page 294 Appendix C Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 aut hent icat ion is t he sim plest one- way aut hent icat ion m et hod. The aut hent icat ion server sends a challenge t o t he wireless client . The wireless client ‘proves’ t hat it knows t he password by encrypt ing t he password wit h t he challenge and sends back t he inform at ion.
  • Page 295 Appendix C Wireless LANs I f t his feat ure is enabled, it is not necessary t o configure a default encrypt ion key in t he wireless securit y configurat ion screen. You m ay st ill configure and st ore keys, but t hey will not be used while dynam ic WEP is enabled.
  • Page 296 Appendix C Wireless LANs called Rij ndael. They bot h include a per- packet key m ixing funct ion, a Message I nt egrit y Check ( MI C) nam ed Michael, an ext ended init ializat ion vect or ( I V) wit h sequencing rules, and a re- keying m echanism .
  • Page 297 Appendix C Wireless LANs WPA(2) with RADIUS Application Example To set up WPA( 2) , you need t he I P address of t he RADI US server, it s port num ber ( default is 1812) , and t he RADI US shared secret . A WPA( 2) applicat ion exam ple wit h an ext ernal RADI US server looks as follows.
  • Page 298 Appendix C Wireless LANs The AP and wireless client s use t he TKI P or AES encrypt ion process, t he PMK and inform at ion exchanged in a handshake t o creat e t em poral encrypt ion keys. They use t hese keys t o encrypt dat a exchanged bet ween t hem .
  • Page 299: Appendix D Open Software Announcements

    PP E N D I X Open Software Announcements End- User License Agreem ent for “ NWA3160- N” WARNI NG: ZyXEL Com m unicat ions Corp. I S WI LLI NG TO LI CENSE THE SOFTWARE TO YOU ONLY UPON THE CONDI TI ON THAT YOU ACCEPT ALL OF THE TERMS CONTAI NED I N THI S LI CENSE AGREEMENT.
  • Page 300 Appendix D Open Software Announcements The Soft ware and Docum ent at ion cont ain m at erial t hat is prot ect ed by int ernat ional copyright law, t rade secret law, int ernat ional t reat y provisions, and t he applicable nat ional laws of each respect ive count ry.
  • Page 301 Appendix D Open Software Announcements THI RTY ( 30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTI ES SHALL APPLY AFTER THAT PERI OD. 7.Lim it at ion of Liabilit y I N NO EVENT WI LL ZyXEL BE LI ABLE TO YOU OR ANY THI RD PARTY FOR ANY I NCI DENTAL OR CONSEQUENTI AL DAMAGES ( I NCLUDI NG, WI THOUT LI MI TATI ON, I NDI RECT, SPECI AL, PUNI TI VE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSI NESS, LOSS OF PROFI TS, BUSI NESS I NTERRUPTI ON, OR LOSS OF BUSI NESS I NFORMATI ON) ARI SI NG OUT OF THE USE OF OR I NABI LI TY TO USE THE...
  • Page 302 Appendix D Open Software Announcements Agreem ent shall only be effect ive if it is in writ ing and signed by bot h part ies heret o. I f any part of t his License Agreem ent is found invalid or unenforceable by a court of com pet ent j urisdict ion, t he rem ainder of t his License Agreem ent shall be int erpret ed so as t o reasonably effect t he int ent ion of t he part ies.
  • Page 303 Appendix D Open Software Announcements Perm ission is hereby grant ed, free of charge, t o any person obt aining a copy of t his soft ware and associat ed docum ent at ion files ( t he " Soft ware" ) , t o deal in t he Soft ware wit hout rest rict ion, including wit hout lim it at ion t he right s t o use, copy, m odify, m erge, publish, dist ribut e, sublicense, and/ or sell copies of t he Soft ware, and t o perm it persons t o whom t he Soft ware is furnished t o do so, subj ect...
  • Page 304 Appendix D Open Software Announcements This Product includes openssl soft ware under t he OpenSSL License OpenSSL LI CENSE I SSUES = = = = = = = = = = = = = = The OpenSSL t oolkit st ays under a dual license, i.e. bot h t he condit ions of t he OpenSSL License and t he original SSLeay license apply t o t he t oolkit .
  • Page 305 Appendix D Open Software Announcements not ice, t his list of condit ions and t he following disclaim er in t he docum ent at ion and/ or ot her m at erials provided wit h t he dist ribut ion. * 3.
  • Page 306 Appendix D Open Software Announcements * SPECI AL, EXEMPLARY, OR CONSEQUENTI AL DAMAGES ( I NCLUDI NG, BUT * NOT LI MI TED TO, PROCUREMENT OF SUBSTI TUTE GOODS OR SERVI CES; * LOSS OF USE, DATA, OR PROFI TS; OR BUSI NESS I NTERRUPTI ON) * HOWEVER CAUSED AND ON ANY THEORY OF LI ABI LI TY, WHETHER I N CONTRACT, * STRI CT LI ABI LI TY , OR TORT ( I NCLUDI NG NEGLI GENCE OR OTHERWI SE) * ARI SI NG I N ANY WAY OUT OF THE USE OF THI S SOFTWARE, EVEN I F ADVI SED...
  • Page 307 Appendix D Open Software Announcements * apply t o all code found in t his dist ribut ion, be it t he RC4, RSA, * lhash, DES, et c., code; not j ust t he SSL code. The SSL docum ent at ion * included wit h t his dist ribut ion is covered by t he sam e copyright t erm s * except t hat t he holder is Tim Hudson ( t j h@crypt soft .com ) .
  • Page 308 Appendix D Open Software Announcements " This product includes soft ware writ t en by Tim Hudson ( t j h@crypt soft .com ) " * THI S SOFTWARE I S PROVI DED BY ERI C YOUNG ` ` AS I S'' AND * ANY EXPRESS OR I MPLI ED WARRANTI ES, I NCLUDI NG, BUT NOT LI MI TED TO, THE * I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE * ARE DI SCLAI MED.
  • Page 309 Appendix D Open Software Announcements Redist ribut ion and use in source and binary form s, wit h or wit hout m odificat ion, are perm it t ed provided t hat t he following condit ions are m et : * Redist ribut ions of source code m ust ret ain t he above copyright not ice, t his list of condit ions and t he following disclaim er.
  • Page 310 Appendix D Open Software Announcements I SC license Copyright ( c) 4- digit year, Com pany or Person's Nam e Perm ission t o use, copy, m odify, and dist ribut e t his soft ware for any purpose wit h or wit hout fee is hereby grant ed, provided t hat t he above copyright not ice and t his perm ission not ice appear in all copies.
  • Page 311 Appendix D Open Software Announcements " Source" form shall m ean t he preferred form for m aking m odificat ions, including but not lim it ed t o soft ware source code, docum ent at ion source, and configurat ion files. "...
  • Page 312 Appendix D Open Software Announcements ( c) You m ust ret ain, in t he Source form of any Derivat ive Works t hat You dist ribut e, all copyright , pat ent , t radem ark, and at t ribut ion not ices from t he Source form of t he Work, excluding t hose not ices t hat do not pert ain t o any part of t he Derivat ive Works;...
  • Page 313 Appendix D Open Software Announcements END OF TERMS AND CONDI TI ONS Version 1.1 Copyright ( c) 1999- 2003 The Apache Soft ware Foundat ion. All right s reserved. Redist ribut ion and use in source and binary form s, wit h or wit hout m odificat ion, are perm it t ed provided t hat t he following condit ions are m et : Redist ribut ions of source code m ust ret ain t he above copyright not ice, t his list of condit ions and t he following disclaim er.
  • Page 314 Appendix D Open Software Announcements This Product includes gm p under LGPL license. GNU LESSER GENERAL PUBLI C LI CENSE Version 2.1, February 1999 Copyright ( C) 1991, 1999 Free Soft ware Foundat ion, I nc. 59 Tem ple Place, Suit e 330, Bost on, MA 02111- 1307 USA Everyone is perm it t ed t o copy and dist ribut e verbat im copies of t his license docum ent , but changing it is not allowed.
  • Page 315 Appendix D Open Software Announcements We prot ect your right s wit h a t wo- st ep m et hod: ( 1) we copyright t he library, and ( 2) we offer you t his license, which gives you legal perm ission t o copy, dist ribut e and/ or m odify t he library. To prot ect each dist ribut or, we want t o m ake it very clear t hat t here is no warrant y for t he free library.
  • Page 316 Appendix D Open Software Announcements 0. This License Agreem ent applies t o any soft ware library or ot her program which cont ains a not ice placed by t he copyright holder or ot her aut horized part y saying it m ay be dist ribut ed under t he t erm s of t his Lesser General Public License ( also called "...
  • Page 317 Appendix D Open Software Announcements t he Library wit h t he Library ( or wit h a work based on t he Library) on a volum e of a st orage or dist ribut ion m edium does not bring t he ot her work under t he scope of t his License. 3.
  • Page 318 Appendix D Open Software Announcements m achine- readable source code for t he Library including what ever changes were used in t he work ( which m ust be dist ribut ed under Sect ions 1 and 2 above) ; and, if t he work is an execut able linked wit h t he Library, wit h t he com plet e m achine- readable "...
  • Page 319 Appendix D Open Software Announcements recipient s' exercise of t he right s grant ed herein. You are not responsible for enforcing com pliance by t hird part ies wit h t his License. 11. I f, as a consequence of a court j udgm ent or allegat ion of pat ent infringem ent or for any ot her reason ( not lim it ed t o pat ent issues) , condit ions are im posed on you ( whet her by court order, agreem ent or ot herwise) t hat cont radict t he condit ions of t his License, t hey do not excuse you from t he condit ions of t his License.
  • Page 320 Appendix D Open Software Announcements PURPOSE. THE ENTI RE RI SK AS TO THE QUALI TY AND PERFORMANCE OF THE LI BRARY I S WI TH YOU. SHOULD THE LI BRARY PROVE DEFECTI VE, YOU ASSUME THE COST OF ALL NECESSARY SERVI CI NG, REPAI R OR CORRECTI ON.
  • Page 321 Appendix D Open Software Announcements To prot ect your right s, we need t o m ake rest rict ions t hat forbid anyone t o deny you t hese right s or t o ask you t o surrender t he right s. These rest rict ions t ranslat e t o cert ain responsibilit ies for you if you dist ribut e copies of t he soft ware, or if you m odify it .
  • Page 322 Appendix D Open Software Announcements c) I f t he m odified program norm ally reads com m ands int eract ively when run, you m ust cause it , when st art ed running for such int eract ive use in t he m ost ordinary way, t o print or display an announcem ent including an appropriat e copyright not ice and a not ice t hat t here is no warrant y ( or else, saying t hat you provide a warrant y) and t hat users m ay redist ribut e t he program under t hese condit ions, and t elling t he user how t o view a copy of t his License.
  • Page 323 Appendix D Open Software Announcements 5. You are not required t o accept t his License, since you have not signed it . However, not hing else grant s you perm ission t o m odify or dist ribut e t he Program or it s derivat ive works. These act ions are prohibit ed by law if you do not accept t his License.
  • Page 324 Appendix D Open Software Announcements 11. BECAUSE THE PROGRAM I S LI CENSED FREE OF CHARGE, THERE I S NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMI TTED BY APPLI CABLE LAW. EXCEPT WHEN OTHERWI SE STATED I N WRI TI NG THE COPYRI GHT HOLDERS AND/ OR OTHER PARTI ES PROVI DE THE PROGRAM " AS I S" WI THOUT WARRANTY OF ANY KI ND, EI THER EXPRESSED OR I MPLI ED, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE.
  • Page 325 Appendix D Open Software Announcements WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE ARE DI SCLAI MED. I N NO EVENT SHALL THE REGENTS OR CONTRI BUTORS BE LI ABLE FOR ANY DI RECT, I NDI RECT, I NCI DENTAL, SPECI AL, EXEMPLARY, OR CONSEQUENTI AL DAMAGES ( I NCLUDI NG, BUT NOT LI MI TED TO, PROCUREMENT OF SUBSTI TUTE GOODS OR SERVI CES;...
  • Page 326 Appendix D Open Software Announcements CMU AND THE REGENTS OF THE UNI VERSI TY OF CALI FORNI A DI SCLAI M ALL WARRANTI ES WI TH REGARD TO THI S SOFTWARE, I NCLUDI NG ALL I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS. I N NO EVENT SHALL CMU OR THE REGENTS OF THE UNI VERSI TY OF CALI FORNI A BE LI ABLE FOR ANY SPECI AL, I NDI RECT OR CONSEQUENTI AL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTI NG FROM THE LOSS OF USE, DATA OR PROFI TS, WHETHER I N AN ACTI ON OF...
  • Page 327 Appendix D Open Software Announcements product s derived from t his soft ware wit hout specific prior writ t en perm ission. THI S SOFTWARE I S PROVI DED BY THE COPYRI GHT HOLDERS AND CONTRI BUTORS ` ` AS I S'' AND ANY EXPRESS OR I MPLI ED WARRANTI ES, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE ARE DI SCLAI MED.
  • Page 328 Appendix D Open Software Announcements docum ent at ion and/ or ot her m at erials provided wit h t he dist ribut ion. * The nam e of Cam bridge Broadband Lt d. m ay not be used t o endorse or prom ot e product s derived from t his soft ware wit hout specific prior writ t en perm ission.
  • Page 329 Appendix D Open Software Announcements Sun, Sun Microsyst em s, t he Sun logo and Solaris are t radem arks or regist ered t radem arks of Sun Microsyst em s, I nc. in t he U.S. and ot her count ries. Redist ribut ion and use in source and binary form s, wit h or wit hout m odificat ion, are perm it t ed provided t hat t he following condit ions are m et : * Redist ribut ions of source code m ust ret ain t he above copyright not ice,...
  • Page 330 Appendix D Open Software Announcements ADVI SED OF THE POSSI BI LI TY OF SUCH DAMAGE. - - - - Part 5: Spart a, I nc copyright not ice ( BSD) - - - - - Copyright ( c) 2003- 2009, Spart a, I nc All right s reserved.
  • Page 331 Appendix D Open Software Announcements OR BUSI NESS I NTERRUPTI ON) HOWEVER CAUSED AND ON ANY THEORY OF LI ABI LI TY, WHETHER I N CONTRACT, STRI CT LI ABI LI TY, OR TORT ( I NCLUDI NG NEGLI GENCE OR OTHERWI SE) ARI SI NG I N ANY WAY OUT OF THE USE OF THI S SOFTWARE, EVEN I F ADVI SED OF THE POSSI BI LI TY OF SUCH DAMAGE.
  • Page 332 Appendix D Open Software Announcements THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE ARE DI SCLAI MED. I N NO EVENT SHALL THE COPYRI GHT HOLDERS OR CONTRI BUTORS BE LI ABLE FOR ANY DI RECT, I NDI RECT, I NCI DENTAL, SPECI AL, EXEMPLARY, OR CONSEQUENTI AL DAMAGES ( I NCLUDI NG, BUT NOT LI MI TED TO, PROCUREMENT OF SUBSTI TUTE GOODS OR SERVI CES;...
  • Page 333 Appendix D Open Software Announcements derived from t his soft ware wit hout specific prior writ t en perm ission. THI S SOFTWARE I S PROVI DED BY THE COPYRI GHT HOLDER ` ` AS I S'' AND ANY EXPRESS OR I MPLI ED WARRANTI ES, I NCLUDI NG, BUT NOT LI MI TED TO, THE I MPLI ED WARRANTI ES OF MERCHANTABI LI TY AND FI TNESS FOR A PARTI CULAR PURPOSE ARE DI SCLAI MED.
  • Page 334 Appendix D Open Software Announcements 3. Neit her t he nam e of Apple I nc. ( " Apple") nor t he nam es of it s cont ribut ors m ay be used t o endorse or prom ot e product s derived from t his soft ware wit hout specific prior writ t en perm ission.
  • Page 335 Appendix D Open Software Announcements * Redist ribut ions in binary form m ust reproduce t he above copyright not ice, t his list of condit ions and t he following disclaim er in t he docum ent at ion and/ or ot her m at erials provided wit h t he dist ribut ion. * Neit her t he nam e of ScienceLogic, LLC nor t he nam es of it s cont ribut ors m ay be used t o endorse or prom ot e product s derived from t his soft ware wit hout specific prior writ t en perm ission.
  • Page 336 Appendix D Open Software Announcements including wit hout lim it at ion t he right s t o use, copy, m odify, m erge, publish, dist ribut e, sublicense, and/ or sell copies of t he Soft ware, and t o perm it persons t o whom t he Soft ware is furnished t o do so, subj ect t o t he following condit ions: The above copyright not ice and t his perm ission not ice shall be included in all copies or subst ant ial port ions of t he Soft ware.
  • Page 337 Appendix D Open Software Announcements LI MI TED TO, PROCUREMENT OF SUBSTI TUTE GOODS OR SERVI CES; LOSS OF USE, DATA, OR PROFI TS; OR BUSI NESS I NTERRUPTI ON) HOWEVER CAUSED AND ON ANY THEORY OF LI ABI LI TY, WHETHER I N CONTRACT, STRI CT LI ABI LI TY, OR TORT ( I NCLUDI NG NEGLI GENCE OR OTHERWI SE) ARI SI NG I N ANY WAY OUT OF THE USE OF THI S SOFTWARE, EVEN I F ADVI SED OF THE POSSI BI LI TY OF SUCH DAMAGE.
  • Page 338 Appendix D Open Software Announcements wit h t he following individual added t o t he list of Cont ribut ing Aut hors Cosm in Trut a libpng versions 1.0.7, July 1, 2000, t hrough 1.2.5 - Oct ober 3, 2002, are Copyright ( c) 2000- 2002 Glenn Randers- Pehrson, and are dist ribut ed according t o t he sam e disclaim er and license as libpng- 1.0.6 wit h t he following individuals added t o t he list of Cont ribut ing Aut hors...
  • Page 339 Appendix D Open Software Announcements Glenn Randers- Pehrson Willem van Schaik libpng versions 0.89, June 1996, t hrough 0.96, May 1997, are Copyright ( c) 1996, 1997 Andreas Dilger Dist ribut ed according t o t he sam e disclaim er and license as libpng- 0.88, wit h t he following individuals added t o t he list of Cont ribut ing Aut hors: John Bowler Kevin Bracey...
  • Page 340 Appendix D Open Software Announcements and Group 42, I nc. disclaim all warrant ies, expressed or im plied, including, wit hout lim it at ion, t he warrant ies of m erchant abilit y and of fit ness for any purpose. The Cont ribut ing Aut hors and Group 42, I nc. assum e no liabilit y for direct , indirect , incident al, special, exem plary, or consequent ial dam ages, which m ay result from t he use of t he PNG Reference Library, even if advised of t he possibilit y of such dam age.
  • Page 341 Appendix D Open Software Announcements print f( " % s" ,png_get _copyright ( NULL) ) ; Also, t he PNG logo ( in PNG form at , of course) is supplied in t he files " pngbar.png" and " pngbar.j pg ( 88x31) and " pngnow.png" ( 98x31) . Libpng is OSI Cert ified Open Source Soft ware.
  • Page 342 Appendix D Open Software Announcements 3. This not ice m ay not be rem oved or alt ered from any source dist ribut ion. NWA3000-N Series User’s Guide...
  • Page 343: Appendix E Legal Information

    P PE N D I X Legal Information Copyright Copyright © 2011 by ZyXEL Com m unicat ions Corporat ion. The cont ent s of t his publicat ion m ay not be reproduced in any part or as a whole, t ranscribed, st ored in a ret rieval syst em , t ranslat ed int o any language, or t ransm it t ed in any form or by any m eans, elect ronic, m echanical, m agnet ic, opt ical, chem ical, phot ocopying, m anual, or ot herwise, wit hout t he prior writ t en perm ission of ZyXEL Com m unicat ions Corporat ion.
  • Page 344 Appendix E Legal Information I f t his device does cause harm ful int erference t o radio/ t elevision recept ion, which can be det erm ined by t urning t he device off and on, t he user is encouraged t o t ry t o correct t he int erference by one or m ore of t he following m easures: Reorient or relocat e t he receiving ant enna.
  • Page 345 Appendix E Legal Information Taiwanese BSMI (Bureau of Standards, Metrology and Inspection) A Warning: Notices Changes or m odificat ions not expressly approved by t he part y responsible for com pliance could void t he user's aut horit y t o operat e t he equipm ent . IMPORTANT NOTE Device for t he band 5150- 5250 MHz is only for indoor usage t o reduce pot ent ial for harm ful int erference t o co- channel m obile sat ellit e syst em s;...
  • Page 346 Appendix E Legal Information Select your product on t he ZyXEL hom e page t o go t o t hat product 's page. Select t he cert ificat ion you wish t o view from t his page. ZyXEL Limited Warranty ZyXEL warrant s t o t he original end user ( purchaser) t hat t his product is free from any defect s in m at erial or workm anship for a specific period ( t he Warrant y Period) from t he dat e of purchase.
  • Page 347 Appendix E Legal Information Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Com pliance I nform at ion for 2.4GHz and 5GHz Wireless Product s Relevant t o t he EU and Ot her Count ries Following the EU Directive 1999/5/EC (R&TTE Directive) [Czech] ZyXEL tímto prohlašuje, že tento zařízení...
  • Page 348 Appendix E Legal Information Niniejszym ZyXEL oświadcza, że sprzęt jest zgodny z zasadniczymi wymogami [Polish] oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC. [Portuguese] ZyXEL declara que este equipamento está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/EC. [Slovenian] ZyXEL izjavlja, da je ta oprema v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/EC.
  • Page 349 Appendix E Legal Information I n t he m aj orit y of t he EU and ot her European count ries,t he 2,4- and 5- GHz bands have been m ade available for t he use of wireless local area net works ( LANs) . Lat er in t his docum ent you will find an overview of count ries inwhich addit ional rest rict ions or requirem ent s or bot h are applicable.
  • Page 350 Appendix E Legal Information Indoor (No restrictions) 2.4 – 2.4835 100mW (20dBm) 2.4 – 2.454 100mW (20dBm) Outdoor 2.454 – 2.4835 10mW (10dBm) I t aly This product m eet s t he Nat ional Radio I nt erface and t he requirem ent s specified in t he Nat ional Frequency Allocat ion Table for I t aly.
  • Page 351: Index

    Index Index Symbols 21, 287 and cert ificat es CA ( Cert ificat e Aut horit y) , see cert ificat es access CAPWAP 93, 95 access privileges CEF ( Com m on Event Form at ) 209, 214 access users Cert ificat e Aut horit y see also users See CA.
  • Page 352 Index not ices viewing channel 20, 289 dat e int erference daylight savings 23, 35 device HA but t on act ive- passive m ode m essages clust er I D 124, 246 popup window configurat ion overview clust er I D 124, 246 copying configurat ion cold st art...
  • Page 353 Index HyperText Transfer Prot ocol over Secure Socket Layer, see HTTPS ESSI D Ext ended Service Set I Dent ificat ion Ext ended Service Set , See ESS I BSS I EEE 802.11g I EEE 802.1x FCC int erference st at em ent I ndependent Basic Service Set file ext ensions See I BSS...
  • Page 354 Index cat egories 212, 214, 215, 216 m onit ored int erfaces debugging device HA regular My Cert ificat es, see also cert ificat es t ypes of logout Web Configurat or logs configurat ion overview Net scape Navigat or descript ions net work e- m ail profiles...
  • Page 355 Index and users lim it at ions t im eout s radio Service Set RADI US Service Set I dent ifier m essage t ypes see SSI D m essages shell script s shared secret key downloading reboot 26, 47, 237, 239 edit ing vs reset 237, 239...
  • Page 356 Index st at us m em ory 71, 74 onboard flash st at us bar warning m essage popup st opping t he device user aut hent icat ion STP ( Spanning Tree Prot ocol) user group obj ect s subnet m ask user groups configurat ion overview...
  • Page 357 Index web configurat or WEP ( Wired Equivalent Privacy) Wi- Fi Prot ect ed Access 136, 295 wired net work wireless channel wireless client WPA supplicant s Wireless Dist ribut ion Syst em ( WDS) wireless LAN wireless securit y 21, 245, 291 WLAN int erference...
  • Page 358 Index NWA3000-N Series User’s Guide...

This manual is also suitable for:

Nwa3160-n

Table of Contents