ZyXEL Communications 802.11b/g Wireless Access Point NWA-1100 User Manual
ZyXEL Communications 802.11b/g Wireless Access Point NWA-1100 User Manual

ZyXEL Communications 802.11b/g Wireless Access Point NWA-1100 User Manual

802.11b/g wireless access point
Hide thumbs Also See for 802.11b/g Wireless Access Point NWA-1100:
Table of Contents

Advertisement

Quick Links

NWA-1100
802.11b/g Wireless Access Point
User's Guide
Version 1.00
7/2008
Edition 1
www.zyxel.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 802.11b/g Wireless Access Point NWA-1100 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ZyXEL Communications 802.11b/g Wireless Access Point NWA-1100

  • Page 1 NWA-1100 802.11b/g Wireless Access Point User’s Guide Version 1.00 7/2008 Edition 1 www.zyxel.com...
  • Page 3: About This User's Guide

    Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
  • Page 4: Warnings And Notes

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 5 Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The ZyXEL Device icon is not an exact representation of your device. ZyXEL Device Server Ethernet Switch ZyXEL NWA-1100 User’s Guide Computer Notebook computer Printer Firewall Switch Router...
  • Page 6: Safety Warnings

    Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
  • Page 7 Safety Warnings ZyXEL NWA-1100 User’s Guide...
  • Page 8 Safety Warnings ZyXEL NWA-1100 User’s Guide...
  • Page 9: Table Of Contents

    Introduction ... 23 Introducing the ZyXEL Device ... 25 Introducing the Web Configurator ... 35 Status Screens ... 39 Tutorial ... 43 The Web Configurator ... 51 System Screens ... 53 Wireless Settings Screen ... 61 Wireless Security Screen ... 75 RADIUS Screen ...
  • Page 10 Contents Overview ZyXEL NWA-1100 User’s Guide...
  • Page 11: Table Of Contents

    About This User's Guide ... 3 Document Conventions... 4 Safety Warnings... 6 Contents Overview ... 9 Table of Contents... 11 List of Figures ... 17 List of Tables... 21 Part I: Introduction... 23 Chapter 1 Introducing the ZyXEL Device ... 25 1.1 Introducing the ZyXEL Device ...
  • Page 12 Table of Contents Chapter 3 Status Screens ... 39 3.1 The Status Screen ... 39 3.1.1 System Statistics Screen ... 41 Chapter 4 Tutorial ... 43 4.1 How to Configure the Wireless LAN ... 43 4.1.1 Choosing the Wireless Mode ... 43 4.1.2 Wireless LAN Configuration Overview ...
  • Page 13 6.5.1 WMM QoS ... 71 6.5.2 Spanning Tree Protocol (STP) ... 71 6.5.2.1 Rapid STP ... 71 6.5.2.2 STP Terminology ... 71 6.5.2.3 How STP Works ... 72 6.5.2.4 STP Port States ... 72 6.5.3 Additional Wireless Terms ... 73 Chapter 7 Wireless Security Screen ...
  • Page 14 Table of Contents 10.1 Overview ... 97 10.2 What You Can Do in the IP Screen ... 97 10.3 What You Need to Know About IP ... 97 10.4 IP Screen ... 98 10.5 Technical Reference ... 99 10.5.1 WAN IP Address Assignment ... 99 Chapter 11 Remote Management...
  • Page 15 13.7.2 Displaying Logs ... 120 13.7.3 Command List ... 120 Chapter 14 Maintenance ... 121 14.1 Overview ... 121 14.2 What You Can Do in the Maintenance Screens ... 121 14.3 What You Need To Know About the Maintenance Screens ... 121 14.4 Association List Screen ...
  • Page 16 Table of Contents Index... 201 ZyXEL NWA-1100 User’s Guide...
  • Page 17: List Of Figures

    List of Figures List of Figures Figure 1 Access Point Application ... 26 Figure 2 Wireless Client Application ... 26 Figure 3 Bridge Application ... 27 Figure 4 Bridging Example ... 28 Figure 5 Bridge Loop: Two Bridges Connected to Hub ... 28 Figure 6 Bridge Loop: Bridge Connected to Wired LAN ...
  • Page 18 List of Figures Figure 39 Security:WPA2 or WPA2-MIX for Access Point ... 85 Figure 40 Security: WPA2 or WPA2-MIX for Wireless Client ... 86 Figure 41 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ... 87 Figure 42 RADIUS Server Setup ... 89 Figure 43 Wireless >...
  • Page 19 List of Figures Figure 82 Macintosh OS 8/9: Apple Menu ... 149 Figure 83 Macintosh OS 8/9: TCP/IP ... 149 Figure 84 Macintosh OS X: Apple Menu ... 150 Figure 85 Macintosh OS X: Network ... 151 Figure 86 Peer-to-Peer Communication in an Ad-hoc Network ... 153 Figure 87 Basic Service Set ...
  • Page 20 List of Figures ZyXEL NWA-1100 User’s Guide...
  • Page 21: List Of Tables

    List of Tables List of Tables Table 1 LEDs ... 32 Table 2 The Status Screen ... 39 Table 3 System Status: Show Statistics ... 41 Table 4 Private IP Address Ranges ... 54 Table 5 System: General ... 55 Table 6 System: Password ...
  • Page 22 List of Tables Table 39 Log Categories and Available Settings ... 120 Table 40 Log Command List ... 120 Table 41 Association List ... 122 Table 42 Channel Usage ... 123 Table 43 Firmware Upload ... 123 Table 44 Restore Configuration ... 125 Table 45 Hardware Specifications ...
  • Page 23: Introduction

    Introduction Introducing the ZyXEL Device (25) Status Screens (39) Introducing the Web Configurator (35) Tutorial (43)
  • Page 25: Introducing The Zyxel Device

    H A P T E R Introducing the ZyXEL Device This chapter introduces the main applications and features of the ZyXEL Device. It also discusses the ways you can manage your ZyXEL Device. 1.1 Introducing the ZyXEL Device Your ZyXEL Device extends the range of your existing wired network without additional wiring, providing easy network access to mobile users.
  • Page 26: Wireless Client

    Chapter 1 Introducing the ZyXEL Device Figure 1 Access Point Application BSS1 1.2.2 Wireless Client The ZyXEL Device can be used as a wireless client to communicate with an existing network. In the figure below, the printer can receive requests from the wired computer clients A and B via the ZyXEL Device in Wireless Client mode.
  • Page 27: Bridge

    1.2.3 Bridge The ZyXEL Device can act as a wireless network bridge and establish wireless links with other APs. In the figure below, the ZyXEL Devices (A, B and Z) are connected to independent wired networks and have a bridge connection (A can communicate with B and Z) at the same time.
  • Page 28: Figure 4 Bridging Example

    Chapter 1 Introducing the ZyXEL Device Figure 4 Bridging Example Be careful to avoid bridge loops when you enable bridging in the ZyXEL Device. Bridge loops cause broadcast traffic to circle the network endlessly, resulting in possible throughput degradation and disruption of communications. The following examples show two network topologies that can lead to this problem: •...
  • Page 29: Ap + Bridge

    Figure 6 Bridge Loop: Bridge Connected to Wired LAN To prevent bridge loops, ensure that you enable STP in the Wireless screen or your ZyXEL Device is not set to bridge mode while connected to both wired and wireless segments of the same LAN.
  • Page 30: Ways To Manage The Zyxel Device

    Chapter 1 Introducing the ZyXEL Device Figure 7 AP + Bridge Application 1.3 Ways to Manage the ZyXEL Device Use any of the following methods to manage the ZyXEL Device. • Web Configurator. This is recommended for everyday management of the ZyXEL Device using a (supported) web browser.
  • Page 31: Wireless Security

    • Change any default passwords on the ZyXEL Device, such as the password used for accessing the ZyXEL Device’s web configurator (if it has a web configurator). Use a password with a combination of letters and numbers and change your password regularly. Write down the password and put it in a safe place.
  • Page 32: Hardware Connections

    Chapter 1 Introducing the ZyXEL Device 1.6 Hardware Connections See your Quick Start Guide for information on making hardware connections. 1.7 LEDs Figure 8 LEDs Table 1 LEDs LABEL COLOR Green Amber WLAN Green STATUS DESCRIPTION The ZyXEL Device is in AP + Bridge or Bridge mode, and has successfully established a Wireless Distribution System (WDS) connection.
  • Page 33 Table 1 LEDs (continued) LABEL COLOR ETHERNET Green Yellow ZyXEL NWA-1100 User’s Guide Chapter 1 Introducing the ZyXEL Device STATUS DESCRIPTION Blinking The wireless adaptor WLAN is active, and transmitting or receiving data. The wireless adaptor WLAN is not active. The ZyXEL Device has a 10 Mbps Ethernet connection.
  • Page 34 Chapter 1 Introducing the ZyXEL Device ZyXEL NWA-1100 User’s Guide...
  • Page 35: Introducing The Web Configurator

    H A P T E R This chapter describes how to access the ZyXEL Device’s web configurator and provides an overview of its screens. 2.1 Accessing the Web Configurator 1 Make sure your hardware is properly connected and prepare your computer or computer network to connect to the ZyXEL Device (refer to the Quick Start Guide).
  • Page 36: Resetting The Zyxel Device

    Chapter 2 Introducing the Web Configurator The management session automatically times out when the time period set in the Administrator Inactivity Timer field expires (default five minutes). Simply log back into the ZyXEL Device if this happens. 2.2 Resetting the ZyXEL Device If you forget your password or cannot access the web configurator, you will need to use the RESET button.
  • Page 37: Figure 10 Status Screen Of The Web Configurator

    Figure 10 Status Screen of the Web Configurator • Click the links on the left of the screen to configure advanced features such as SYSTEM (General, Password and Time), WIRELESS (Wireless Settings, Security, RADIUS, MAC Filter), IP, REMOTE MGNT (Telnet, FTP, WWW and SNMP), CERTIFICATES, and LOGS (View Log and Log Settings).
  • Page 38 Chapter 2 Introducing the Web Configurator ZyXEL NWA-1100 User’s Guide...
  • Page 39: Status Screens

    H A P T E R The Status screens display when you log into the ZyXEL Device, or click Status in the navigation menu. Use the Status screens to look at the current status of the device, system resources, and interfaces.
  • Page 40 Chapter 3 Status Screens Table 2 The Status Screen LABEL Device Name Operation Mode MAC Address Firmware Version Ethernet Information IP Address Subnet Mask Gateway IP Address WLAN Information SSID Channel MAC Filter Security Mode System Resources System Up Time CPU Usage Memory Usage Interface Status...
  • Page 41: System Statistics Screen

    Table 2 The Status Screen LABEL WLAN System Status Statistics Association List View Log 3.1.1 System Statistics Screen Use this screen to view read-only information, including 802.11 Mode, Channel ID, Retry Count and FCS Error Count. Also provided is the "poll interval". The Poll Interval field is configurable.
  • Page 42 Chapter 3 Status Screens ZyXEL NWA-1100 User’s Guide...
  • Page 43: Tutorial

    H A P T E R This chapter first provides an overview of how to configure the wireless LAN on your ZyXEL Device, and then gives step-by-step guidelines showing how to configure your ZyXEL Device for some example scenarios. 4.1 How to Configure the Wireless LAN This section illustrates how to choose which wireless operating mode to use on the ZyXEL Device and how to set up the wireless LAN in each wireless mode.
  • Page 44: Further Reading

    Chapter 4 Tutorial Figure 13 Configuring Wireless LAN Select the WLAN Adaptor you want to configure. Wireless Client Access Point Mode. Mode. Select 802.11 Select AP you Mode and want to Channel ID. connect to. Configure Security Configure RADIUS Settings. authentication (optional).
  • Page 45: Scenario

    4.2.1 Scenario In the figure below, there are two ZyXEL Devices (A and B) in the network. A is in Access Point (AP) mode while B is in Wireless Client mode. Station B is connected to a File Transfer Protocol (FTP) server. You want only specified wireless clients to be able to access station B. You also want to allow wireless traffic between B and wireless clients connected to A (W, Y and Z).
  • Page 46: Configuring The Zyxel Device In Wireless Client Mode

    Chapter 4 Tutorial Figure 15 Access Point Mode Wireless Setttings 1 Set the Operation Mode to AP. 2 Enter an SSID name, such as “NWA-1100 A”. 3 Choose the channel you want the ZyXEL Device to use. 4 Select the Wireless Mode. 5 Set the Intra-BSS Traffic to Enable.
  • Page 47: Figure 17 Wireless Client Mode Wireless Settings

    2 You should now see a tab that says Site Survey (refer to window should pop up which contains a list of all available wireless devices within your ZyXEL Device’s range. Copy the SSID of the AP you want your wireless client to connect to (refer to 3 For this example, you want to connect to the access point, A.The SSID that you should copy is ZyXEL NWA-1100 A (refer to...
  • Page 48: Figure 18 Site Survey

    Chapter 4 Tutorial Figure 18 Site Survey Figure 19 Wireless Client Mode 6 Go to Wireless > Security to configure the ZyXEL Device to use WPA-PSK security mode. ZyXEL NWA-1100 User’s Guide...
  • Page 49: Testing The Connection And Troubleshooting

    Figure 20 Wireless Client Mode Security Setttings 7 One way to ensure that only specified wireless clients can access the FTP server is by enabling MAC filtering on the ZyXEL Device. See information on the MAC Filter screen. 8 Still in the Web Configurator, go to Wireless > MAC Filter. Click on Active then highlight Allow the following MAC Address to associate.
  • Page 50 Chapter 4 Tutorial ZyXEL NWA-1100 User’s Guide...
  • Page 51: The Web Configurator

    The Web Configurator System Screens (53) Wireless Settings Screen (61) Wireless Security Screen (75) RADIUS Screen (89) MAC Filter Screen (93) IP Screen (97) Remote Management (101) Certificate Screen (111) Log Screens (115) Maintenance (121) Troubleshooting (129)
  • Page 53: System Screens

    H A P T E R 5.1 Overview This chapter provides information and instructions on how to identify and manage your ZyXEL Device over the network. Figure 22 ZyXEL Device Setup In the figure above, the ZyXEL Device connects to a Domain Name Server (DNS) server to avail of a domain name.
  • Page 54: What You Need To Know About The System Screens

    Chapter 5 System Screens 5.3 What You Need To Know About the System Screens IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses to the hosts without problems.
  • Page 55: General Screen

    The subnet mask specifies the network number portion of an IP address. Your device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the device unless you are instructed to do otherwise.
  • Page 56: Password Screen

    Chapter 5 System Screens Table 5 System: General LABEL Apply Reset 5.4.1 Password Screen Use this screen to control access to your ZyXEL Device by assigning a password to it. Click System > Password. The following screen displays. Figure 24 System: Password. The following table describes the labels in this screen.
  • Page 57: Figure 25 System: Time

    Figure 25 System: Time The following table describes the labels in this screen. Table 7 System: Time LABEL Current Time and Date Current Date Current Time Time and Date Setup Enable NTP client update Random User Defined Time Server Time Zone Setup Time Zone Daylight Saving Setup Daylight Savings...
  • Page 58: Technical Reference

    Chapter 5 System Screens Table 7 System: Time LABEL Start Date End Date Apply Reset 5.6 Technical Reference This section provides some technical information about the topics covered in this chapter. 5.6.1 Pre-defined NTP Time Servers List When you turn on the ZyXEL Device for the first time, the date and time start at 2000-01-01 00:00:00.
  • Page 59 Table 8 Default Time Servers (continued) ntp3.cs.wisc.edu ntp.cs.strath.ac.uk ntp1.sp.se time1.stupi.se tick.stdtime.gov.tw tock.stdtime.gov.tw time.stdtime.gov.tw When the ZyXEL Device uses the pre-defined list of NTP time servers, it randomly selects one server and tries to synchronize with it. If the synchronization fails, then the ZyXEL Device goes through the rest of the list in order from the first one tried until either it is successful or all the pre-defined NTP time servers have been tried.
  • Page 60 Chapter 5 System Screens ZyXEL NWA-1100 User’s Guide...
  • Page 61: Wireless Settings Screen

    H A P T E R Wireless Settings Screen 6.1 Overview This chapter discusses the steps to configure the Wireless Settings screen on the ZyXEL Device. It also introduces the wireless LAN (WLAN) and some basic scenarios. Figure 26 Wireless Mode In the figure above, the ZyXEL Device allows access to another bridge device (A) and a notebook computer (B) upon verifying their settings and credentials.
  • Page 62: What You Need To Know About Wireless Settings Screen

    Chapter 6 Wireless Settings Screen 6.3 What You Need To Know About Wireless Settings Screen A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point (AP). Intra- BSS traffic is traffic between wireless clients in the BSS.
  • Page 63: Wireless Mode

    Wireless Mode The IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. Your ZyXEL Device can support 802.11b Only, 802.11g Only and 802.11b+g. 6.4 Wireless Settings Screen Use this screen to choose the operating mode for your ZyXEL Device.
  • Page 64: Table 9 Wireless: Access Point

    Chapter 6 Wireless Settings Screen The following table describes the general wireless LAN labels in this screen. Table 9 Wireless: Access Point LABEL DESCRIPTION Basic Settings Operation Mode Select AP from the drop-down list. SSID The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is associated.
  • Page 65: Wireless Client Mode

    Table 9 Wireless: Access Point LABEL DESCRIPTION Number of Specify how many wireless stations can associate with your ZyXEL Device. Wireless Stations Allowed to Associate Radio Enable Select Yes to enable WLAN radio, and No to turn it off. The ZyXEL Device cannot be accessed wirelessly if radio is turned off.
  • Page 66: Figure 28 Wireless: Wireless Client

    Chapter 6 Wireless Settings Screen Figure 28 Wireless: Wireless Client The following table describes the general wireless LAN labels in this screen. Table 10 Wireless: Wireless Client LABEL DESCRIPTION Basic Settings Operation Mode Select Wireless Client from the drop-down list. Click Apply to make the Site Survey button appear next to the SSID field.
  • Page 67 Table 10 Wireless: Wireless Client LABEL DESCRIPTION Site Survey Click this to view a list of available wireless access points within the range. Wireless Mode Select 802.11b Only to allow only IEEE 802.11b compliant WLAN devices to associate with the ZyXEL Device. Select 802.11g Only to allow only IEEE 802.11g compliant WLAN devices to associate with the ZyXEL Device.
  • Page 68: Bridge Mode

    Chapter 6 Wireless Settings Screen 6.4.3 Bridge Mode Use this screen to have the ZyXEL Device act as a wireless network bridge and establish wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode.
  • Page 69 Table 11 Wireless: Bridge LABEL Channel Wireless Mode WDS Settings Local Mac Address Remote MAC Address 1 - 4 Advanced Settings Radio Enable Output Power Management Preamble Type RTS/CTS Threshold Fragmentation Rates Configuration ZyXEL NWA-1100 User’s Guide DESCRIPTIONS Set the operating frequency/channel depending on your particular region. To manually set the ZyXEL Device to use a channel, select a channel from the drop-down list box.
  • Page 70: Ap + Bridge Mode

    Chapter 6 Wireless Settings Screen Table 11 Wireless: Bridge LABEL Enable Antenna Diversity Enable Spanning Tree Protocol(STP) 6.4.4 AP + Bridge Mode Use this screen to have the ZyXEL Device function as a bridge and access point simultaneously. Select AP + Bridge as the Operation Mode. The following screen diplays. Figure 30 Wireless: AP+Bridge DESCRIPTIONS Select this to use antenna diversity.
  • Page 71: Technical Reference

    See the tables describing the fields in the Access Point and Bridge operating modes for descriptions of the fields in this screen. 6.5 Technical Reference This section provides technical background information about the topics covered in this chapter. Refer to Appendix E on page 153 6.5.1 WMM QoS WMM (Wi-Fi MultiMedia) QoS (Quality of Service) ensures quality of service in wireless...
  • Page 72: How Stp Works

    Chapter 6 Wireless Settings Screen Path cost is the cost of transmitting a frame onto a LAN through that port. It is assigned according to the speed of the link to which a port is attached. The slower the media, the higher the cost - see the following table.
  • Page 73: Additional Wireless Terms

    6.5.3 Additional Wireless Terms Table 14 Additional Wireless Terms TERM Intra-BSS Traffic RTS/CTS Threshold Preamble Fragmentation Threshold Roaming Antenna ZyXEL NWA-1100 User’s Guide DESCRIPTION This describes direct communication (not through the ZyXEL Device) between two wireless devices within a wireless network. You might disable this kind of communication to enhance security within your wireless network.
  • Page 74 Chapter 6 Wireless Settings Screen ZyXEL NWA-1100 User’s Guide...
  • Page 75: Wireless Security Screen

    H A P T E R Wireless Security Screen 7.1 Overview This chapter describes how to use the Wireless Security screen. This screen allows you to configure the security mode for your ZyXEL Device. Wireless security is vital to your network. It protects communications between wireless stations, access points and the wired network.
  • Page 76: What You Need To Know About Wireless Security

    Chapter 7 Wireless Security Screen 7.3 What You Need To Know About Wireless Security User Authentication Authentication is the process of verifying whether a wireless device is allowed to use the wireless network. You can make every user log in to the wireless network before they can use it.
  • Page 77: The Security Screen

    • WPA2-PSK-MIX. This commands the ZyXEL Device to use either WPA-PSK or WPA2-PSK depending on which security mode the wireless client uses. In Bridge and Bridge + AP operating modes, the only available security modes are WEP and WPA2-PSK. Passphrase A passphrase functions like a password.
  • Page 78: Security: Wep

    Chapter 7 Wireless Security Screen Figure 32 Security: None The default security mode is set to None. Note that some screens display differently depending on the operating mode selected in the Wireless > Wireless Settings screen. You must enable the same wireless security settings on the ZyXEL Device and on all wireless clients that you want to associate with it.
  • Page 79: Security: 802.1X Only

    The following table describes the labels in this screen. Table 16 Security: WEP LABEL DESCRIPTION Security Mode Choose WEP in this field. Authentication Select Open or Shared Key from the drop-down list box. Method The default setting is Auto. Data Encryption Select Disable to allow wireless stations to communicate with the access points without any data encryption.
  • Page 80: Wireless Client

    Chapter 7 Wireless Security Screen Figure 34 Security: 802.1x Only for Access Point The following table describes the labels in this screen. Table 17 Security: 802.1x Only for Access Point LABEL DESCRIPTION Security Mode Choose 802.1x Only in this field. ReAuthentication Specify how often wireless stations have to resend user names and passwords in Time...
  • Page 81: Security: 802.1X Static 64-Bit, 802.1X Static 128-Bit

    Figure 35 Security: 802.1x Only for Wireless Client The following table describes the labels in this screen. Table 18 Security: 802.1x Only for Wireless Client LABEL DESCRIPTION Security Mode Choose the same security mode used by the AP. Data Encryption Select between None and Dynamic WEP.
  • Page 82: Figure 36 Security: 802.1X Static 64-Bit, 802.1X Static 128-Bit (Ap Mode)

    Chapter 7 Wireless Security Screen Figure 36 Security: 802.1x Static 64-bit, 802.1x Static 128-bit (AP mode) The following table describes the labels in this screen. Table 19 Security: 802.1x Static 64-bit, 802.1x Static 128-bit LABEL DESCRIPTION Security Mode Choose 802.1x Static 64 or 802.1x Static 128 in this field. Passphrase Enter the passphrase or string of text used for automatic WEP key generation on wireless client adapters (AP mode).
  • Page 83: Security: Wpa

    Table 19 Security: 802.1x Static 64-bit, 802.1x Static 128-bit LABEL DESCRIPTION Group-Key The ZyXEL Device automatically disconnects a wireless station from the wired Update network after a period of inactivity. The wireless station needs to enter the user name and password again before access to the wired network is allowed. The default time interval is 3600 seconds (or 1 hour).
  • Page 84: Wireless Client

    Chapter 7 Wireless Security Screen Table 20 Security: WPA for Access Point LABEL DESCRIPTION Group Key The Group Key Update Timer is the rate at which the AP sends a new group key Update out to all clients. The re-keying process is the WPA equivalent of automatically changing the group key for an AP and all stations in a WLAN on a periodic basis.
  • Page 85: Security: Wpa2 Or Wpa2-Mix

    Table 21 Security: WPA for Wireless Client LABEL DESCRIPTION Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. 7.4.5 Security: WPA2 or WPA2-MIX This screen varies depending on whether you select Access Point or Wireless Client in the Wireless >...
  • Page 86: Wireless Client

    Chapter 7 Wireless Security Screen Table 22 Security: WPA2 or WPA2-MIX for Access Point LABEL DESCRIPTIONS Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. 7.4.5.2 Wireless Client Use this screen to employ WPA2 or WPA2-MIX as the security mode of your ZyXEL Device that is in Wireless Client operating mode.
  • Page 87: Security: Wpa-Psk, Wpa2-Psk, Wpa2-Psk-Mix

    7.4.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX Use this screen to employ WPA-PSK, WPA2-PSK or WPA2-PSK-MIX as the security mode of your ZyXEL Device. Select WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in the Security Mode field to display the following screen. Figure 41 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX The following table describes the labels not previously discussed Table 24 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX LABEL...
  • Page 88 Chapter 7 Wireless Security Screen ZyXEL NWA-1100 User’s Guide...
  • Page 89: Radius Screen

    H A P T E R 8.1 Overview This chapter describes how you can use the Wireless > RADIUS screen. Remote Authentication Dial In User Service (RADIUS) is a protocol that can be used to manage user access to large networks. It is based on a client-server model that supports authentication, authorization and accounting.
  • Page 90: The Radius Screen

    Chapter 8 RADIUS Screen • Accounting which keeps track of the client’s network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. You should know the IP addresses, ports and share secrets of the external RADIUS server and/ or the external RADIUS accounting server you want to use with your ZyXEL Device.
  • Page 91 Table 25 Wireless > RADIUS LABEL RADIUS Server Port Share Secret Active Accounting Server IP Address Accounting Server Port Share Secret Apply Reset ZyXEL NWA-1100 User’s Guide DESCRIPTION Enter the port number of the external authentication server. The default port number is 1812.
  • Page 92 Chapter 8 RADIUS Screen ZyXEL NWA-1100 User’s Guide...
  • Page 93: Mac Filter Screen

    H A P T E R 9.1 Overview This chapter discusses how you can use the Wireless > MAC Filter screen. The MAC filter function allows you to configure the ZyXEL Device to grant access to the ZyxEL Device from other wireless devices (Allow Association) or exclude devices from accessing the ZyXEL Device (Deny Association).
  • Page 94: Mac Filter Screen

    Chapter 9 MAC Filter Screen 9.4 MAC Filter Screen Use this screen to enable MAC address filtering in your ZyXEL Device.You can specify up to 64 MAC addresses to either allow or deny association with your ZyXEL Device. Click Wireless > MAC Filter. The screen displays as shown. Figure 45 Wireless >...
  • Page 95 Table 26 Wireless > MAC Filter LABEL DESCRIPTION Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. ZyXEL NWA-1100 User’s Guide Chapter 9 MAC Filter Screen...
  • Page 96 Chapter 9 MAC Filter Screen ZyXEL NWA-1100 User’s Guide...
  • Page 97: Ip Screen

    H A P T E R 10.1 Overview This chapter describes how you can configure the IP address of your ZyXEL Device. The Internet Protocol (IP) address identifies a device on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 98: Ip Screen

    Chapter 10 IP Screen 10.4 IP Screen Use this screen to configure the IP address for your ZyXEL Device. Click IP to display the following screen. Figure 47 IP Setup The following table describes the labels in this screen. Table 27 IP Setup LABEL IP Address Assignment Get automatically from...
  • Page 99: Technical Reference

    10.5 Technical Reference This section provides the technical background information about the topics covered in this chapter. 10.5.1 WAN IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet (only between your two branch offices, for instance) you can assign any IP addresses to the hosts without problems.
  • Page 100 Chapter 10 IP Screen ZyXEL NWA-1100 User’s Guide...
  • Page 101: Remote Management

    H A P T E R 11.1 Overview This chapter shows you how to enable remote management of your ZyXEL Device. It provides information on determining which services or protocols can access which of the ZyXEL Device’s interfaces. Remote Management allows a user to administrate the device over the network. You can manage your ZyXEL Device from a remote location via the following interfaces: •...
  • Page 102: What You Can Do In The Remote Management Screens

    Chapter 11 Remote Management 11.2 What You Can Do in the Remote Management Screens • Use the Telnet screen (see interface(s) and from which IP address(es) you can use Telnet to manage the ZyXEL Device. A Telnet connection is prioritized by the ZyXEL Device over other remote management sessions.
  • Page 103: Figure 49 Snmp Management Mode

    Figure 49 SNMP Management Mode An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the ZyXEL Device). An agent translates the local management information from the managed device into a form compatible with SNMP.
  • Page 104: The Telnet Screen

    Chapter 11 Remote Management 11.4 The Telnet Screen Use this screen to configure your ZyXEL Device for remote Telnet access. You can use Telnet to access the ZyXEL Device’s Command Line Interface (CLI). Click REMOTE MGNT > TELNET. The following screen displays. Figure 50 Remote Management: Telnet The following table describes the labels in this screen.
  • Page 105: The Www Screen

    Figure 51 Remote Management: FTP The following table describes the labels in this screen. Table 30 Remote Management: FTP LABEL DESCRIPTION Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Server Access Select the interface(s) through which a computer may access the ZyXEL Device using this service.
  • Page 106: The Snmp Screen

    Chapter 11 Remote Management Figure 52 Remote Management: WWW The following table describes the labels in this screen. Table 31 Remote Management: WWW LABEL DESCRIPTION Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
  • Page 107: Figure 53 Remote Management: Snmp

    Figure 53 Remote Management: SNMP The following table describes the labels in this screen. Table 32 Remote Management: SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community, which is the password for the incoming Get and GetNext requests from the management station. The default is public and allows all requests.
  • Page 108: Technical Reference

    Chapter 11 Remote Management Table 32 Remote Management: SNMP LABEL Secured Client MAC Address Apply Reset 11.8 Technical Reference This section provides some technical background information about the topics covered in this chapter. 11.8.1 MIB Managed devices in an SMNP managed network contain object variables or managed objects that define each piece of information to be collected about a device.
  • Page 109: Table 34 Snmp Interface Index To Physical And Virtual Port Mapping

    Table 33 SNMP Traps TRAP NAME warmStart linkDown linkUp authenticationFailure (defined in RFC-1215) Traps defined in the ZyXEL Private MIB. whyReboot pwTFTPStatus Some traps include an SNMP interface index. The following table maps the SNMP interface indexes to the ZyXEL Device’s physical and virtual ports. Table 34 SNMP Interface Index to Physical and Virtual Port Mapping TYPE INTERFACE...
  • Page 110 Chapter 11 Remote Management ZyXEL NWA-1100 User’s Guide...
  • Page 111: Certificate Screen

    H A P T E R 12.1 Overview This chapter describes how your ZyXEL Device can use certificates as a means of authenticating wireless clients. It gives background information about public-key certificates and explains how to use them. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
  • Page 112: Certificate Screen

    Chapter 12 Certificate Screen 12.4 Certificate Screen Use this screen to view, delete and import certificates. Click CERTIFICATE to open the ZyXEL Device’s summary list of certificates and to import a new certificate. See the following figure. Figure 55 Certificate The following table describes the labels in this screen.
  • Page 113: Private-Public Certificates

    12.5.1 Private-Public Certificates When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure. These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”).
  • Page 114: Figure 57 Certificate Details

    Chapter 12 Certificate Screen 3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Figure 57 Certificate Details 4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields.
  • Page 115: Log Screens

    H A P T E R 13.1 Overview This chapter provides information on viewing and generating logs on your ZyXEL Device. Logs are files that contain recorded network activity over a set period. They are used by administrators to monitor the health of the system(s) they are managing. Logs enable administrators to effectively monitor events, errors, progress, etc.
  • Page 116: What You Need To Know About Logs

    Chapter 13 Log Screens 13.3 What You Need To Know About Logs Alerts and Logs An alert is a type of log that warrants more serious attention. Some categories such as System Errors consist of both logs and alerts. You can differentiate them by their color in the View Log screen.
  • Page 117: Log Settings Screen

    13.5 Log Settings Screen Use this screen to configure to where and when the ZyXEL Device is to send the logs and which logs and/or immediate alerts it is to send. To change your ZyXEL Device’s log settings, click LOGS > Log Settings. The screen appears as shown.
  • Page 118: Technical Reference

    Chapter 13 Log Screens Table 37 Log Settings LABEL User Name Password Syslog Logging Active Syslog IP Address Syslog Port Number Send Log Log Schedule Day for Sending Time for Sending Clear log after sending mail Email log now System Maintenance System Errors 802.1x...
  • Page 119: Example Log Messages

    13.6.1 Example Log Messages The following tables provide descriptions of some example log messages that the ZyXEL Device generates. Table 38 System Maintenance Logs LOG MESSAGE WLAN: Radar interference 2412 MHz. WLAN: CW interference 2412 MHz. WLAN service started. WLAN service stopped. AP MIC failed.
  • Page 120: Displaying Logs

    Chapter 13 Log Screens Use sys logs category followed by a log category and a parameter to decide what to record Table 39 Log Categories and Available Settings LOG CATEGORIES error mten to not record logs for that category, alerts for that category, and Use the sys logs save command to store the settings in the ZyXEL Device (you must do this in order to record logs).
  • Page 121: Maintenance

    H A P T E R 14.1 Overview This chapter describes the maintenance screens. It discusses how you can view the association list and channel usage, upload new firmware, manage configuration and restart your ZyXEL Device without turning it off and on. 14.2 What You Can Do in the Maintenance Screens •...
  • Page 122: Channel Usage Screen

    Chapter 14 Maintenance Figure 61 Association List The following table describes the labels in this screen. Table 41 Association List LABEL MAC Address IP Address Association Time Signal Strength Rescan 14.5 Channel Usage Screen Use this screen to know whether a channel is used by another wireless network or not. If a channel is being used, you should select a channel removed from it by five channels to completely avoid overlap.
  • Page 123: F/W Upload Screen

    The following table describes the labels in this screen. Table 42 Channel Usage LABEL DESCRIPTION SSID This is the Service Set IDentification name of the AP in an Infrastructure wireless network or wireless station in an Ad-Hoc wireless network. For our purposes, we define an Infrastructure network as a wireless network that uses an AP and an Ad-Hoc network (also known as Independent Basic Service Set (IBSS)) as one that doesn’t.
  • Page 124: Configuration Screen

    Chapter 14 Maintenance Do not turn off the ZyXEL Device while firmware upload is in progress! After you see the Firmware Upload in Process screen, wait two minutes before logging into the ZyXEL Device again. Figure 64 Firmware Upload In Process The ZyXEL Device automatically restarts in this time causing a temporary network disconnect.
  • Page 125: Backup Configuration

    Figure 67 Configuration 14.7.1 Backup Configuration Backup configuration allows you to back up (save) the ZyXEL Device’s current configuration to a file on your computer. Once your ZyXEL Device is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes.
  • Page 126: Back To Factory Defaults

    Chapter 14 Maintenance After you see a “restore configuration successful” screen, you must then wait one minute before logging into the ZyXEL Device again. Figure 68 Configuration Upload Successful The ZyXEL Device automatically restarts in this time causing a temporary network disconnect.
  • Page 127: Restart Screen

    Figure 71 Reset Warning Message You can also press the RESET button to reset your ZyXEL Device to its factory default settings. Refer to Section 2.2 on page 36 14.8 Restart Screen Use this screen to reboot the ZyXEL Device without turning the power off. Click Maintenance >...
  • Page 128 Chapter 14 Maintenance ZyXEL NWA-1100 User’s Guide...
  • Page 129: Troubleshooting

    H A P T E R This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • ZyXEL Device Access and Login • Internet Access 15.1 Power, Hardware Connections, and LEDs The ZyXEL Device does not turn on.
  • Page 130 Chapter 15 Troubleshooting 1 The default IP address is 192.168.1.2. 2 If you changed the IP address and have forgotten it, you might get the IP address of the ZyXEL Device by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start >...
  • Page 131: Internet Access

    I can see the Login screen, but I cannot log in to the ZyXEL Device. 1 Make sure you have entered the user name and password correctly. The default password is 1234. This fields are case-sensitive, so make sure [Caps Lock] is not on. 2 You cannot log in to the web configurator while someone is using the Telnet to access the ZyXEL Device.
  • Page 132 Chapter 15 Troubleshooting 3 If the problem continues, contact your ISP or network administrator. The Internet connection is slow or intermittent. 1 There might be a lot of traffic on the network. Look at the LEDs, and check on page 32.
  • Page 133: Appendices And Index

    Appendices and Index Product Specifications (135) Power over Ethernet (PoE) Specifications (137) Power Adaptor Specifications (139) Setting up Your Computer’s IP Address (141) Wireless LANs (153) Pop-up Windows, JavaScripts and Java Permissions (167) IP Addresses and Subnetting (173) Text File Based Auto Configuration (181) How to Access and Use the CLI (187) Legal Information (191) Customer Support (195)
  • Page 135: Appendix A Product Specifications

    P P E N D I X Product Specifications The following tables summarize the ZyXEL Device’s hardware and firmware features. Table 45 Hardware Specifications Power Specification Reset button Ethernet Port Power over Ethernet (PoE) Antenna Operation Temperature Storage Temperature Operation Humidity Storage Humidity Dimensions Table 46 Firmware Specifications...
  • Page 136 Appendix A Product Specifications Table 46 Firmware Specifications SSL Passthrough MAC Address Filter Wireless Association List Logging and Tracing Embedded FTP and TFTP Servers Auto Configuration SNMP SSL (Secure Sockets Layer) uses a public key to encrypt data that's transmitted over an SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers.
  • Page 137: Appendix B Power Over Ethernet (Poe) Specifications

    P P E N D I X Power over Ethernet (PoE) You can use a power over Ethernet injector to power this device. The injector must comply to IEEE 802.3af.-7 Table 47 Power over Ethernet Injector Specifications Power Output Power Current Table 48 Power over Ethernet Injector RJ-45 Port Pin Assignments PIN NO 1 2 3 4 5 6 7 8...
  • Page 138 Appendix B Power over Ethernet (PoE) Specifications ZyXEL NWA-1100 User’s Guide...
  • Page 139: Appendix C Power Adaptor Specifications

    P P E N D I X Power Adaptor Specifications Table 49 North American Plug Standards AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards Table 50 European Plug Standards AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards Table 51 United Kingdom Plug Standards...
  • Page 140 Appendix C Power Adaptor Specifications ZyXEL NWA-1100 User’s Guide...
  • Page 141: Appendix D Setting Up Your Computer's Ip Address

    P P E N D I X Setting up Your Computer’s IP All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer.
  • Page 142: Installing Components

    Appendix D Setting up Your Computer’s IP Address Figure 73 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add.
  • Page 143: Figure 74 Windows 95/98/Me: Tcp/Ip Properties: Ip Address

    Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically. • If you have a static IP address, select Specify an IP address and type your information into the IP Address and Subnet Mask fields.
  • Page 144: Verifying Settings

    Appendix D Setting up Your Computer’s IP Address Figure 75 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add. 5 Click OK to save and close the TCP/IP Properties window.
  • Page 145: Figure 76 Windows Xp: Start Menu

    Figure 76 Windows XP: Start Menu 2 For Windows XP, click Network Connections. For Windows 2000/NT, click Network and Dial-up Connections. Figure 77 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. ZyXEL NWA-1100 User’s Guide Appendix D Setting up Your Computer’s IP Address...
  • Page 146: Figure 78 Windows Xp: Control Panel: Network Connections: Properties

    Appendix D Setting up Your Computer’s IP Address Figure 78 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties. Figure 79 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 147: Figure 80 Windows Xp: Advanced Tcp/Ip Settings

    Figure 80 Windows XP: Advanced TCP/IP Settings 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
  • Page 148: Figure 81 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    Appendix D Setting up Your Computer’s IP Address Figure 81 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click OK to close the Local Area Connection Properties window. 10 Turn on your ZyXEL Device and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
  • Page 149: Figure 82 Macintosh Os 8/9: Apple Menu

    Figure 82 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 83 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: •...
  • Page 150: Macintosh Os X

    Appendix D Setting up Your Computer’s IP Address • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your ZyXEL Device in the Router address box. 5 Close the TCP/IP Control Panel.
  • Page 151: Figure 85 Macintosh Os X: Network

    Figure 85 Macintosh OS X: Network 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. •...
  • Page 152 Appendix D Setting up Your Computer’s IP Address ZyXEL NWA-1100 User’s Guide...
  • Page 153: Wireless Lan Topologies

    P P E N D I X Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 154: Figure 87 Basic Service Set

    Appendix E Wireless LANs Figure 87 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
  • Page 155: Figure 88 Infrastructure Wlan

    Figure 88 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference.
  • Page 156: Figure 89 Rts/Cts

    Appendix E Wireless LANs Figure 89 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
  • Page 157: Fragmentation Threshold

    Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
  • Page 158: Wireless Security Overview

    Appendix E Wireless LANs Wireless Security Overview Wireless security is vital to your network to protect wireless communication between wireless clients, access points and the wired network. Wireless security methods available on the ZyXEL Device are data encryption, wireless client authentication, restricting access by device MAC address and hiding the ZyXEL Device identity.
  • Page 159: Types Of Eap Authentication

    RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The access point is the client and the server is the RADIUS server. The RADIUS server handles the following tasks: • Authentication Determines the identity of the users. •...
  • Page 160 Appendix E Wireless LANs EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication.
  • Page 161: Dynamic Wep Key Exchange

    LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed.
  • Page 162 Appendix E Wireless LANs If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical) password entered into each access point, wireless gateway and wireless client.
  • Page 163: Wpa With Radius Application Example

    User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a network.
  • Page 164: Figure 90 Wpa(2) With Radius Application Example

    Appendix E Wireless LANs Figure 90 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols).
  • Page 165: Security Parameters Summary

    Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 56 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL...
  • Page 166: Types Of Antennas For Wlan

    Appendix E Wireless LANs Antenna Gain Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width. Higher antenna gain improves the range of the signal for better communications. For an indoor site, each 1 dB increase in antenna gain results in a range increase of approximately 2.5%.
  • Page 167: Internet Explorer Pop-Up Blockers

    P P E N D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Internet Explorer 6 screens are used here.
  • Page 168: Figure 93 Internet Options: Privacy

    Appendix F Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 93 Internet Options: Privacy 3 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
  • Page 169: Figure 94 Internet Options: Privacy

    Figure 94 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 95 Pop-up Blocker Settings ZyXEL NWA-1100 User’s Guide Appendix F Pop-up Windows, JavaScripts and Java Permissions...
  • Page 170: Figure 96 Internet Options: Security

    Appendix F Pop-up Windows, JavaScripts and Java Permissions 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 171: Java Permissions

    Figure 97 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window.
  • Page 172: Figure 99 Java (Sun)

    Appendix F Pop-up Windows, JavaScripts and Java Permissions JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Figure 99 Java (Sun) ZyXEL NWA-1100 User’s Guide...
  • Page 173: Introduction To Ip Addresses

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 174: Figure 100 Network Number And Host Id

    Appendix G IP Addresses and Subnetting Figure 100 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation).
  • Page 175: Table 58 Subnet Masks

    Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 58 Subnet Masks BINARY OCTET 8-bit mask 11111111 16-bit mask 11111111 24-bit mask 11111111...
  • Page 176: Figure 101 Subnetting Example: Before Subnetting

    Appendix G IP Addresses and Subnetting Table 60 Alternative Subnet Mask Notation (continued) SUBNET MASK 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252 Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons.
  • Page 177: Figure 102 Subnetting Example: After Subnetting

    Figure 102 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address).
  • Page 178: Table 62 Subnet 2

    Appendix G IP Addresses and Subnetting Table 62 Subnet 2 IP/SUBNET MASK IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.64 Broadcast Address: 192.168.1.127 Table 63 Subnet 3 IP/SUBNET MASK IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.128 Broadcast Address:...
  • Page 179: Table 66 24-Bit Network Number Subnet Planning

    Table 65 Eight Subnets (continued) SUBNET SUBNET ADDRESS Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 66 24-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS The following table is a summary for subnet planning on a network with a 16-bit network number.
  • Page 180: Configuring Ip Addresses

    Appendix G IP Addresses and Subnetting Table 67 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
  • Page 181: Appendix H Text File Based Auto Configuration

    P P E N D I X This chapter describes how administrators can use text configuration files to configure the wireless LAN settings for multiple APs. Text File Based Auto Configuration Overview You can use plain text configuration files to configure the wireless LAN settings on multiple APs.
  • Page 182: Table 68 Auto Configuration By Dhcp

    Appendix H Text File Based Auto Configuration If adjacent APs use the same configuration file, you should leave out the channel setting since they could interfere with each other’s wireless traffic. Auto Configuration by DHCP A DHCP response can use options 66 and 67 to assign a TFTP server IP address and a filename.
  • Page 183: Figure 104 Configuration File Format

    Troubleshooting Via SNMP If you have any difficulties with the configuration file upload, you can try using the following MIB 10 to 20 seconds after using SNMP to have the AP download the configuration file. Table 71 Displaying the File Version ITEM OBJECT ID pwTftpOpStatus...
  • Page 184: Figure 105 Wep Configuration File Example

    Appendix H Text File Based Auto Configuration You can zip each configuration file. You must use the store compression method and a .zip file extension. When zipping a configuration file, you can also add password protection using the same password that you use to log into the AP. Wcfg Command Configuration File Examples These example configuration files use the profiles.
  • Page 185: Figure 107 Wpa-Psk Configuration File Example

    Figure 107 WPA-PSK Configuration File Example !#ZYXEL PROWLAN !#VERSION 13 wcfg security 3 name Test-wpapsk wcfg security 3 mode wpapsk wcfg security 3 passphrase qwertyuiop wcfg security 3 reauthtime 1800 wcfg security 3 idletime 3600 wcfg security 3 groupkeytime 1800 wcfg security save wcfg ssid 3 name ssid-wpapsk wcfg ssid 3 security Test-wpapsk...
  • Page 186 Appendix H Text File Based Auto Configuration !#ZYXEL PROWLAN !#VERSION 15 wcfg ssid 1 name ssid-wep wcfg ssid 1 security Test-wep wcfg ssid 2 name ssid-8021x wcfg ssid 2 security Test-8021x wcfg ssid 2 radius radius-rd wcfg ssid 3 name ssid-wpapsk wcfg ssid 3 security Test-wpapsk wcfg ssid 4 name ssid-wpa2psk wcfg ssid 4 security Test-wpa2psk...
  • Page 187: Accessing The Cli

    P P E N D I X How to Access and Use the CLI This chapter introduces the command line interface (CLI). Accessing the CLI Use Telnet to access the CLI. 1 Connect your computer to one of the Ethernet ports. 2 Open a Telnet session to the ZyXEL Device’s IP address.
  • Page 188: Command Conventions

    Appendix I How to Access and Use the CLI Command Conventions Command descriptions follow these conventions: • Commands are in • Required input values are in angle brackets <>; for example, means that you must specify an IP address for this command. •...
  • Page 189: Using Shortcuts And Getting Help

    Copy and Paste Commands You can copy and paste commands directly from this document into your terminal emulation console window (such as HyperTerminal). Use right-click (not [CTRL]-[V]) to paste your command into the console window as shown next. Using Shortcuts and Getting Help This table identifies some shortcuts in the CLI, as well as how to get help.
  • Page 190: Saving Your Configuration

    Appendix I How to Access and Use the CLI Saving Your Configuration In the ZyXEL Device some commands are saved as you run them and others require you to run a save command. See the related section of this guide to see if a save command is required. Unsaved configuration changes are lost once you restart the ZyXEL Device Logging Out Use the...
  • Page 191: Appendix J Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 192: Fcc Radiation Exposure Statement

    Appendix J Legal Information If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: 1 Reorient or relocate the receiving antenna.
  • Page 193: Zyxel Limited Warranty

    3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever...
  • Page 194 Appendix J Legal Information ZyXEL NWA-1100 User’s Guide...
  • Page 195: Appendix K Customer Support

    • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-3-578-3942 • Fax: +886-3-578-2439 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Corp., 6 Innovation Road II, Science Park, Hsinchu 300, Taiwan China - ZyXEL Communications (Beijing) Corp. • Support E-mail: cso.zycn@zyxel.cn • Sales E-mail: sales@zyxel.cn •...
  • Page 196 Czech Republic • E-mail: info@cz.zyxel.com • Telephone: +420-241-091-350 • Fax: +420-241-091-359 • Web: www.zyxel.cz • Regular Mail: ZyXEL Communications, Czech s.r.o., Modranská 621, 143 01 Praha 4 - Modrany, Ceská Republika Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk •...
  • Page 197 Germany • Support E-mail: support@zyxel.de • Sales E-mail: sales@zyxel.de • Telephone: +49-2405-6909-69 • Fax: +49-2405-6909-99 • Web: www.zyxel.de • Regular Mail: ZyXEL Deutschland GmbH., Adenauerstr. 20/A2 D-52146, Wuerselen, Germany Hungary • Support E-mail: support@zyxel.hu • Sales E-mail: info@zyxel.hu • Telephone: +36-1-3361649 •...
  • Page 198 • Support Telephone: +1-800-978-7222 • Sales E-mail: sales@zyxel.com • Sales Telephone: +1-714-632-0882 • Fax: +1-714-632-0858 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806- 2001, U.S.A. Norway • Support E-mail: support@zyxel.no • Sales E-mail: sales@zyxel.no •...
  • Page 199 • Support E-mail: support@zyxel.es • Sales E-mail: sales@zyxel.es • Telephone: +34-902-195-420 • Fax: +34-913-005-345 • Web: www.zyxel.es • Regular Mail: ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • Telephone: +46-31-744-7700 •...
  • Page 200 • Sales E-mail: sales@zyxel.co.uk • Telephone: +44-1344-303044, 0845 122 0301 (UK only) • Fax: +44-1344-303034 • Web: www.zyxel.co.uk • Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road, Bracknell, Berkshire RG12 2XB, United Kingdom (UK) ZyXEL NWA-1100 User’s Guide...
  • Page 201 Numbers 802.1x-Only 802.1x-Static128 802.1x-Static64 Access Point 25, 45 Accounting Server Ad-hoc Advanced Encryption Standard See AES. Alerts Alternative subnet mask notation Antenna 73, 135 directional gain omni-directional positioning AP (Access Point) AP + Bridge Applications Access Point AP + Bridge Bridge Wireless Client Auto Configuration...
  • Page 202 Index Domain Name Server (DNS) DTIM Interval Dynamic WEP key exchange EAP authentication Enable Antenna Diversity 67, 70 Enable Spanning Tree Control (STP) Enable Spanning Tree Protocol(STP) Encryption 77, 79, 81, 84, 161, 162 62, 154 Ethernet device Ethernet Port Extended Service Set see ESS Extensible Authentication Protocol...
  • Page 203 Blinking ETHERNET Flashing WLAN legacy authentication methods Lightweight Extensible Authentication Protocol Log Commands Log Messages Log Screens Login Logs accessing logs Command List displaying logs receiving logs via e-mail Logs Screen Mail Server Mail Subject Send Log to Syslog Logs, Uses of loss of messages MAC Address Clone MAC Filter...
  • Page 204 Index Authentication Authorization message types messages shared secret key RADIUS Screen Accounting Server Accounting Server IP Address Accounting Server Port Backup Primary Server IP Address Server Port Share Secret RADIUS server Rates Configuration 65, 67, 69 registration product Related documentation Remote Authentication Dial In User Service remote management remote management limitations...
  • Page 205 telnet Telnet (accessing the CLI) Temperature Temporal Key Integrity Protocol Temporal Key Integrity Protocol (TKIP) Text file based auto configuration TFTP restrictions Thumbprint Algorithm Time Servers List timeout TKIP Tracing Trademarks Transport Layer Security Troubleshooting connection is slow or intermittent DHCP factory defaults firmware...
  • Page 206 Index pre-authentication user authentication vs WPA-PSK wireless client supplicant with RADIUS application example WPA capability to Windows XP WPA2 76, 161 user authentication vs WPA2-PSK wireless client supplicant with RADIUS application example WPA2-MIX WPA2-Pre-Shared Key WPA2-PSK application example WPA2-PSK-MIX WPA-PSK application example ZyXEL Device Ethernet parameters...

Table of Contents