ZyXEL Communications NXC-8160 User Manual
ZyXEL Communications NXC-8160 User Manual

ZyXEL Communications NXC-8160 User Manual

Business wlan controller
Hide thumbs Also See for NXC-8160:
Table of Contents

Advertisement

Quick Links

NXC-8160
Business WLAN Controller
User's Guide
Version 1.0
6/2007
Edition 1
www.zyxel.com

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NXC-8160

  • Page 1 NXC-8160 Business WLAN Controller User’s Guide Version 1.0 6/2007 Edition 1 www.zyxel.com...
  • Page 3: About This User's Guide

    About This User's Guide Intended Audience This manual is intended for people who want to configure the NXC-8160 using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away.
  • Page 4: Document Conventions

    Syntax Conventions • The NXC-8160 wireless switch may be referred to as the “NXC-8160”, the “WLAN controller” or the “system” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
  • Page 5 Icons Used in Figures Figures in this User’s Guide may use the following generic icons. NXC-8160 Server Access Point NXC-8160 User’s Guide Computer Notebook computer Wireless Signal Modem/Router Document Conventions...
  • Page 6: Safety Warnings

    • Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. Safety Warnings NXC-8160 User’s Guide...
  • Page 7 Only use the included antenna(s). • If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged. This product is recyclable. Dispose of it properly. NXC-8160 User’s Guide Safety Warnings...
  • Page 8 Safety Warnings NXC-8160 User’s Guide...
  • Page 9: Table Of Contents

    Introduction ... 21 Getting to Know Your NXC-8160 ... 23 Introducing the Web Configurator ... 27 Web Configurator ... 33 LAN Screen ... 35 Centralized Configuration ... 41 Wireless LAN ... 47 Advanced Screen ... 63 Access Points Screen ... 67 Maintenance Screen ...
  • Page 10 Contents Overview NXC-8160 User’s Guide...
  • Page 11: Table Of Contents

    1.2.1 Wireless Internet Access ... 23 1.2.2 Backup NXC-8160 ... 24 1.3 Ways to Manage the NXC-8160 ... 25 1.4 Good Habits for Managing the NXC-8160 ... 25 1.5 Front Panel LEDs (Lights) ... 25 Chapter 2 Introducing the Web Configurator ... 27 2.1 Web Configurator Overview ...
  • Page 12 4.1 Introduction to Centralized Configuration ... 41 4.2 SSH ... 41 4.3 How SSH Works ... 42 4.4 SSH Implementation on the NXC-8160 ... 43 4.4.1 Requirements for Using SSH ... 43 4.5 Centralized Configuration Screen ... 43 Chapter 5 Wireless LAN...
  • Page 13 Part III: Troubleshooting and Specifications ... 75 Chapter 10 Troubleshooting... 77 10.1 Power, Hardware Connections, and LEDs ... 77 10.2 NXC-8160 Access and Login ... 78 10.3 Internet Access ... 79 Chapter 11 Product Specifications ... 81 Part IV: Appendices and Index ... 85 Appendix A Setting up Your Computer’s IP Address...
  • Page 14 Table of Contents NXC-8160 User’s Guide...
  • Page 15: List Of Figures

    List of Figures List of Figures Figure 1 Wireless Internet Access ... 24 Figure 2 Backup NXC-8160 ... 24 Figure 3 Front Panel ... 25 Figure 4 Status Screen ... 28 Figure 5 Web Configurator Status Screen ... 29 Figure 6 Web Configurator About Screen ... 31 Figure 7 LAN and WAN ...
  • Page 16 List of Figures Figure 39 Windows XP: Advanced TCP/IP Properties ... 94 Figure 40 Windows XP: Internet Protocol (TCP/IP) Properties ... 95 Figure 41 Windows Vista: Start Menu ... 96 Figure 42 Windows Vista: Control Panel ... 96 Figure 43 Windows Vista: Network And Internet ... 96 Figure 44 Windows Vista: Network and Sharing Center ...
  • Page 17 List of Figures Figure 82 RTS/CTS ... 130 Figure 83 WPA(2) with RADIUS Application Example ... 137 Figure 84 WPA(2)-PSK Authentication ... 138 [Document Title]...
  • Page 18 List of Figures [Document Title]...
  • Page 19: List Of Tables

    Table 4 Screens Summary ... 30 Table 5 Web Configurator About Screen ... 31 Table 6 LAN ... 39 Table 7 ZyXEL Centralized Configuration Specifications ... 41 Table 8 Centralized Configuration (Member) ... 44 Table 9 Centralized Configuration (Master) ... 44 Table 10 Types of Encryption for Each Type of Authentication ...
  • Page 20 List of Tables Table 39 24-bit Network Number Subnet Planning ...115 Table 40 16-bit Network Number Subnet Planning ...115 Table 41 IEEE 802.11g ... 131 Table 42 Wireless Security Levels ... 132 Table 43 Comparison of EAP Authentication Types ... 135 Table 44 Wireless Security Relational Matrix ...
  • Page 21: Introduction

    Introduction Getting to Know Your NXC-8160 (23) Introducing the Web Configurator (27)
  • Page 23: Getting To Know Your Nxc-8160

    AP individually. The AP acts as an antenna of the NXC- 8160. If you have more than one NXC-8160 in your network, you can manage the other NXC- 8160(s) through a NXC-8160. You can also set one NXC-8160 as the main WLAN controller, and the other as the backup when the primary is not active or cannot work properly.
  • Page 24: Backup Nxc-8160

    To ensure wireless Internet access availability, deploy one NXC-8160 as the main WLAN controller and the other NXC-8160 as the backup. Both NXC-8160s should be in the same network and have the same number of connected access points and use the same wireless settings (such as SSID, channel, IEEE 802.11 mode and security).
  • Page 25: Ways To Manage The Nxc-8160

    User’s Guide. 1.4 Good Habits for Managing the NXC-8160 Do the following things regularly to make the NXC-8160 more secure and to manage the NXC-8160 more effectively. • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters.
  • Page 26: Table 1 Front Panel Leds (Lights)

    Chapter 1 Getting to Know Your NXC-8160 The following table describes the lights on the NXC-8160. Table 1 Front Panel LEDs (Lights) COLOR POWER Green LINK/ACT Green WLAN 1 ~ 8 LINK Green STATUS DESCRIPTION The NXC-8160 is turned off.
  • Page 27: Introducing The Web Configurator

    H A P T E R This chapter describes how to access the NXC-8160 web configurator and provides an overview of its screens. 2.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy NXC-8160 setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions.
  • Page 28: Title Bar

    The main window shows the screen you select in the navigation panel. It is discussed in more detail in the rest of this document. Right after you log in, the Status screen is displayed. 2.3.3 Status Screen This screen displays general status information about the NXC-8160. NXC-8160 User’s Guide...
  • Page 29: Figure 5 Web Configurator Status Screen

    Up Time This field displays how long the NXC-8160 has been running since it last started up. The NXC-8160 starts up when you turn it on, when you restart it or reset to the defaults (using the Maintenance screen). IP Address This shows the LAN port’s IP address.
  • Page 30: Navigation Panel

    Use this screen to configure the wireless LAN settings and WLAN security settings for an SSID. Use this screen to set up an alternative NXC-8160 as a backup in case the primary NXC-8160 fails. You can also use this screen to send SNMP traps to an SNMP manager.
  • Page 31: Figure 6 Web Configurator About Screen

    This field displays the date and time when firmware kernel was built. Redboot This field displays the Redboot version number and the date created. RedBoot is an embedded system bootstrap and debug firmware from RedHat. NXC-8160 User’s Guide Chapter 2 Introducing the Web Configurator...
  • Page 32 Chapter 2 Introducing the Web Configurator NXC-8160 User’s Guide...
  • Page 33: Web Configurator

    Web Configurator LAN Screen (35) Wireless LAN (47)
  • Page 35: Lan Screen

    The Local Area Network (LAN) includes the computers and networking devices (such as the NXC-8160) in your home or office that you connect to a modem or router’s LAN ports. The Wide Area Network (WAN) is another network (most likely the Internet) that you connect to a modem or router.
  • Page 36: Private Ip Addresses

    RFC 1466, Guidelines for Management of IP Address Space. 3.2.2 Management IP Addresses The NXC-8160 needs an IP address for it to be managed over the network. The factory default IP address is 192.168.1.10. The subnet mask specifies the network number portion of an IP address.
  • Page 37: Vlan

    In this example, there is an NXC-8160 and a VLAN-aware switch A in your network. The NXC-8160 is connected to port 4 on switch A. Port 5 on switch A is the uplink port and connected to the Internet. You configure the following VLAN settings on switch A and the NXC-8160.
  • Page 38: Lan

    VLAN 301 Port 3, 4, 5 This way, the device connected to port 1 on switch A can configure the NXC-8160. Wireless clients connected to SSID x or y cannot manage the NXC-8160 itself, but they can communicate with port 2 or 3 on switch A and access the Internet. Wireless clients connected to SSID x cannot talk to wireless clients connected to SSID y.
  • Page 39: Figure 9 Lan

    NXC-8160. Note: All centralized configuration members and the master NXC- 2nd IP Address Enter a second IP address as the NXC-8160’s backup IP address. It should be in a different subnet from the primary one. 2nd IP Subnet Enter the subnet mask that specifies the network number portion of the second IP Mask address.
  • Page 40 Chapter 3 LAN Screen NXC-8160 User’s Guide...
  • Page 41: Centralized Configuration

    In the following example, controller A is the master and the other controllers are members. Figure 10 Centralized Configuration Example 4.2 SSH You can use SSH (Secure SHell) to securely access the NXC-8160. NXC-8160 User’s Guide Must be compatible with ZyXEL centralized configuration implementation.
  • Page 42: How Ssh Works

    A on the Internet uses SSH to securely connect to the NXC-8160 for a management session. If the NXC-8160 is behind a NAT router or a firewall, you need to configure the router or firewall to allow a SSH connection to the NXC-8160.
  • Page 43: Ssh Implementation On The Nxc-8160

    NXC-8160 as a master or member controller. The screen changes depending on whether you select the Master Controller check box. By default, the Master Controller check box is not selected and the NXC-8160 acts as a member controller. Figure 13 Centralized Configuration (Member) NXC-8160 User’s Guide...
  • Page 44: Figure 14 Centralized Configuration (Master)

    DESCRIPTION SSH Key Management Master Controller When you have more than one NXC-8160 in the network, select this to have your NXC-8160 act as the master controller. You can manage the member controllers in the same network through the master controller.
  • Page 45 Generate New Click the Save button next to Generate New SSH Keys to have the NXC-8160 SSH Keys create a SSH key which is to be used to identify the NXC-8160 for SSH connections. Retrieve Public Click the Save button next to Retrieve Public SSH Key to download and save a SSH Key public key on your computer, so that you can upload the key to a member.
  • Page 46 Chapter 4 Centralized Configuration NXC-8160 User’s Guide...
  • Page 47: Wireless Lan

    H A P T E R This chapter discusses how to configure wireless LAN on the NXC-8160. 5.1 Wireless LAN Introduction A wireless LAN can be as simple as two computers with wireless LAN adapters communicating in a peer-to-peer network or as complex as a number of computers with wireless LAN adapters communicating through access points which bridge network traffic to the wired LAN.
  • Page 48: Wireless Security Overview

    In this wireless network, devices A and B are called wireless clients. The wireless clients use the access point (AP) which is connected to a WLAN controller to interact with other devices (such as the printer) or with the Internet. Your NXC-8160 is the WLAN controller. Every wireless network must follow these basic guidelines.
  • Page 49: Encryption

    It is not possible to use WPA-PSK, WPA or stronger encryption with a local user database. In this case, it is better to set up stronger encryption with no authentication than to set up weaker encryption with the local user database. NXC-8160 User’s Guide for information about this.) RADIUS SERVER WEP + 802.1x (LEAP)
  • Page 50: Additional Installation Requirements For Using 802.1X

    Determines the identity of the users. • Accounting Keeps track of the client’s network activity. RADIUS user is a simple package exchange in which your NXC-8160 acts as a message relay between the wireless station and the network RADIUS server. 5.4 Configuring WLAN Click WLAN to open the WLAN Configuration screen.
  • Page 51: Figure 16 Wlan

    Chapter 5 Wireless LAN Figure 16 WLAN NXC-8160 User’s Guide...
  • Page 52 The options vary depending on the 802.11 mode you selected and the country you are in. Note: The same channel cannot be assigned to both radios. Maximum Enter a number (from one to 15) to specify how many times the NXC-8160 tries to Retries send a packet when the transmission fails. Enable Rate...
  • Page 53: Rename Ssids

    Click the Rename SSIDs link to open a screen where you can change the SSID(s) created on the NXC-8160. See All SSIDs This text box shows all SSIDs available on the NXC-8160. Select an SSID and click Delete Permanently to remove it from the NXC-8160. Edit SSID &...
  • Page 54: Configuring Wireless Security

    WEP128 & 802.1x (LEAP) WPA-PSK DESCRIPTION This displays the SSIDs available on the NXC-8160. Enter a new descriptive name (up to 32 printable English keyboard characters) to replace an existing one. Click Save to save your customized settings. Click Cancel to exit this screen without saving.
  • Page 55: Figure 18 Ssid & Security

    If you select Enable, wireless clients in the same BSS can access the wired network and communicate with each other. If you select Disable, wireless clients in the same BSS can still access the wired network but cannot communicate with each other. NXC-8160 User’s Guide Chapter 5 Wireless LAN...
  • Page 56: No Security

    VLAN group. Otherwise, leave this field at its default (none). Disassociation Enter the number of seconds (from 0 to 3600) for the NXC-8160 to wait before it Timeout automatically disconnect a wireless client from the wired network when there is no traffic sent to or from the wireless client.
  • Page 57: Static Wep

    Static WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the wireless clients must use the same WEP key to encrypt and decrypt data. Your NXC-8160 allows you to configure up to four 64-bit or 128-bit WEP keys, but only one key can be used at any one time.
  • Page 58: Figure 20 Ssid & Security: Wep

    WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized wireless stations from accessing data transmitted over the wireless network. Transmission The WEP keys are used to encrypt data. Both the NXC-8160 and the wireless clients Keys must use the same WEP key for data transmission.
  • Page 59: Static Wep + Ieee 802.1X (Leap)

    Select WEP64 & 802.1x (LEAP) or WEP128 & 802.1x (LEAP) from the drop-down list. WEP Keys WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized wireless stations from accessing data transmitted over the wireless network. NXC-8160 User’s Guide Chapter 5 Wireless LAN...
  • Page 60: Wpa-Psk

    The WEP keys are used to secure your data from eavesdropping by unauthorized Keys wireless users. Both the NXC-8160 and the wireless clients must use the same WEP key for data transmission. You can configure up to four keys, but only one key can be activated at any one time.
  • Page 61: Wpa

    WPA equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a periodic basis. Enter a time interval between 0 and 3600 seconds. 5.5.5 WPA Select WPA from the Security Mode list. NXC-8160 User’s Guide Chapter 5 Wireless LAN...
  • Page 62: Figure 23 Ssid & Security: Wpa

    WEP key for an AP and all stations in a WLAN on a periodic basis. Enter a time interval between 0 and 3600 seconds. RADIUS The NXC-8160 can use an external RADIUS server to authenticate an unlimited number of users. RADIUS Server...
  • Page 63: Advanced Screen

    An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the NXC-8160). An agent translates the local management information from the managed device into a form compatible with SNMP.
  • Page 64: Snmp Traps

    • Set - Allows the manager to set values for object variables within an agent. • Trap - Used by the agent to inform the manager of some events. 6.1.1 SNMP Traps The NXC-8160 can send the following traps to the SNMP manager. Table 20 SNMP Traps TRAP NAME Configured and connected APs of channel [<channel number>]...
  • Page 65: Figure 25 Advanced

    Monitored IP Enter the IP address of the other WLAN controller. Reference IP Eenter the IP address of a reliable nearby computer to have the NXC-8160 ping that address and test the connection to the LAN. Keep Alive The NXC-8160 tests the connection by periodically sending a ping to the address in Interval (ms) the Reference IP field.
  • Page 66 Destination Type the IP address of the station to send your SNMP traps to. Save Click Save to save your customized settings in this section. Reset Click Reset to begin configuring this section of the screen afresh. NXC-8160 User’s Guide...
  • Page 67: Access Points Screen

    Click Access Points to display the screen as shown. This screen allows you to view the status of the access points (APs) connected to the NXC-8160. You can also use this screen to set the NXC-8160 not to supply power to an AP.
  • Page 68 Chapter 7 Access Points Screen NXC-8160 User’s Guide...
  • Page 69: Maintenance Screen

    The maintenance screens can help you view the configuration, upload new firmware, manage configuration, configure the NXC-8160’s time and restart your NXC-8160. Only upload firmware for your specific model! Do not turn off the NXC-8160 while firmware upload is in progress! Figure 27 Maintenance NXC-8160 User’s Guide...
  • Page 70: Configuring Syslog & Monitor

    NXC-8160 to its factory defaults. 8.2 Configuring Syslog & Monitor Use this screen to configure to where the NXC-8160 is to send logs and how often a log will be sent. Click Maintenance > Syslog & Monitor. The screen appears as shown.
  • Page 71: Figure 28 Syslog & Monitor

    Syslog logging sends a system log to an external syslog server. Enter the server name or IP address of the syslog server. Specify the time interval in seconds (from 1 to 99999) at which the NXC-8160 sends the system logs to the server.
  • Page 72 Chapter 8 Maintenance Screen NXC-8160 User’s Guide...
  • Page 73: Password

    To configure the NXC-8160 through a secure SSH connection, use the admin or operator user name. To configure the NXC-8160 via the console port, you can use any one of the user names. The root user name has the highest priority. The admin user name has the lowest priority.
  • Page 74 (*) for each character you type. Retype to Confirm Type the new password again for confirmation. Apply Click Save to save your changes back to the NXC-8160. Reset Click Reset to begin configuring this screen afresh. NXC-8160 User’s Guide...
  • Page 75: Troubleshooting And Specifications

    Troubleshooting and Specifications Troubleshooting (77) Product Specifications (81)
  • Page 77: Troubleshooting

    2 Make sure you are using the power cord included with the NXC-8160. 3 Make sure the power cord is connected to the NXC-8160 and plugged in to an appropriate power source. Make sure the power source is turned on.
  • Page 78: Nxc-8160 Access And Login

    4 Make sure your computer's Ethernet adapter is installed and functioning properly. 5 Make sure your computer is in the same subnet as the NXC-8160. (If you know that there are routers between your computer and the NXC-8160, skip this step.) •...
  • Page 79: Internet Access

    3 Make sure your computer (with a wireless adapter installed) is within the transmission range of the AP(s) connected to the NXC-8160. 4 Check that both the NXC-8160 and your wireless client are using the same wireless and wireless security settings.
  • Page 80 6 Make sure your computer (with a wireless adapter installed) is within the transmission range of the AP(s) connected to the NXC-8160. 7 Make sure the AP(s) connected to the NXC-8160 is receiving power from the NXC- 8160 and working properly.
  • Page 81: Product Specifications

    H A P T E R Product Specifications The following tables summarize the NXC-8160’s hardware and firmware features. Table 26 Hardware Specifications Dimensions Weight Power Specification Ethernet Interface WLAN Reset Button Console Operation Temperature Storage Temperature Operation Humidity Storage Humidity...
  • Page 82: Figure 30 Console Cable Db-9 End Pin Layout

    (Switch) DESCRIPTION Make a copy of the NXC-8160’s configuration. You can put it back on the NXC-8160 later if you decide to revert back to an earlier configuration. IP multicast is used to send traffic to a specific group of computers. The NXC-8160 supports versions 1 and 2 of IGMP (Internet Group Management Protocol) used to join multicast groups (see RFC 2236).
  • Page 83 Table 29 Ethernet Cable Pin Assignments WAN / LAN ETHERNET CABLE PIN LAYOUT 1 IRD + 2 IRD - 3 OTD + 6 OTD - NXC-8160 User’s Guide Chapter 11 Product Specifications OTD + 1 IRD + OTD - IRD -...
  • Page 84 Chapter 11 Product Specifications NXC-8160 User’s Guide...
  • Page 85: Appendices And Index

    Appendices and Index The appendices provide general information. Some details may not apply to your NXC-8160. Setting up Your Computer’s IP Address (87) IP Addresses and Subnetting (109) Pop-up Windows, JavaScripts and Java Permissions (119) Wireless LANs (127) Legal Information (141)
  • Page 87: Appendix A Setting Up Your Computer's Ip Address

    After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the NXC-8160’s LAN port. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.
  • Page 88: Figure 31 Windows 95/98/Me: Network: Configuration

    2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. NXC-8160 User’s Guide...
  • Page 89: Figure 32 Windows 95/98/Me: Tcp/Ip Properties: Ip Address

    • If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
  • Page 90: Figure 33 Windows 95/98/Me: Tcp/Ip Properties: Dns Configuration

    5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your NXC-8160 and restart your computer when prompted. Verifying Settings 1 Click Start and then Run.
  • Page 91: Figure 34 Windows Xp: Start Menu

    2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 35 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
  • Page 92: Figure 36 Windows Xp: Control Panel: Network Connections: Properties

    • If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced. NXC-8160 User’s Guide...
  • Page 93: Figure 38 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    Automatic metric check box and type a metric in Metric. • Click Add. • Repeat the previous three steps for each default gateway you want to add. • Click OK when finished. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
  • Page 94: Figure 39 Windows Xp: Advanced Tcp/Ip Properties

    • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. NXC-8160 User’s Guide...
  • Page 95: Figure 40 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT). 11 Turn on your NXC-8160 and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab.
  • Page 96: Figure 41 Windows Vista: Start Menu

    2 In the Control Panel, double-click Network and Internet. Figure 42 Windows Vista: Control Panel 3 Click Network and Sharing Center. Figure 43 Windows Vista: Network And Internet 4 Click Manage network connections. Figure 44 Windows Vista: Network and Sharing Center NXC-8160 User’s Guide...
  • Page 97: Figure 45 Windows Vista: Network And Sharing Center

    Figure 45 Windows Vista: Network and Sharing Center 6 Select Internet Protocol Version 4 (TCP/IPv4) and click Properties. Figure 46 Windows Vista: Local Area Connection Properties NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
  • Page 98: Figure 47 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties

    To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric. • Click Add. • Repeat the previous three steps for each default gateway you want to add. • Click OK when finished. NXC-8160 User’s Guide...
  • Page 99: Figure 48 Windows Vista: Advanced Tcp/Ip Properties

    Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
  • Page 100: Figure 49 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties

    11 Click Close to close the Local Area Connection Properties window. 12 Close the Network Connections window. 13 Turn on your NXC-8160 and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
  • Page 101: Figure 50 Macintosh Os 8/9: Apple Menu

    Figure 51 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: • From the Configure box, select Manually. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
  • Page 102: Figure 52 Macintosh Os X: Apple Menu

    • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your NXC-8160 in the Router address box. 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration.
  • Page 103: Figure 53 Macintosh Os X: Network

    • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your NXC-8160 in the Router address box. 5 Click Apply Now and close the window.
  • Page 104: Figure 54 Red Hat 9.0: Kde: Network Configuration: Devices

    Figure 54 Red Hat 9.0: KDE: Network Configuration: Devices 2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. Figure 55 Red Hat 9.0: KDE: Ethernet Device: General NXC-8160 User’s Guide...
  • Page 105: Figure 56 Red Hat 9.0: Kde: Network Configuration: Dns

    • If you have a dynamic IP address, enter following figure shows an example. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address is the name of the Ethernet card). Open the...
  • Page 106: Figure 58 Red Hat 9.0: Dynamic Ip Address Setting In Ifconfig-Eth0

    Bringing up loopback interface: Bringing up interface eth0: in the static file in the directory. The following figure shows an example where /etc in the /etc/rc.d/init.d field. Type BOOTPROTO= NETMASK directory. The following figure [OK] [OK] [OK] [OK] [OK] NXC-8160 User’s Guide...
  • Page 107: Figure 62 Red Hat 9.0: Checking Tcp/Ip Properties

    UP BROADCAST RUNNING MULTICAST RX packets:717 errors:0 dropped:0 overruns:0 frame:0 TX packets:13 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:730412 (713.2 Kb) Interrupt:10 Base address:0x1000 [root@localhost]# NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address HWaddr 00:50:BA:72:5B:44 Bcast:172.23.19.255 Mask:255.255.255.0 MTU:1500 Metric:1...
  • Page 108 Appendix A Setting up Your Computer’s IP Address NXC-8160 User’s Guide...
  • Page 109: Appendix B Ip Addresses And Subnetting

    Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal. The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. NXC-8160 User’s Guide...
  • Page 110: Figure 63 Network Number And Host Id

    For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. 1ST OCTET: OCTET: OCTET: (192) (168) 11000000 10101000 00000001 11111111 11111111 11111111 11000000 10101000 00000001 4TH OCTET 00000010 00000000 00000010 NXC-8160 User’s Guide...
  • Page 111: Table 31 Subnet Masks

    255.255.255.128. The following table shows some possible subnet masks using both notations. Table 33 Alternative Subnet Mask Notation ALTERNATIVE SUBNET MASK NOTATION 255.255.255.0 255.255.255.128 NXC-8160 User’s Guide Appendix B IP Addresses and Subnetting 4TH OCTET OCTET OCTET 00000000 00000000 00000000...
  • Page 112: Figure 64 Subnetting Example: Before Subnetting

    192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting. There are now two sub- networks, A and B. ALTERNATIVE LAST OCTET NOTATION (BINARY) 1100 0000 1110 0000 1111 0000 1111 1000 1111 1100 LAST OCTET (DECIMAL) NXC-8160 User’s Guide...
  • Page 113: Figure 65 Subnetting Example: After Subnetting

    IP Address (Decimal) IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.0 Broadcast Address: 192.168.1.63 NXC-8160 User’s Guide Appendix B IP Addresses and Subnetting - 2 or 62 hosts for each subnet (a host ID of all NETWORK NUMBER 192.168.1. 11000000.10101000.00000001. 11111111.11111111.11111111.
  • Page 114: Table 35 Subnet 2

    NETWORK NUMBER 192.168.1. 11000000.10101000.00000001. 11111111.11111111.11111111. Lowest Host ID: 192.168.1.193 Highest Host ID: 192.168.1.254 LAST FIRST ADDRESS ADDRESS LAST OCTET BIT VALUE 01000000 11000000 LAST OCTET BIT VALUE 10000000 11000000 LAST OCTET BIT VALUE 11000000 11000000 BROADCAST ADDRESS NXC-8160 User’s Guide...
  • Page 115: Table 39 24-Bit Network Number Subnet Planning

    The following table is a summary for subnet planning on a network with a 16-bit network number. Table 40 16-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS NXC-8160 User’s Guide Appendix B IP Addresses and Subnetting LAST FIRST ADDRESS ADDRESS SUBNET MASK NO.
  • Page 116 You must also enable Network Address Translation (NAT) on the NXC- 8160. Once you have decided on the network number, pick an IP address for your NXC-8160 that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.
  • Page 117: Figure 66 Conflicting Computer Ip Addresses Example

    LAN and WAN addresses must be on different subnets. In the following example, the LAN and WAN are on the same subnet. The LAN computers cannot access the Internet because the router cannot route between networks. Figure 67 Conflicting Computer IP Addresses Example NXC-8160 User’s Guide Appendix B IP Addresses and Subnetting...
  • Page 118: Figure 68 Conflicting Computer And Router Ip Addresses Example

    LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 68 Conflicting Computer and Router IP Addresses Example NXC-8160 User’s Guide...
  • Page 119: Appendix C Pop-Up Windows, Javascripts And Java Permissions

    1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 69 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. NXC-8160 User’s Guide...
  • Page 120: Figure 70 Internet Options: Privacy

    Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen. NXC-8160 User’s Guide...
  • Page 121: Figure 71 Internet Options: Privacy

    3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 72 Pop-up Blocker Settings NXC-8160 User’s Guide Appendix C Pop-up Windows, JavaScripts and Java Permissions...
  • Page 122: Figure 73 Internet Options: Security

    3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window. NXC-8160 User’s Guide...
  • Page 123: Figure 74 Security Settings - Java Scripting

    3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window. Figure 75 Security Settings - Java NXC-8160 User’s Guide Appendix C Pop-up Windows, JavaScripts and Java Permissions...
  • Page 124: Figure 76 Java (Sun)

    Figure 76 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. NXC-8160 User’s Guide...
  • Page 125: Figure 77 Mozilla Firefox: Tools > Options

    Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 77 Mozilla Firefox: Tools > Options Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 78 Mozilla Firefox Content Security NXC-8160 User’s Guide...
  • Page 126 Appendix C Pop-up Windows, JavaScripts and Java Permissions NXC-8160 User’s Guide...
  • Page 127: Appendix D Wireless Lans

    A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. NXC-8160 User’s Guide Wireless LANs...
  • Page 128: Figure 80 Basic Service Set

    An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. NXC-8160 User’s Guide...
  • Page 129: Figure 81 Infrastructure Wlan

    (AP) or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. NXC-8160 User’s Guide Appendix D Wireless LANs...
  • Page 130: Fragmentation Threshold

    AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. NXC-8160 User’s Guide...
  • Page 131: Table 41 Ieee 802.11G

    Use the dynamic setting to automatically use short preamble when all wireless devices on the network support it, otherwise the NXC-8160 uses long preamble. The wireless devices MUST use the same preamble mode in order to communicate.
  • Page 132: Table 42 Wireless Security Levels

    Wi-Fi Protected Access (WPA) Most Secure WPA2 You must enable the same wireless security settings on the NXC-8160 and on all wireless clients that you want to associate with it. IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
  • Page 133: Types Of Radius Messages

    EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that supports IEEE 802.1x. . NXC-8160 User’s Guide Appendix D Wireless LANs...
  • Page 134 However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is implemented only by Cisco. LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. NXC-8160 User’s Guide...
  • Page 135: Table 43 Comparison Of Eap Authentication Types

    If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. NXC-8160 User’s Guide EAP-MD5 EAP-TLS EAP-TTLS...
  • Page 136 AP and does not need to go with the authentication process again. Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an AP) to perform IEEE 802.1x authentication with another AP before connecting to it. NXC-8160 User’s Guide...
  • Page 137: Wireless Client Wpa Supplicants

    (PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each wireless client's password and allows it to join the network only if the password matches. NXC-8160 User’s Guide Appendix D Wireless LANs...
  • Page 138: Table 44 Wireless Security Relational Matrix

    None Disable Enable without Dynamic WEP Key Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable TKIP/AES Enable TKIP/AES Disable TKIP/AES Enable TKIP/AES Disable NXC-8160 User’s Guide...
  • Page 139: Antenna Characteristics

    The angle of the beam determines the width of the coverage pattern. Angles typically range from 20 degrees (very directional) to 120 degrees (less directional). Directional antennas are ideal for hallways and outdoor point-to-point applications. NXC-8160 User’s Guide Appendix D Wireless LANs...
  • Page 140 For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. For directional antennas, point the antenna in the direction of the desired coverage area. NXC-8160 User’s Guide...
  • Page 141: Appendix E Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
  • Page 142 This device has been designed for the WLAN 2.4 GHz and 5 GHz networks throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. NXC-8160 User’s Guide...
  • Page 143: Zyxel Limited Warranty

    Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
  • Page 144 Appendix E Legal Information NXC-8160 User’s Guide...
  • Page 145: Appendix F Customer Support

    • Sales E-mail: sales@zyxel.co.cr • Telephone: +506-2017878 • Fax: +506-2015098 • Web: www.zyxel.co.cr • FTP: ftp.zyxel.co.cr • Regular Mail: ZyXEL Costa Rica, Plaza Roble Escazú, Etapa El Patio, Tercer Piso, San José, Costa Rica Czech Republic • E-mail: info@cz.zyxel.com • Telephone: +420-241-091-350 NXC-8160 User’s Guide...
  • Page 146 • E-mail: info@zyxel.fr • Telephone: +33-4-72-52-97-97 • Fax: +33-4-72-52-19-20 • Web: www.zyxel.fr • Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France Germany • Support E-mail: support@zyxel.de • Sales E-mail: sales@zyxel.de • Telephone: +49-2405-6909-69 •...
  • Page 147 • Sales E-mail: sales@zyxel.in • Telephone: +91-11-30888144 to +91-11-30888153 • Fax: +91-11-30888149, +91-11-26810715 • Web: http://www.zyxel.in • Regular Mail: India - ZyXEL Technology India Pvt Ltd., II-Floor, F2/9 Okhla Phase -1, New Delhi 110020, India Japan • Support E-mail: support@zyxel.co.jp •...
  • Page 148 Appendix F Customer Support • Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806- 2001, U.S.A. Norway • Support E-mail: support@zyxel.no • Sales E-mail: sales@zyxel.no • Telephone: +47-22-80-61-80 • Fax: +47-22-80-61-81 • Web: www.zyxel.no • Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway Poland •...
  • Page 149 • Support E-mail: support@zyxel.co.th • Sales E-mail: sales@zyxel.co.th • Telephone: +662-831-5315 • Fax: +662-831-5395 • Web: http://www.zyxel.co.th • Regular Mail: ZyXEL Thailand Co., Ltd., 1/1 Moo 2, Ratchaphruk Road, Bangrak-Noi, Muang, Nonthaburi 11000, Thailand. Ukraine • Support E-mail: support@ua.zyxel.com • Sales E-mail: sales@ua.zyxel.com •...
  • Page 150 Appendix F Customer Support NXC-8160 User’s Guide...
  • Page 151: Index

    48, 129 interference Clustering Management ZyXEL Specifications contact information copyright CTS (Clear to Send) customer support NXC-8160 User’s Guide Index device introduction disclaimer dynamic WEP key exchange EAP Authentication encryption 49, 136 and local (user) database Extended Service Set, See ESS...
  • Page 152 Service Set IDentification. see SSID Service Set IDentity. See SSID. SNMP GetNext manager Trap how SSH works implementation SSID hide static WEPkey subnet subnet mask subnetting syntax conventions target market Temporal Key Integrity Protocol (TKIP) trademarks 129, 130 35, 110 NXC-8160 User’s Guide...
  • Page 153 WPA/WPA2 WPA-PSK/WPA2-PSK WLAN interference security parameters key caching pre-authentication user authentication vs WPA-PSK NXC-8160 User’s Guide wireless client supplicant with RADIUS application example WPA2 user authentication vs WPA2-PSK wireless client supplicant with RADIUS application example WPA2-Pre-Shared Key WPA2-PSK 135, 136...
  • Page 154 Index NXC-8160 User’s Guide...
  • Page 155 Index NXC-8160 User’s Guide...
  • Page 156 Index NXC-8160 User’s Guide...
  • Page 157 Index NXC-8160 User’s Guide...
  • Page 158 Index NXC-8160 User’s Guide...
  • Page 159 Index NXC-8160 User’s Guide...
  • Page 160 Index NXC-8160 User’s Guide...

Table of Contents