About This User's Guide Intended Audience This manual is intended for people who want to configure the NXC-8160 using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away.
Syntax Conventions • The NXC-8160 wireless switch may be referred to as the “NXC-8160”, the “WLAN controller” or the “system” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
Page 5
Icons Used in Figures Figures in this User’s Guide may use the following generic icons. NXC-8160 Server Access Point NXC-8160 User’s Guide Computer Notebook computer Wireless Signal Modem/Router Document Conventions...
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. Safety Warnings NXC-8160 User’s Guide...
Page 7
Only use the included antenna(s). • If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged. This product is recyclable. Dispose of it properly. NXC-8160 User’s Guide Safety Warnings...
1.2.1 Wireless Internet Access ... 23 1.2.2 Backup NXC-8160 ... 24 1.3 Ways to Manage the NXC-8160 ... 25 1.4 Good Habits for Managing the NXC-8160 ... 25 1.5 Front Panel LEDs (Lights) ... 25 Chapter 2 Introducing the Web Configurator ... 27 2.1 Web Configurator Overview ...
Page 12
4.1 Introduction to Centralized Configuration ... 41 4.2 SSH ... 41 4.3 How SSH Works ... 42 4.4 SSH Implementation on the NXC-8160 ... 43 4.4.1 Requirements for Using SSH ... 43 4.5 Centralized Configuration Screen ... 43 Chapter 5 Wireless LAN...
Page 13
Part III: Troubleshooting and Specifications ... 75 Chapter 10 Troubleshooting... 77 10.1 Power, Hardware Connections, and LEDs ... 77 10.2 NXC-8160 Access and Login ... 78 10.3 Internet Access ... 79 Chapter 11 Product Specifications ... 81 Part IV: Appendices and Index ... 85 Appendix A Setting up Your Computer’s IP Address...
Page 14
Table of Contents NXC-8160 User’s Guide...
List of Figures List of Figures Figure 1 Wireless Internet Access ... 24 Figure 2 Backup NXC-8160 ... 24 Figure 3 Front Panel ... 25 Figure 4 Status Screen ... 28 Figure 5 Web Configurator Status Screen ... 29 Figure 6 Web Configurator About Screen ... 31 Figure 7 LAN and WAN ...
Page 16
List of Figures Figure 39 Windows XP: Advanced TCP/IP Properties ... 94 Figure 40 Windows XP: Internet Protocol (TCP/IP) Properties ... 95 Figure 41 Windows Vista: Start Menu ... 96 Figure 42 Windows Vista: Control Panel ... 96 Figure 43 Windows Vista: Network And Internet ... 96 Figure 44 Windows Vista: Network and Sharing Center ...
Page 17
List of Figures Figure 82 RTS/CTS ... 130 Figure 83 WPA(2) with RADIUS Application Example ... 137 Figure 84 WPA(2)-PSK Authentication ... 138 [Document Title]...
AP individually. The AP acts as an antenna of the NXC- 8160. If you have more than one NXC-8160 in your network, you can manage the other NXC- 8160(s) through a NXC-8160. You can also set one NXC-8160 as the main WLAN controller, and the other as the backup when the primary is not active or cannot work properly.
To ensure wireless Internet access availability, deploy one NXC-8160 as the main WLAN controller and the other NXC-8160 as the backup. Both NXC-8160s should be in the same network and have the same number of connected access points and use the same wireless settings (such as SSID, channel, IEEE 802.11 mode and security).
User’s Guide. 1.4 Good Habits for Managing the NXC-8160 Do the following things regularly to make the NXC-8160 more secure and to manage the NXC-8160 more effectively. • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters.
Chapter 1 Getting to Know Your NXC-8160 The following table describes the lights on the NXC-8160. Table 1 Front Panel LEDs (Lights) COLOR POWER Green LINK/ACT Green WLAN 1 ~ 8 LINK Green STATUS DESCRIPTION The NXC-8160 is turned off.
H A P T E R This chapter describes how to access the NXC-8160 web configurator and provides an overview of its screens. 2.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy NXC-8160 setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions.
The main window shows the screen you select in the navigation panel. It is discussed in more detail in the rest of this document. Right after you log in, the Status screen is displayed. 2.3.3 Status Screen This screen displays general status information about the NXC-8160. NXC-8160 User’s Guide...
Up Time This field displays how long the NXC-8160 has been running since it last started up. The NXC-8160 starts up when you turn it on, when you restart it or reset to the defaults (using the Maintenance screen). IP Address This shows the LAN port’s IP address.
Use this screen to configure the wireless LAN settings and WLAN security settings for an SSID. Use this screen to set up an alternative NXC-8160 as a backup in case the primary NXC-8160 fails. You can also use this screen to send SNMP traps to an SNMP manager.
This field displays the date and time when firmware kernel was built. Redboot This field displays the Redboot version number and the date created. RedBoot is an embedded system bootstrap and debug firmware from RedHat. NXC-8160 User’s Guide Chapter 2 Introducing the Web Configurator...
Page 32
Chapter 2 Introducing the Web Configurator NXC-8160 User’s Guide...
The Local Area Network (LAN) includes the computers and networking devices (such as the NXC-8160) in your home or office that you connect to a modem or router’s LAN ports. The Wide Area Network (WAN) is another network (most likely the Internet) that you connect to a modem or router.
RFC 1466, Guidelines for Management of IP Address Space. 3.2.2 Management IP Addresses The NXC-8160 needs an IP address for it to be managed over the network. The factory default IP address is 192.168.1.10. The subnet mask specifies the network number portion of an IP address.
In this example, there is an NXC-8160 and a VLAN-aware switch A in your network. The NXC-8160 is connected to port 4 on switch A. Port 5 on switch A is the uplink port and connected to the Internet. You configure the following VLAN settings on switch A and the NXC-8160.
VLAN 301 Port 3, 4, 5 This way, the device connected to port 1 on switch A can configure the NXC-8160. Wireless clients connected to SSID x or y cannot manage the NXC-8160 itself, but they can communicate with port 2 or 3 on switch A and access the Internet. Wireless clients connected to SSID x cannot talk to wireless clients connected to SSID y.
NXC-8160. Note: All centralized configuration members and the master NXC- 2nd IP Address Enter a second IP address as the NXC-8160’s backup IP address. It should be in a different subnet from the primary one. 2nd IP Subnet Enter the subnet mask that specifies the network number portion of the second IP Mask address.
Page 40
Chapter 3 LAN Screen NXC-8160 User’s Guide...
In the following example, controller A is the master and the other controllers are members. Figure 10 Centralized Configuration Example 4.2 SSH You can use SSH (Secure SHell) to securely access the NXC-8160. NXC-8160 User’s Guide Must be compatible with ZyXEL centralized configuration implementation.
A on the Internet uses SSH to securely connect to the NXC-8160 for a management session. If the NXC-8160 is behind a NAT router or a firewall, you need to configure the router or firewall to allow a SSH connection to the NXC-8160.
NXC-8160 as a master or member controller. The screen changes depending on whether you select the Master Controller check box. By default, the Master Controller check box is not selected and the NXC-8160 acts as a member controller. Figure 13 Centralized Configuration (Member) NXC-8160 User’s Guide...
DESCRIPTION SSH Key Management Master Controller When you have more than one NXC-8160 in the network, select this to have your NXC-8160 act as the master controller. You can manage the member controllers in the same network through the master controller.
Page 45
Generate New Click the Save button next to Generate New SSH Keys to have the NXC-8160 SSH Keys create a SSH key which is to be used to identify the NXC-8160 for SSH connections. Retrieve Public Click the Save button next to Retrieve Public SSH Key to download and save a SSH Key public key on your computer, so that you can upload the key to a member.
H A P T E R This chapter discusses how to configure wireless LAN on the NXC-8160. 5.1 Wireless LAN Introduction A wireless LAN can be as simple as two computers with wireless LAN adapters communicating in a peer-to-peer network or as complex as a number of computers with wireless LAN adapters communicating through access points which bridge network traffic to the wired LAN.
In this wireless network, devices A and B are called wireless clients. The wireless clients use the access point (AP) which is connected to a WLAN controller to interact with other devices (such as the printer) or with the Internet. Your NXC-8160 is the WLAN controller. Every wireless network must follow these basic guidelines.
It is not possible to use WPA-PSK, WPA or stronger encryption with a local user database. In this case, it is better to set up stronger encryption with no authentication than to set up weaker encryption with the local user database. NXC-8160 User’s Guide for information about this.) RADIUS SERVER WEP + 802.1x (LEAP)
Determines the identity of the users. • Accounting Keeps track of the client’s network activity. RADIUS user is a simple package exchange in which your NXC-8160 acts as a message relay between the wireless station and the network RADIUS server. 5.4 Configuring WLAN Click WLAN to open the WLAN Configuration screen.
Chapter 5 Wireless LAN Figure 16 WLAN NXC-8160 User’s Guide...
Page 52
The options vary depending on the 802.11 mode you selected and the country you are in. Note: The same channel cannot be assigned to both radios. Maximum Enter a number (from one to 15) to specify how many times the NXC-8160 tries to Retries send a packet when the transmission fails. Enable Rate...
Click the Rename SSIDs link to open a screen where you can change the SSID(s) created on the NXC-8160. See All SSIDs This text box shows all SSIDs available on the NXC-8160. Select an SSID and click Delete Permanently to remove it from the NXC-8160. Edit SSID &...
WEP128 & 802.1x (LEAP) WPA-PSK DESCRIPTION This displays the SSIDs available on the NXC-8160. Enter a new descriptive name (up to 32 printable English keyboard characters) to replace an existing one. Click Save to save your customized settings. Click Cancel to exit this screen without saving.
If you select Enable, wireless clients in the same BSS can access the wired network and communicate with each other. If you select Disable, wireless clients in the same BSS can still access the wired network but cannot communicate with each other. NXC-8160 User’s Guide Chapter 5 Wireless LAN...
VLAN group. Otherwise, leave this field at its default (none). Disassociation Enter the number of seconds (from 0 to 3600) for the NXC-8160 to wait before it Timeout automatically disconnect a wireless client from the wired network when there is no traffic sent to or from the wireless client.
Static WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the wireless clients must use the same WEP key to encrypt and decrypt data. Your NXC-8160 allows you to configure up to four 64-bit or 128-bit WEP keys, but only one key can be used at any one time.
WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized wireless stations from accessing data transmitted over the wireless network. Transmission The WEP keys are used to encrypt data. Both the NXC-8160 and the wireless clients Keys must use the same WEP key for data transmission.
Select WEP64 & 802.1x (LEAP) or WEP128 & 802.1x (LEAP) from the drop-down list. WEP Keys WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized wireless stations from accessing data transmitted over the wireless network. NXC-8160 User’s Guide Chapter 5 Wireless LAN...
The WEP keys are used to secure your data from eavesdropping by unauthorized Keys wireless users. Both the NXC-8160 and the wireless clients must use the same WEP key for data transmission. You can configure up to four keys, but only one key can be activated at any one time.
WPA equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a periodic basis. Enter a time interval between 0 and 3600 seconds. 5.5.5 WPA Select WPA from the Security Mode list. NXC-8160 User’s Guide Chapter 5 Wireless LAN...
WEP key for an AP and all stations in a WLAN on a periodic basis. Enter a time interval between 0 and 3600 seconds. RADIUS The NXC-8160 can use an external RADIUS server to authenticate an unlimited number of users. RADIUS Server...
An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the NXC-8160). An agent translates the local management information from the managed device into a form compatible with SNMP.
• Set - Allows the manager to set values for object variables within an agent. • Trap - Used by the agent to inform the manager of some events. 6.1.1 SNMP Traps The NXC-8160 can send the following traps to the SNMP manager. Table 20 SNMP Traps TRAP NAME Configured and connected APs of channel [<channel number>]...
Monitored IP Enter the IP address of the other WLAN controller. Reference IP Eenter the IP address of a reliable nearby computer to have the NXC-8160 ping that address and test the connection to the LAN. Keep Alive The NXC-8160 tests the connection by periodically sending a ping to the address in Interval (ms) the Reference IP field.
Page 66
Destination Type the IP address of the station to send your SNMP traps to. Save Click Save to save your customized settings in this section. Reset Click Reset to begin configuring this section of the screen afresh. NXC-8160 User’s Guide...
Click Access Points to display the screen as shown. This screen allows you to view the status of the access points (APs) connected to the NXC-8160. You can also use this screen to set the NXC-8160 not to supply power to an AP.
The maintenance screens can help you view the configuration, upload new firmware, manage configuration, configure the NXC-8160’s time and restart your NXC-8160. Only upload firmware for your specific model! Do not turn off the NXC-8160 while firmware upload is in progress! Figure 27 Maintenance NXC-8160 User’s Guide...
NXC-8160 to its factory defaults. 8.2 Configuring Syslog & Monitor Use this screen to configure to where the NXC-8160 is to send logs and how often a log will be sent. Click Maintenance > Syslog & Monitor. The screen appears as shown.
Syslog logging sends a system log to an external syslog server. Enter the server name or IP address of the syslog server. Specify the time interval in seconds (from 1 to 99999) at which the NXC-8160 sends the system logs to the server.
To configure the NXC-8160 through a secure SSH connection, use the admin or operator user name. To configure the NXC-8160 via the console port, you can use any one of the user names. The root user name has the highest priority. The admin user name has the lowest priority.
Page 74
(*) for each character you type. Retype to Confirm Type the new password again for confirmation. Apply Click Save to save your changes back to the NXC-8160. Reset Click Reset to begin configuring this screen afresh. NXC-8160 User’s Guide...
2 Make sure you are using the power cord included with the NXC-8160. 3 Make sure the power cord is connected to the NXC-8160 and plugged in to an appropriate power source. Make sure the power source is turned on.
4 Make sure your computer's Ethernet adapter is installed and functioning properly. 5 Make sure your computer is in the same subnet as the NXC-8160. (If you know that there are routers between your computer and the NXC-8160, skip this step.) •...
3 Make sure your computer (with a wireless adapter installed) is within the transmission range of the AP(s) connected to the NXC-8160. 4 Check that both the NXC-8160 and your wireless client are using the same wireless and wireless security settings.
Page 80
6 Make sure your computer (with a wireless adapter installed) is within the transmission range of the AP(s) connected to the NXC-8160. 7 Make sure the AP(s) connected to the NXC-8160 is receiving power from the NXC- 8160 and working properly.
H A P T E R Product Specifications The following tables summarize the NXC-8160’s hardware and firmware features. Table 26 Hardware Specifications Dimensions Weight Power Specification Ethernet Interface WLAN Reset Button Console Operation Temperature Storage Temperature Operation Humidity Storage Humidity...
(Switch) DESCRIPTION Make a copy of the NXC-8160’s configuration. You can put it back on the NXC-8160 later if you decide to revert back to an earlier configuration. IP multicast is used to send traffic to a specific group of computers. The NXC-8160 supports versions 1 and 2 of IGMP (Internet Group Management Protocol) used to join multicast groups (see RFC 2236).
Appendices and Index The appendices provide general information. Some details may not apply to your NXC-8160. Setting up Your Computer’s IP Address (87) IP Addresses and Subnetting (109) Pop-up Windows, JavaScripts and Java Permissions (119) Wireless LANs (127) Legal Information (141)
After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the NXC-8160’s LAN port. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.
2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. NXC-8160 User’s Guide...
• If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your NXC-8160 and restart your computer when prompted. Verifying Settings 1 Click Start and then Run.
2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 35 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
• If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced. NXC-8160 User’s Guide...
Automatic metric check box and type a metric in Metric. • Click Add. • Repeat the previous three steps for each default gateway you want to add. • Click OK when finished. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
• If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. NXC-8160 User’s Guide...
Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT). 11 Turn on your NXC-8160 and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab.
2 In the Control Panel, double-click Network and Internet. Figure 42 Windows Vista: Control Panel 3 Click Network and Sharing Center. Figure 43 Windows Vista: Network And Internet 4 Click Manage network connections. Figure 44 Windows Vista: Network and Sharing Center NXC-8160 User’s Guide...
Figure 45 Windows Vista: Network and Sharing Center 6 Select Internet Protocol Version 4 (TCP/IPv4) and click Properties. Figure 46 Windows Vista: Local Area Connection Properties NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric. • Click Add. • Repeat the previous three steps for each default gateway you want to add. • Click OK when finished. NXC-8160 User’s Guide...
Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
11 Click Close to close the Local Area Connection Properties window. 12 Close the Network Connections window. 13 Turn on your NXC-8160 and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
Figure 51 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: • From the Configure box, select Manually. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address...
• Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your NXC-8160 in the Router address box. 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration.
• Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your NXC-8160 in the Router address box. 5 Click Apply Now and close the window.
Figure 54 Red Hat 9.0: KDE: Network Configuration: Devices 2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. Figure 55 Red Hat 9.0: KDE: Ethernet Device: General NXC-8160 User’s Guide...
• If you have a dynamic IP address, enter following figure shows an example. NXC-8160 User’s Guide Appendix A Setting up Your Computer’s IP Address is the name of the Ethernet card). Open the...
Bringing up loopback interface: Bringing up interface eth0: in the static file in the directory. The following figure shows an example where /etc in the /etc/rc.d/init.d field. Type BOOTPROTO= NETMASK directory. The following figure [OK] [OK] [OK] [OK] [OK] NXC-8160 User’s Guide...
Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal. The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. NXC-8160 User’s Guide...
For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. 1ST OCTET: OCTET: OCTET: (192) (168) 11000000 10101000 00000001 11111111 11111111 11111111 11000000 10101000 00000001 4TH OCTET 00000010 00000000 00000010 NXC-8160 User’s Guide...
255.255.255.128. The following table shows some possible subnet masks using both notations. Table 33 Alternative Subnet Mask Notation ALTERNATIVE SUBNET MASK NOTATION 255.255.255.0 255.255.255.128 NXC-8160 User’s Guide Appendix B IP Addresses and Subnetting 4TH OCTET OCTET OCTET 00000000 00000000 00000000...
192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting. There are now two sub- networks, A and B. ALTERNATIVE LAST OCTET NOTATION (BINARY) 1100 0000 1110 0000 1111 0000 1111 1000 1111 1100 LAST OCTET (DECIMAL) NXC-8160 User’s Guide...
IP Address (Decimal) IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.0 Broadcast Address: 192.168.1.63 NXC-8160 User’s Guide Appendix B IP Addresses and Subnetting - 2 or 62 hosts for each subnet (a host ID of all NETWORK NUMBER 192.168.1. 11000000.10101000.00000001. 11111111.11111111.11111111.
NETWORK NUMBER 192.168.1. 11000000.10101000.00000001. 11111111.11111111.11111111. Lowest Host ID: 192.168.1.193 Highest Host ID: 192.168.1.254 LAST FIRST ADDRESS ADDRESS LAST OCTET BIT VALUE 01000000 11000000 LAST OCTET BIT VALUE 10000000 11000000 LAST OCTET BIT VALUE 11000000 11000000 BROADCAST ADDRESS NXC-8160 User’s Guide...
The following table is a summary for subnet planning on a network with a 16-bit network number. Table 40 16-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS NXC-8160 User’s Guide Appendix B IP Addresses and Subnetting LAST FIRST ADDRESS ADDRESS SUBNET MASK NO.
Page 116
You must also enable Network Address Translation (NAT) on the NXC- 8160. Once you have decided on the network number, pick an IP address for your NXC-8160 that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.
LAN and WAN addresses must be on different subnets. In the following example, the LAN and WAN are on the same subnet. The LAN computers cannot access the Internet because the router cannot route between networks. Figure 67 Conflicting Computer IP Addresses Example NXC-8160 User’s Guide Appendix B IP Addresses and Subnetting...
LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 68 Conflicting Computer and Router IP Addresses Example NXC-8160 User’s Guide...
1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 69 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. NXC-8160 User’s Guide...
Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen. NXC-8160 User’s Guide...
3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 72 Pop-up Blocker Settings NXC-8160 User’s Guide Appendix C Pop-up Windows, JavaScripts and Java Permissions...
3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window. NXC-8160 User’s Guide...
3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window. Figure 75 Security Settings - Java NXC-8160 User’s Guide Appendix C Pop-up Windows, JavaScripts and Java Permissions...
Figure 76 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. NXC-8160 User’s Guide...
Appendix C Pop-up Windows, JavaScripts and Java Permissions Figure 77 Mozilla Firefox: Tools > Options Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 78 Mozilla Firefox Content Security NXC-8160 User’s Guide...
Page 126
Appendix C Pop-up Windows, JavaScripts and Java Permissions NXC-8160 User’s Guide...
A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. NXC-8160 User’s Guide Wireless LANs...
An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. NXC-8160 User’s Guide...
(AP) or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. NXC-8160 User’s Guide Appendix D Wireless LANs...
AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. NXC-8160 User’s Guide...
Use the dynamic setting to automatically use short preamble when all wireless devices on the network support it, otherwise the NXC-8160 uses long preamble. The wireless devices MUST use the same preamble mode in order to communicate.
Wi-Fi Protected Access (WPA) Most Secure WPA2 You must enable the same wireless security settings on the NXC-8160 and on all wireless clients that you want to associate with it. IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that supports IEEE 802.1x. . NXC-8160 User’s Guide Appendix D Wireless LANs...
Page 134
However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is implemented only by Cisco. LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. NXC-8160 User’s Guide...
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. NXC-8160 User’s Guide EAP-MD5 EAP-TLS EAP-TTLS...
Page 136
AP and does not need to go with the authentication process again. Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an AP) to perform IEEE 802.1x authentication with another AP before connecting to it. NXC-8160 User’s Guide...
(PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each wireless client's password and allows it to join the network only if the password matches. NXC-8160 User’s Guide Appendix D Wireless LANs...
The angle of the beam determines the width of the coverage pattern. Angles typically range from 20 degrees (very directional) to 120 degrees (less directional). Directional antennas are ideal for hallways and outdoor point-to-point applications. NXC-8160 User’s Guide Appendix D Wireless LANs...
Page 140
For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. For directional antennas, point the antenna in the direction of the desired coverage area. NXC-8160 User’s Guide...
Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
Page 142
This device has been designed for the WLAN 2.4 GHz and 5 GHz networks throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. NXC-8160 User’s Guide...
Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Page 144
Appendix E Legal Information NXC-8160 User’s Guide...