ZyXEL Communications NWA-3500 User Manual page 298

802.11a/g dual radio wireless business ap 802.11a/g dual radio outdoor wlan business ap
Hide thumbs Also See for NWA-3500:
Table of Contents

Advertisement

Chapter 25 Product Specifications
Antenna
Specifications
Output Power
Operating
Environment
Storage Environment
Distance between the
centers of wall-
mounting holes on
the device's back.
Screw size for wall-
mounting
Table 90 Firmware Specifications
Default IP Address
Default Subnet Mask
Default Password
Wireless LAN Standards
Wireless security
Layer 2 isolation
Multiple BSSID
(MBSSID)
Rogue AP detection
Internal RADIUS server
VLAN
STP (Spanning Tree
Protocol) / RSTP (Rapid
STP)
WMM QoS
Certificates
298
SMA antenna connectors, equipped by default with 2dBi omni
antenna, 60°
When facing the front of the NWA, the antenna on the right is
used by wireless LAN adaptor WLAN1, and the antenna on the left
is used by wireless LAN adaptor WLAN2.
IEEE 802.11b/g: 17 dBm
IEEE 802.11a: 14 dBm
Temperature: 0º C ~ 5º C
Humidity: 20% ~ 95% RH
Temperature: -40º C ~ 60º C
Humidity: 5% ~ 95% RH
80 mm
6mm ~ 8mm (0.24" ~ 0.31") head width.
192.168.1.2
255.255.255.0 (24 bits)
1234
IEEE 802.11a, IEEE 802.11b, IEEE 802.11g
WEP, WPA(2), WPA(2)-PSK, IEEE 802.1x
Prevents wireless clients associated with your NWA from
communicating with other wireless clients, APs, computers or
routers in a network.
MBSSID mode allows the NWA to operate up to 8 different
wireless networks (BSSs) simultaneously, each with
independently-configurable wireless and security settings.
Rogue AP detection detects and logs unknown access points
(APs) operating in the area.
PEAP, 32-entry Trusted AP list, 128-entry Trusted Users list.
802.1Q VLAN tagging.
(R)STP detects and breaks network loops and provides backup
links between switches, bridges or routers. It allows a bridge to
interact with other (R)STP-compliant bridges in your network to
ensure that only one path exists between any two stations on
the network.
WMM (Wi-Fi MultiMedia) QoS (Quality of Service) allows you to
prioritize wireless traffic.
The NWA can use certificates (also called digital IDs) to
authenticate users. Certificates are based on public-private key
pairs. Certificates provide a way to exchange public keys for
use in authentication.
NWA-3500/NWA-3550 User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nwa-3550

Table of Contents