About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NXC-8160 using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology.
Syntax Conventions • The NXC-8160 wireless switch may be referred to as the “NXC-8160”, the “WLAN controller” or the “system” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
Page 5
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. NXC-8160 Computer Notebook computer Server Wireless Signal Modem/Router Access Point NXC-8160 User’s Guide...
For detailed information about recycling of this product, please contact your local city office, your household waste disposal service or the store where you purchased the product. • Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. NXC-8160 User’s Guide...
Page 7
Only use the included antenna(s). • If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged. This product is recyclable. Dispose of it properly. NXC-8160 User’s Guide...
Contents Overview Contents Overview Introduction ..........................21 Getting to Know Your NXC-8160 ....................23 Introducing the Web Configurator ....................27 LAN and WAN Settings ......................33 LAN Settings ..........................35 WLAN Settings .......................... 41 Access Points and System Tools ..................63 Access Points ..........................
1.2.2 Captive Portal Security ....................24 1.2.3 Backup NXC-8160 ..................... 25 1.3 Ways to Manage the NXC-8160 ..................25 1.4 Good Habits for Managing the NXC-8160 ................26 1.5 Front Panel LEDs (Lights) ....................26 Chapter 2 Introducing the Web Configurator ..................27 2.1 Overview ..........................
Page 12
5.1 Overview ..........................65 5.1.1 What You Can Do in This Chapter ................65 5.1.2 What You Need to Know .................... 65 5.2 The Access Points Screen ....................65 Chapter 6 System Tools........................... 67 6.1 Overview ..........................67 NXC-8160 User’s Guide...
Page 13
8.1.1 What You Can Do in This Chapter ................95 8.2 The Events Log Screen ....................... 95 8.2.1 The Events Log History Screen ................. 98 8.3 The Reports Screen ......................99 Part V: Troubleshooting and Specifications........101 Chapter 9 Troubleshooting........................103 NXC-8160 User’s Guide...
Page 14
Table of Contents 9.1 Power, Hardware Connections, and LEDs ................ 103 9.2 NXC-8160 Access and Login .................... 104 9.3 Internet Access ........................106 Chapter 10 Product Specifications ......................107 Part VI: Appendices and Index ............111 Appendix A Setting Up Your Computer’s IP Address ............113 Appendix B Importing Certificates ..................
Page 17
List of Figures Figure 82 openSUSE 10.3: K Menu > Computer Menu ............... 131 Figure 83 openSUSE 10.3: K Menu > Computer Menu ............... 131 Figure 84 openSUSE 10.3: YaST Control Center ................132 Figure 85 openSUSE 10.3: Network Settings ..................132 Figure 86 openSUSE 10.3: Network Card Setup .................
Page 18
List of Figures Figure 125 Opera 9: Install authority certificate ................... 154 Figure 126 Opera 9: Install authority certificate ................... 154 Figure 127 Opera 9: Tools Menu ......................155 Figure 128 Opera 9: Preferences ......................155 Figure 129 Opera 9: Certificate manager .................... 156 Figure 130 Konqueror 3.5: Server Authentication ................
List of Tables List of Tables Table 1 Front Panel LEDs (Lights) ......................26 Table 2 Title Bar: Web Configurator Icon ....................28 Table 3 Web Configurator Status Screen ....................29 Table 4 Navigation Panel Summary ...................... 30 Table 5 Web Configurator About Screen ....................31 Table 6 LAN ............................
APs. You can maintain the APs through the NXC-8160, eliminating the need to connect to and configure each AP individually. The AP acts as an antenna of the NXC-8160. If you have more than one NXC-8160 in your network, you can manage the other NXC- 8160(s) through one of them.
Figure 1 Wireless Internet Access 1.2.2 Captive Portal Security As an added security measure, the NXC-8160 contains captive portal functionality. This means all web page requests are initially redirected to a special web page that requires you to authenticate your session. Once authentication is successful, you can then connect to the rest of the network or Internet.
To ensure wireless Internet access availability, deploy one NXC-8160 as the main WLAN controller and the other NXC-8160 as the backup. Both NXC-8160s should be in the same network and have the same number of connected access points and use the same wireless settings (such as SSID, channel, IEEE 802.11 mode and security).
Chapter 1 Getting to Know Your NXC-8160 1.4 Good Habits for Managing the NXC-8160 Do the following things regularly to make the NXC-8160 more secure and to manage the NXC-8160 more effectively. • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters.
5 Click OK to view the first web configurator screen. 2.3 Saving Changes One thing to keep in mind while working with the NXC-8160 is that before any changes to your device configuration can be implemented you must first go to the System Tools > Apply screen and click the Apply button.
Chapter 2 Introducing the Web Configurator 2.4 Navigating the NXC-8160 Web Configurator The following summarizes how to navigate the web configurator from the Status screen. Figure 5 Status Screen As illustrated above, the main screen is divided into these parts: •...
Up Time This field displays how long the NXC-8160 has been running since it last started up. The NXC-8160 starts up when you turn it on, when you restart it or reset to the defaults (using the Maintenance screen). Firmware Version This field displays the current firmware version of the NXC-8160.
Use these screens for configuring advanced features such as redundancy, syslog and monitor, SNMP, IDS, portals, and so on. Events & Use these screens to view and manage NXC-8160 event logs as well as to view Reports statistic reports. NXC-8160 User’s Guide...
This field displays the date and time when RootFs was built. Kernel This field displays the date and time when firmware kernel was built. Redboot This field displays the Redboot version number and the date created. RedBoot is an embedded system bootstrap and debug firmware from RedHat. NXC-8160 User’s Guide...
Page 32
Chapter 2 Introducing the Web Configurator NXC-8160 User’s Guide...
LAN and WAN Settings The LAN Screen (36) The Wireless Subnets Screen (39) The ESSID Settings Screen (43) The MAC ACL Screen (55) The RADIUS Screen (56) The WMM Screen (57) The Radios Screen (59) The Assignments Screen (61)
Local Area Network (LAN) includes the computers and networking devices (such as the NXC-8160) in your home or office that you connect to a modem or router’s LAN ports. The Wide Area Network (WAN) is another network (most likely the Internet) that you connect to a modem or router.
3.1.3 Before You Begin Ensure that your network is properly configured to see the NXC-8160 when it is plugged into it, or change the device’s IP address and subnet mask to work with your local settings. The factory default IP address is 192.168.1.10.
Enter the management VLAN tag ID for VLAN access that you intend to use to manage the NXC-8160 if it is part of a VLAN. If you are using alternate an LAN IP address and network mask, enter an alternate VLAN tag ID as well.
In this example, there is an NXC-8160 and a VLAN-aware switch A in your network. The NXC-8160 is connected to port 4 on switch A. Port 5 on switch A is the uplink port and connected to the Internet. You configure the following VLAN settings on switch A and the NXC-8160.
Cancel Click Reset to begin configuring this screen afresh. 3.4 Technical Reference The following section contains additional technical information about the NXC-8160 features described in this chapter. IP Address and Subnet Mask Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number.
Page 40
The subnet mask specifies the network number portion of an IP address. Your NXC-8160 will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the NXC-8160 unless you are instructed to do otherwise.
• The Radios screen lets you configure the NXC-8160’s built-in wireless radio transmitters (Section 4.6 on page 59). • The Assignments screen lets you assign the NXC-8160’s ESSIDs to one of its two built-in radios (Section 4.7 on page 61).
Page 42
A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through a single access point (AP). NXC-8160 User’s Guide...
ESSID and authentication security, among other things. The ESSID is the name of a network managed by the NXC-8160. When a computer wants to connect wirelessly to the network, it must use one of the ESSIDs transmitted by the NXC- 8160 in order to make the initial connection.
Figure 13 Multiple ESSIDs Example In this example, both AP 1 and AP 2 are broadcasting on 2 radio channels. Within each channel, each AP can create up to 16 ESSIDs. Figure 14 WLAN > ESSID Definition > ESSID Settings NXC-8160 User’s Guide...
You can also Rename an existing ESSID, or Delete it. Simply select it in the list and then click the appropriate button. Allow Default Select this option if you want to allow a wireless device to connect to the NXC-8160 ESSID WLAN without requesting a specific ESSID (i.e., “default” or “any” ESSID). If this option is disabled, then a wireless device must connect to a specific ESSID.
Page 46
VLAN group. Otherwise, leave this field at its default (none). Disassociation Enter the duration (in seconds) that a connected computer can remain inactive Timeout (1- (meaning no data is sent to or from said computer) before the NXC-8160 3600) automatically disconnects it from the network. DTIM A DTIM (Delivery Traffic Indication Message) is used to tell the wireless clients in power-saving mode that a packet is about to be sent to them.Select a DTIM period...
• In a RADIUS server: this is a server used in businesses more than in homes. If your AP or WLAN controller (in this case it is the NXC-8160) does not provide a local user database and if you do not have a RADIUS server, you cannot set up user names and passwords for your users.
• A computer equipped with a web browser (with JavaScript enabled) and/or Telnet. • A wireless station must be running IEEE 802.1x-compliant software. Currently, this is offered in Windows XP. • An optional network RADIUS server for remote user authentication and accounting. NXC-8160 User’s Guide...
Both the wireless devices and the NXC-8160 must use the same WEP key for data encryption and decryption. Your NXC-8160 allows you to configure up to four 64-bit or 128-bit WEP keys, but only one key can be used at any one time.
Transmission The WEP keys are used to encrypt data. Both the NXC-8160 and the wireless clients must use the same WEP key for data transmission. You can configure up to four keys, but only one key can be activated at any one time.
The WEP keys are used to secure your data from eavesdropping by unauthorized Keys wireless users. Both the NXC-8160 and the wireless clients must use the same WEP key for data transmission. You can configure up to four keys, but only one key can be activated at any one time.
WPA. The key differences between WPA(2) and WEP are improved data encryption and user authentication. If both the NXC-8160 and the wireless clients connected to it support WPA2, using WPA- Personal only requires a single (identical) password entered into each access point, wireless gateway and wireless client.
WPA-PSK Enter the simple, common pass phrase that wireless clients will use to connect securely to the NXC-8160 network. Select ASCII or HEX as the Input Format and enter the key in the field provided. Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and symbols) or type a pre-shared key consisting of exactly 64 hexadecimal characters ("0-9", "A-F").
RADIUS servers are checked in order from 1 to 4 (for example, if server 1 is not found or authentication fails then the NXC-8160 tries server 2, and so on). Select a RADIUS server from the list. You can configure a list of RADIUS servers on the WLAN >...
ESSID. Every computer’s network adapter possesses a Media Access Control (MAC) address, an ostensibly unique 48-bit hexadecimal identification tag which the NXC-8160 can use to either grant or deny permission to the computer when it tries to connect to an ACL-configured ESSID.
Click WLAN > ESSID Definition > RADIUS to open this screen. This is where you can configure the RADIUS servers list that the NXC-8160 can use for secure authentication. RADIUS is a common authentication protocol utilized under the 802.1x security standard (often used in wireless networks).
Server Port Enter the RADIUS server’s port number. Server Timeout Enter the duration that the NXC-8160 waits for a response before it times out of the RADIUS server. Remove Select this option to remove a RADIUS server from the list.
WMM parameter. This is the maximum number of milliseconds that the NXC-8160 waits for an incoming data packet before sending a retry signal. The NXC-8160 continues to send a retry signal until the maximum number of retries allowed is reached.
Cancel Click Reset to begin configuring this screen afresh. 4.6 The Radios Screen Click WLAN > Radios to open this screen. This is where you can configure the NXC-8160’s built-in wireless radio transmitters. Figure 24 WLAN > Radios NXC-8160 User’s Guide...
Note: This option is only available when the given radio’s WLAN Mode is set to 802.11b or 802.11 Mixed b/g. Enable Rate Select this option to enable data rate adaptation. This allows the NXC-8160 to Adaptation dynamically adjust data throughput rates based on the condition of the network and the Quality of Service (QoS) settings of the data in question.
LABEL DESCRIPTION ESSID This is a list of all currently mapped ESSIDs in the NXC-8160. They belong to the APs that are connected to it. Radio 1 This is a list of checkboxes that you can use to assign an ESSID to Radio 1.
In this wireless network, devices A and B are called wireless clients. The wireless clients use the access point (AP) which is connected to a WLAN controller to interact with other devices (such as the printer) or with the Internet. Your NXC-8160 is the WLAN controller. Every wireless network must follow these basic guidelines.
Access Points and System Tools The Access Points Screen (65) The Apply Screen (68) The Reboot Screen (68) The Maintenance Screen (69) The Time & Date Screen (70) The Passwords Screen (71) The Upgrade Screen (72)
Click Access Points to open this screen. This is where you can view the status of the access points (APs) connected to the NXC-8160. You can also use this screen to set the NXC-8160 not to supply power to an AP.
DESCRIPTION Click to toggle Click inside the image of one of the RJ-45 ports on the NXC-8160 to turn its PoE power supply On or Off. As soon as you make your selection, click the Apply to put the changes into effect.
(Section 6.4 on page 69). • The Time & Date screen lets you configure the NXC-8160’s time and date settings (Section 6.5 on page 70). • The Passwords screen lets you change the NXC-8160’s management passwords (Section 6.6 on page...
Click Apply to store your changes. 6.3 The Reboot Screen Click System Tools > Reboot to open this screen. This is where you can force the NXC-8160 to reboot itself without having to manually unplug it and then plug it again.
Chapter 6 System Tools Do not reboot the NXC-8160 while a firmware upload is in progress. You could damage the device! 6.4 The Maintenance Screen Click System Tools > Maintenance to open this screen. This is where you can save your NXC-8160’s configuration settings, restore a previously saved configuration file, or reset the...
8160 is located from this list. NTP Server Select this option if you want the NXC-8160 to use an NTP server from which to retrieve the time and date. Once selected, choose an NTP server from the Main list. You can also choose a second server from the Backup list; in the event that the NXC-8160 cannot connect with the Main server it will try to retrieve the time and date from the Backup server.
If using the Internet Time option, click Save to store your time and date configuration information. Update Now If using the Internet Time option, click Update Now to force the NXC-8160 to connect with the currently configured NTP server to retrieve the time and date. Apply Click Apply to store your changes.
Once this is done, click the Upgrade button to begin the upgrade process. Note: Firmware for the NXC-8160 ends in the *.gz extension. Browse... Click the Browse button to locate the binary image file for your device.
Advanced Settings, Events and Reports Network Redundancy (76) The Syslog & Monitor Screen (79) The SNMP Screen (80) The Centralized Configuration Screen (82) The IDS Screen (85) The Portal Screen (86) The Others Screen (92) The Events Log Screen (95) The Reports Screen (99)
• The Redundancy screen lets you set up a back NXC-8160 device in order to maintain network integrity (Section 7.2 on page 76). • The Syslog & Monitor screen lets you configure the NXC-8160 to send log files as well as how often they are sent (Section 7.3 on page 79).
The NXC-8160 allows you to set up a standby NXC-8160 as a means to maintain your network intergrity in such a manner. If the main device encounters problems then the other one can take over, leaving your connections intact.
Chapter 7 Advanced Settings However, if the main NXC-8160 (P) encounters a problem (such as an unexpected crash or a loss of power) but the reference server (R) still remains in constant contact with the backup NXC-8160 (B), then the backup takes over for the main. When this happens, users connected to the wireless network may experience a momentary disconnect as the backup APs take over.
Chapter 7 Advanced Settings 7.2.1 Configuring the Redunancy Screen Click Advanced to open this screen. This is where you can set the NXC-8160 up as either a main or standby device as well as assign it a reference IP to ping.
Syslog Address Enter the server name or IP address of the syslog server. Interval (sec) Specify the time interval in seconds (from 1 to 99999) at which the NXC-8160 sends the system logs to the server. Enable Monitor Select this to send wireless network status logs to a monitor server.
An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the NXC-8160). An agent translates the local management information from the managed device into a form compatible with SNMP.
Enter the SNMP manager IP address. Save Click Save to save your changes back to the NXC-8160. 7.4.1.1 SNMP Traps The NXC-8160 can send the following traps to the SNMP manager. Table 32 SNMP Traps TRAP TYPE DESCRIPTION This trap is sent after successful association with the client MAC Client <Client MAC>...
Main Switch is up (switch over). Main Switch is active again This trap is sent when the main NXC-8160 changes status from inactive to active and regains the main NXC-8160 status. This trap is sent when the main NXC-8160 is about to go down Failure detected in Main and the standby NXC-8160 is becoming Active.
You can manage the member controllers through the master controller. SSH Keys Set key from disk Enter the path where the public key that you want to upload to the NXC-8160 is stored on your computer or LAN. You should have received the key from the master controller and saved it on your computer.
Table 35 Advanced > Centralized Configuration (Master) LABEL DESCRIPTION Enable Master Select this option to have the NXC-8160 act as a master controller. You can manage the member controllers through the master controller. SSH Keys Generate & save Click the Generate button next to generate and save a new SSH key which will be new key to disk used to identify the NXC-8160 for SSH connections.
Chapter 7 Advanced Settings 7.6 The IDS Screen Click Advanced > IDS to open this screen. This is where you can configure the NXC-8160’s response to denial of service type attacks on your network. A denial of service attack is created by flooding a network with an overload of data traffic. A DoS is identified by attack signatures or other factors, most of which are well-known and documented in networking security circles.
• SSL-based Secured Logging: With this type of captive portal, a wireless client is initially authenticated before being allowed network access. A user enters his username and password over an SSL connection. The NXC-8160 then authenticates him on a connected RADIUS server. Secured Logging is used primarily for networks that require authentication-based access such as hotels, coffee shops, guest access, and so on.
Select this option to use a customized captive portal web page. This allows Page you to customize the default web page included with the NXC-8160. Note: Once you choose this option, the customization parameters dynamically appear. If left unchecked, they remain hidden.
Page 89
Picture #2 Click the Browse button to locate an image file on your computer that you want to upload to the NXC-8160. This image functions as a graphical body. Note: You can upload any image type supported by the HTML 4.0 standard (PNG, JPG, or GIF, for example).
Page 90
Both methods should provide you with a means to determine hexidecimal color values. Upload & Apply Click this button to upload any changes to the NXC-8160’s built-in captive portal web page. Preview Click this button to preview a temporary copy of the changes you have made to the NXC-8160’s captive portal web page.
<input type="text" name="f_password" /> <input type="submit" value="login" /> </form> 7.7.1.2 Image Example The following is an example of how to tag images in your custom upload captive portal web page source code: <img src="imgs/logo.gif" width="200" height="200" /> NXC-8160 User’s Guide...
Chapter 7 Advanced Settings 7.8 The Others Screen Click Advanced > Others to open this screen. This is where you can set up the NXC-8160’s more advanced configuration parameters. These settings can be configured across all ESSIDs or on a per ESSID basis. If you select Per ESSID, then you must go to WLAN >...
A on the Internet uses SSH to securely connect to the NXC-8160 for a management session. If the NXC-8160 is behind a NAT router or a firewall, you need to configure the router or firewall to allow a SSH connection to the NXC-8160.
(user name and password) to the server to log in to the server. Your NXC-8160 supports SSH version 1 and 2 using RSA authentication and three encryption methods (DES, 3DES and Blowfish). The SSH server is implemented on the NXC-8160 for management and file transfer on port 22.
8.3 on page 99). 8.2 The Events Log Screen Click Events & Reports to open this screen. This is where you can view the NXC-8160’s performance reports and list of events. Figure 48 Events & Reports > Events Log NXC-8160 User’s Guide...
When an event is recorded that is associated with a specific user, a “+” sign appears in this column. Clicking the event log adds the MAC address of the user in question to the NXC-8160’s MAC ACL. Date & Time This displays the exact date and time that the event log was added.
When you click the History button in Events & Reports > Events Log, this screen opens. This is where you can view the last 300 events logs recorded by the NXC-8160. Figure 49 Events & Reports > Events Log History The following table describes the labels in this screen.
DESCRIPTION Downlink This displays the connection speed (or downlink throughput) of data being Throughput transmitted across the NXC-8160’s network for both Radio 1 and Radio 2. (Mbps) Connection speed is measured in megabits per second (Mbps). TrueReuse As of this writing, this feature is not enabled in the NXC-8160.
2 Make sure you are using the power cord included with the NXC-8160. 3 Make sure the power cord is connected to the NXC-8160 and plugged in to an appropriate power source. Make sure the power source is turned on.
4 Make sure your computer's Ethernet adapter is installed and functioning properly. 5 Make sure your computer is in the same subnet as the NXC-8160. (If you know that there are routers between your computer and the NXC-8160, skip this step.) •...
Page 105
3 Make sure your computer (with a wireless adapter installed) is within the transmission range of the AP(s) connected to the NXC-8160. 4 Check that both the NXC-8160 and your wireless client are using the same wireless and wireless security settings.
6 Make sure your computer (with a wireless adapter installed) is within the transmission range of the AP(s) connected to the NXC-8160. 7 Make sure the AP(s) connected to the NXC-8160 is receiving power from the NXC- 8160 and working properly.
H A P T E R Product Specifications The following tables summarize the NXC-8160’s hardware and firmware features. Table 44 Hardware Specifications Dimensions 430 (W) x 240 (D) x 45 (H) mm Weight 3 Kg Power Specification 100 - 240 VAC/2A max.
Table 45 Firmware Specifications FEATURE DESCRIPTION Configuration Backup & Make a copy of the NXC-8160’s configuration. You can put it back on the Restoration NXC-8160 later if you decide to revert back to an earlier configuration. IP Multicast IP multicast is used to send traffic to a specific group of computers. The NXC-8160 supports versions 1 and 2 of IGMP (Internet Group Management Protocol) used to join multicast groups (see RFC 2236).
Appendices and Index The appendices provide general information. Some details may not apply to your NXC-8160. Setting Up Your Computer’s IP Address (113) Importing Certificates (137) IP Addresses and Subnetting (161) Pop-up Windows, JavaScripts and Java Permissions (171) Wireless LANs (179)
P P E N D I X Setting Up Your Computer’s IP Address Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix A Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 52 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix A Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 54 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 55 Windows XP: Local Area Connection Properties NWD271N User’s Guide...
Appendix A Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 56 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 57 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 58 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix A Setting Up Your Computer’s IP Address 4 Click Manage network connections. Figure 60 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 61 Windows Vista: Network and Sharing Center During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 62 Windows Vista: Local Area Connection Properties NWD271N User’s Guide...
Appendix A Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 63 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix A Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 64 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon.
Appendix A Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 66 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab.
Appendix A Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. •...
Appendix A Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 70 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 71 Mac OS X 10.5: Systems Preferences NWD271N User’s Guide...
Appendix A Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 72 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: •...
Appendix A Setting Up Your Computer’s IP Address Figure 73 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab.
Appendix A Setting Up Your Computer’s IP Address Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
Appendix A Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 77 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Properties dialog box opens. Figure 79 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 81 Ubuntu 8: Network Tools NWD271N User’s Guide...
Appendix A Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
Appendix A Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 84 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix A Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 86 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
Appendix A Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 87 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 88 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
Page 136
Appendix A Setting Up Your Computer’s IP Address NWD271N User’s Guide...
P P E N D I X Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix B Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
Appendix B Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 93 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next. Figure 94 Internet Explorer 7: Certificate Import Wizard [Document Title]...
Appendix B Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 95 Internet Explorer 7: Certificate Import Wizard 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 96 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix B Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 98 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 99 Internet Explorer 7: Security Warning [Document Title]...
Appendix B Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 100 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar.
Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file.
Appendix B Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click Tools > Internet Options. Figure 104 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content >...
Appendix B Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 106 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 107 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix B Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click Tools >...
Appendix B Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import Figure 113 Firefox 2: Certificate Manager 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 114 Firefox 2: Select File 5 The next time you visit the web site, click the padlock in the address bar to open the Page Info >...
Appendix B Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click Tools > Options. Figure 115 Firefox 2: Tools Menu 2 In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 116 Firefox 2: Options [Document Title]...
Appendix B Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 117 Firefox 2: Certificate Manager 4 In the Delete Web Site Certificates dialog box, click OK. Figure 118 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix B Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click Tools >...
Appendix B Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 123 Opera 9: Certificate manager 4 Use the Import certificate dialog box to locate the certificate and then click Open. Figure 124 Opera 9: Import certificate [Document Title]...
Appendix B Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 125 Opera 9: Install authority certificate 6 Next, click OK. Figure 126 Opera 9: Install authority certificate 7 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix B Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click Tools > Preferences. Figure 127 Opera 9: Tools Menu 2 In Preferences, Advanced > Security > Manage certificates. Figure 128 Opera 9: Preferences [Document Title]...
Appendix B Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 129 Opera 9: Certificate manager 4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix B Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
Appendix B Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file.
Appendix B Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 136 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove.
Page 160
Appendix B Importing Certificates [Document Title]...
Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal. The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. NXC-8160 User’s Guide...
Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. NXC-8160 User’s Guide...
For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. The following table shows some possible subnet masks using both notations. Table 51 Alternative Subnet Mask Notation ALTERNATIVE LAST OCTET LAST OCTET SUBNET MASK NOTATION (BINARY) (DECIMAL) 255.255.255.0 0000 0000 255.255.255.128 1000 0000 NXC-8160 User’s Guide...
The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting. There are now two sub- networks, A and B. NXC-8160 User’s Guide...
Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Table 56 Eight Subnets SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS ADDRESS ADDRESS NXC-8160 User’s Guide...
You must also enable Network Address Translation (NAT) on the NXC- 8160. Once you have decided on the network number, pick an IP address for your NXC-8160 that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.
LAN and WAN addresses must be on different subnets. In the following example, the LAN and WAN are on the same subnet. The LAN computers cannot access the Internet because the router cannot route between networks. Figure 142 Conflicting Computer IP Addresses Example NXC-8160 User’s Guide...
LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 143 Conflicting Computer and Router IP Addresses Example NXC-8160 User’s Guide...
1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 144 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. NXC-8160 User’s Guide...
Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen. NXC-8160 User’s Guide...
3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 147 Pop-up Blocker Settings NXC-8160 User’s Guide...
3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window. NXC-8160 User’s Guide...
2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window. Figure 150 Security Settings - Java NXC-8160 User’s Guide...
Figure 151 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. NXC-8160 User’s Guide...
Appendix D Pop-up Windows, JavaScripts and Java Permissions Figure 152 Mozilla Firefox: Tools > Options Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 153 Mozilla Firefox Content Security NXC-8160 User’s Guide...
Page 178
Appendix D Pop-up Windows, JavaScripts and Java Permissions NXC-8160 User’s Guide...
Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless client A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. NXC-8160 User’s Guide...
An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. NXC-8160 User’s Guide...
(AP) or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. NXC-8160 User’s Guide...
AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. NXC-8160 User’s Guide...
Use the dynamic setting to automatically use short preamble when all wireless devices on the network support it, otherwise the NXC-8160 uses long preamble. The wireless devices MUST use the same preamble mode in order to communicate.
Wi-Fi Protected Access (WPA) Most Secure WPA2 You must enable the same wireless security settings on the NXC-8160 and on all wireless clients that you want to associate with it. IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that supports IEEE 802.1x. . NXC-8160 User’s Guide...
Page 186
However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is implemented only by Cisco. LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. NXC-8160 User’s Guide...
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. NXC-8160 User’s Guide...
Page 188
AP and does not need to go with the authentication process again. Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an AP) to perform IEEE 802.1x authentication with another AP before connecting to it. NXC-8160 User’s Guide...
(PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each wireless client's password and allows it to join the network only if the password matches. NXC-8160 User’s Guide...
The angle of the beam determines the width of the coverage pattern. Angles typically range from 20 degrees (very directional) to 120 degrees (less directional). Directional antennas are ideal for hallways and outdoor point-to-point applications. NXC-8160 User’s Guide...
For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. For directional antennas, point the antenna in the direction of the desired coverage area. NXC-8160 User’s Guide...
ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
Page 194
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page. NXC-8160 User’s Guide...
Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products. NXC-8160 User’s Guide...
Page 196
Appendix F Legal Information NXC-8160 User’s Guide...
Basic Service Set, See BSS review ESSID definition Extended Service Set, See ESS captive portal 24, 76, 86 centralized configuration FCC interference statement technical reference firmware Certificate Authority definition See CA. fragmentation threshold certifications notices viewing channel 62, 181 NXC-8160 User’s Guide...
Page 204
Management Information Base. See MIB. redundancy managing the device registration good habits product master controller related documentation member device RFC 1466. See IP address. Message Integrity Check (MIC) RFC 1597. See private IP address. RTS (Request To Send) threshold 181, 182 NXC-8160 User’s Guide...
Page 205
RADIUS application example RADIUS server WPA2 52, 187 weaknesses user authentication Username vs WPA2-PSK Default wireless client supplicant with RADIUS application example WPA2-Pre-Shared Key WPA2-PSK 52, 187, 188 application example WPA-PSK 187, 188 application example Virtual Local Area Network NXC-8160 User’s Guide...
Need help?
Do you have a question about the NXC-8160 and is the answer not in the manual?
Questions and answers