ZyXEL Communications nwa1100-n User Manual

ZyXEL Communications nwa1100-n User Manual

802.11b/g/n poe access point
Hide thumbs Also See for nwa1100-n:
Table of Contents

Advertisement

NWA1100-N
802.11b/g/n PoE Access Point
Version 1.00
Edition 3, 10/2013
Quick Start Guide
User's Guide
Default Login Details
LAN IP Address
User Name
Password
www.zyxel.com
http://192.168.1.2
admin
1234
Copyright © 2013 ZyXEL Communications Corporation

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the nwa1100-n and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ZyXEL Communications nwa1100-n

  • Page 1 NWA1100-N 802.11b/g/n PoE Access Point Version 1.00 Edition 3, 10/2013 Quick Start Guide User’s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Password 1234 www.zyxel.com Copyright © 2013 ZyXEL Communications Corporation...
  • Page 2 Every effort has been made to ensure that the information in this manual is accurate. Related Documentation • Quick Start Guide The Quick Start Guide shows how to connect the NWA and access the Web Configurator. NWA1100-N User’s Guide...
  • Page 3: Table Of Contents

    Contents Overview Contents Overview User’s Guide ............................9 Introducing the NWA ..........................11 Introducing the Web Configurator ......................20 Status Screens ............................23 Tutorial ..............................27 Technical Reference ..........................46 Wireless Settings Screen ........................48 Multi SSID Screen ...........................66 Wireless Security Screen ........................71 RADIUS Screen ............................84 MAC Filter Screen ...........................87 IP Screen ..............................90 System Screens ............................94...
  • Page 4: Table Of Contents

    2.2.1 Methods of Restoring Factory-Defaults ...................21 2.3 Navigating the Web Configurator ......................21 Chapter 3 Status Screens ............................23 3.1 The Status Screen ..........................23 3.1.1 System Statistics Screen ......................25 Chapter 4 Tutorial ..............................27 4.1 How to Configure the Wireless LAN ....................27 NWA1100-N User’s Guide...
  • Page 5 Multi SSID Screen ..........................66 6.1 Overview ............................66 6.1.1 What You Can Do in this Chapter ....................66 6.1.2 What You Need To Know ......................66 6.2 The Multi SSID Screen ........................67 6.2.1 Configuring SSID ........................68 6.3 Technical Reference ..........................69 NWA1100-N User’s Guide...
  • Page 6 10.2 What You Can Do in this Chapter ....................90 10.3 What You Need to Know .........................90 10.4 IP Screen ............................91 10.5 Technical Reference ........................92 10.5.1 WAN IP Address Assignment ....................92 10.5.2 Spanning Tree Protocol (STP) ....................92 Chapter 11 System Screens ..........................94 11.1 Overview ............................94 NWA1100-N User’s Guide...
  • Page 7 14.1 Overview ............................114 14.2 What You Can Do in this Chapter ....................114 14.3 What You Need To Know ......................115 14.4 View Log Screen ........................... 115 14.5 Log Settings Screen ........................116 Chapter 15 Maintenance ............................119 NWA1100-N User’s Guide...
  • Page 8 Appendix B Pop-up Windows, JavaScript and Java Permissions ...........158 Appendix C IP Addresses and Subnetting..................169 Appendix D Wireless LANs......................177 Appendix E Text File Based Auto Configuration ................191 Appendix F Open Software Announcements...................193 Appendix G Customer Support......................223 Appendix H Legal Information ......................229 Index ..............................235 NWA1100-N User’s Guide...
  • Page 9: User's Guide

    User’s Guide...
  • Page 11: Introducing The Nwa

    See the Quick Start Guide for instructions on how to make hardware connections. 1.2 Applications for the NWA The NWA can be configured to use the following WLAN operating modes: Access Point Bridge/Repeater AP + Bridge Wireless Client Multi SSID Applications for each operating mode are shown below. NWA1100-N User’s Guide...
  • Page 12: Access Point

    WDS security, traffic between APs is not encrypted. When WDS security is enabled, both APs must use the same pre-shared key. See Section 5.4.2 on page 53 for more details. Once the security settings of peer sides match one another, the connection between devices is made. NWA1100-N User’s Guide...
  • Page 13 1.2.2.1 Bridge / Repeater Mode Example In the example below, when both NWAs are in bridge mode, they form a WDS (Wireless Distribution System) allowing the computers in LAN 1 to connect to the computers in LAN 2. Figure 4 Bridging Example NWA1100-N User’s Guide...
  • Page 14: Ap + Bridge

    Using AP + Bridge mode, your NWA can extend the range of the WLAN. In the figure below, A and B act as AP + Bridge devices that forward traffic between associated wireless workstations and the wired LAN. NWA1100-N User’s Guide...
  • Page 15: Wireless Client

    The NWA can be used as a wireless client to communicate with an existing network. In the figure below, the printer can receive requests from the wired computer clients A and B via the NWA in Wireless Client mode. Figure 8 Wireless Client Application NWA1100-N User’s Guide...
  • Page 16: Multi Ssid

    SSID01 is the wireless network for standard users, and Guest_SSID is the wireless network for guest users. Figure 9 Multiple BSSs 1.3 Ways to Manage the NWA Use any of the following methods to manage the NWA. NWA1100-N User’s Guide...
  • Page 17: Configuring Your Nwa's Security Features

    • Enable the MAC filter to allow only trusted users to access your wireless network or deny unwanted users access based on their MAC address. See Section 9.4 on page 88 for directions on configuring the MAC filter. NWA1100-N User’s Guide...
  • Page 18: Good Habits For Managing The Nwa

    The NWA doesn’t have an Ethernet connection with the LAN. The NWA is not receiving power. WLAN Green The wireless adaptor WLAN is active. Blinking The wireless adaptor WLAN is active, and transmitting or receiving data. The wireless adaptor WLAN is not active. NWA1100-N User’s Guide...
  • Page 19 The NWA has a 10/100 Mbps Ethernet connection and is sending or receiving data. Yellow The NWA has a 1000 Mbps Ethernet connection. Blinking The NWA has a 1000 Mbps Ethernet connection and is sending/receiving data. The NWA does not have an Ethernet connection. NWA1100-N User’s Guide...
  • Page 20: Introducing The Web Configurator

    2.2 Resetting the NWA If you forget your password or cannot access the web configurator, you will need to use the RESET button at the rear panel of the NWA. This replaces the current configuration file with the factory- NWA1100-N User’s Guide...
  • Page 21: Methods Of Restoring Factory-Defaults

    NWA is not known. Use the web configurator to restore defaults (refer to Section 15.7 on page 123). 2.3 Navigating the Web Configurator The following summarizes how to navigate the web configurator from the Status screen. NWA1100-N User’s Guide...
  • Page 22 • Click MAINTENANCE to view information about your NWA or upgrade configuration and firmware files. Maintenance features include Client Information, Channel Scan, F/W (firmware) Upload, Configuration File (Backup, Restore and Default) and Reboot. • Click LOGOUT at any time to exit the web configurator. NWA1100-N User’s Guide...
  • Page 23: Status Screens

    The following table describes the labels in this screen. Table 2 The Status Screen LABEL DESCRIPTION Automatic Refresh Select how often you want the NWA to update this screen. Interval Refresh Now Click this to update this screen immediately. System Information NWA1100-N User’s Guide...
  • Page 24 For each interface, this field displays Up when the NWA is using the interface and Down when the NWA is not using the interface. Channel Click this to see which wireless channels are currently in use in the local area. See Section 15.5 on page 120. NWA1100-N User’s Guide...
  • Page 25: System Statistics Screen

    This field shows which wireless standard the NWA is using. Channel ID Click this to see which wireless channels are currently in use in the local area. See Section 15.5 on page 120. RX PKT This is the number of received packets on this port. NWA1100-N User’s Guide...
  • Page 26 This is the ratio percentage showing the total number of checksum error of received packets (RX) over total RX. Poll Interval Enter the time interval for refreshing statistics. Set Interval Click this button to apply the new poll interval you entered above. Stop Click this button to stop refreshing statistics. NWA1100-N User’s Guide...
  • Page 27: Tutorial

    4.1.2 Wireless LAN Configuration Overview The following figure shows the steps you should take to configure the wireless settings according to the operating mode you select. Use the Web Configurator to set up your NWA’s wireless network NWA1100-N User’s Guide...
  • Page 28: Further Reading

    • Choosing an SSID Profile: see Section 5.4 on page 50 • Choosing a Security mode: see Section 6.2 on page • Configuring an external RADIUS server: see Section 8.4 on page • Configuring MAC Filtering: see Section 9.4 on page NWA1100-N User’s Guide...
  • Page 29: How To Configure Multiple Wireless Networks

    Configure a wireless network for standard office use. Configure a wireless network for VoIP users. Configure a wireless network for guests to your office. The following figure shows the multiple networks you want to set up. Your NWA is marked Z. NWA1100-N User’s Guide...
  • Page 30: Configure The Ssid Profiles

    20). Click Wireless > Multi SSID. The Multi SSID screen appears. Select the Profile1 radio button and click Edit. Rename the Profile Name as SSID01. Click Save. Repeat Step 2 and 3 to change Profile2 and Profile3 to VoIP_SSID and Guest_SSID. NWA1100-N User’s Guide...
  • Page 31 SSID01 is the standard network, so select SSID01 as the first profile. It is always active. Select VoIP_SSID as the second profile, and Guest_SSID as the third profile. Select the corresponding Active check-boxes. Click Apply to save your settings. Now the three SSIDs are activated. NWA1100-N User’s Guide...
  • Page 32: Configure The Standard Network

    SSID to wireless clients scanning the area. Also, the clients on SSID01 might need to access other clients on the same wireless network. Do not select the Enable Intra-BSS Traffic blocking check-box. Click Save. NWA1100-N User’s Guide...
  • Page 33 Since SSID01 is the standard network that has access to all resources, assign a more secure security mode. Select WPA2-PSK-MIX as the Security Mode, and enter the Pre-Shared Key. In this example, use ThisisSSID01PreSharedKey. Click Apply. You have finished configuring the standard network, SSID01. NWA1100-N User’s Guide...
  • Page 34: Configure The Voip Network

    Set the SSID to VoIP_SSID. Select SecProfile2 as the Security Profile for the VoIP network. Select the Hidden SSID check-box. Select WMM-Voice in the QoS field to give VoIP the highest priority in the wireless network. Click Save. NWA1100-N User’s Guide...
  • Page 35: Configure The Guest Network

    When you are setting up the wireless network for guests to your office, your primary concern is to keep your network secure. For this reason, the pre-configured Guest_SSID profile has intra-BSS traffic blocking enabled by default. “Intra-BSS traffic blocking” means that the client cannot access other clients on the same wireless network. NWA1100-N User’s Guide...
  • Page 36 SSID check-box so the guests can easily find the wireless network. Select WMM-best effort in the QoS field t o give the guest a lower QoS priority. Select the check-box of Enable Intra-BSS Traffic blocking. Click Save. NWA1100-N User’s Guide...
  • Page 37: Testing The Wireless Networks

    (for example, if you can access the SSID01 or VoIP_SSID wireless network using the security settings for the Guest_SSID wireless network) check that the SSID profile is set to use the correct security profile, and that the settings of the security profile are correct. NWA1100-N User’s Guide...
  • Page 38: Nwa Setup In Ap And Wireless Client Modes

    Before setting up the NWA as a wireless client (B), you need to make sure there is an access point to connect to. Use the Ethernet port on NWA (A) to configure it via a wired connection. NWA1100-N User’s Guide...
  • Page 39 Go to Wireless > Multi SSID. Select Profile1 and click Edit. Change the SSID to AP-A. Select SecProfile1 in the Security field. Select the check-box for Enable Intra-BSS Traffic blocking so the client cannot access other clients on the same wireless network. NWA1100-N User’s Guide...
  • Page 40 Chapter 4 Tutorial 10 Click Save. 11 Go to Wireless > Security. Select SecProfile1. Click Edit. 12 Configure WPA-PSK as the Security Mode and enter ThisisMyPreSharedKey in the Pre- Shared Key field. NWA1100-N User’s Guide...
  • Page 41: Configuring The Nwa In Wireless Client Mode

    Select Wireless Client as Operation Mode. Select Profile1 as the SSID Profile. Click Apply. Click on the Site Survey tab. A window should pop up which contains a list of all available wireless devices within your NWA’s range. NWA1100-N User’s Guide...
  • Page 42 Chapter 4 Tutorial Find and select NWA (A)’s SSID: AP-A. Click Selected. The NWA automatically uses the selected AP’s SSID for Profile 1. Go to Wireless > Multi SSID. Select Profile1 and click Edit. NWA1100-N User’s Guide...
  • Page 43 Select SecProfile1 in the Security field. Click Save. Go to Wireless > Security. Select SecProfile1. Click Edit. Configure the NWA to use the same security mode and Pre-Shared Key as NWA (A): WPA-PSK/ ThisisMyPreSharedKey. Click Apply. Figure 17 NWA1100-N User’s Guide...
  • Page 44: Mac Filter Setup

    If you cannot establish a connection with the FTP server, do the following steps. Make sure W, Y and Z use the same wireless security settings as A and can access A. Make sure B uses the same wireless and wireless security settings as A and can access A. NWA1100-N User’s Guide...
  • Page 45 • Try accessing the FTP server from X. If you are able to access the FTP server, do the following. Make sure MAC filtering is enabled. Make sure X’s MAC address is not entered in the list of allowed devices. NWA1100-N User’s Guide...
  • Page 46: Technical Reference

    Technical Reference The appendices provide general information. Some details may not apply to your NWA.
  • Page 48: Wireless Settings Screen

    NWA. 5.2 What You Can Do in this Chapter Use the Wireless > Wireless Settings screen to configure the NWA’s operation mode (see Section 5.4 on page 50). NWA1100-N User’s Guide...
  • Page 49: What You Need To Know

    A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference. NWA1100-N User’s Guide...
  • Page 50: Wireless Settings Screen

    • Multi-SSID should not replace but rather be used in conjunction with 802.1x security. 5.4 Wireless Settings Screen Use this screen to choose the operating mode for your NWA. Click Wireless > Wireless Settings. The screen varies depending upon the operating mode you select. NWA1100-N User’s Guide...
  • Page 51: Access Point Mode

    The following table describes the general wireless LAN labels in this screen. Table 4 Wireless > Wireless Settings: Access Point LABEL DESCRIPTION Basic Settings Disable Wireless Select this option to turn off the wireless LAN. LAN Interface Operation Mode Select Access Point from the drop-down list. NWA1100-N User’s Guide...
  • Page 52 RTS/CTS handshake. Setting this attribute to its smallest value (1) turns on the RTS/CTS handshake. Fragmentation The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. NWA1100-N User’s Guide...
  • Page 53: Bridge / Repeater Mode

    Use this screen to have the NWA act as a wireless network bridge and establish wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode. NWA1100-N User’s Guide...
  • Page 54 Chapter 5 Wireless Settings Screen Use this screen to use the NWA as a wireless bridge. Select Bridge/Repeater as the Operation Mode. Figure 20 Wireless > Wireless Settings: Bridge/Repeater NWA1100-N User’s Guide...
  • Page 55 Enter a pre-shared key (PSK) for access point(s) in your WDS. • Configure WDS security and the relevant PSK in each of your other access point(s). Note: Other APs must use the same encryption method to enable WDS security. NWA1100-N User’s Guide...
  • Page 56 Basic (1~11 Mbps only): Clients can always connect to the access point at this speed. • Optional: Clients can connect to the access point at this speed, when permitted to do so by the AP. • Disable: Clients cannot connect to the access point at this speed. NWA1100-N User’s Guide...
  • Page 57 For each MCS Rate (0-15), select either Enable (default) to have the NWA use the data rate. Select Disable if you do not want the NWA to use the data rate. Apply Click Apply to save your changes. Cancel Click Cancel to begin configuring this screen afresh. NWA1100-N User’s Guide...
  • Page 58: Ap + Bridge Mode

    AP+Bridge as the Operation Mode. The following screen displays. Figure 21 Wireless > Wireless Settings: AP+Bridge See the tables describing the fields in the Access Point and Bridge / Repeater operating modes for descriptions of the fields in this screen. NWA1100-N User’s Guide...
  • Page 59: Wireless Client Mode

    NWA to reduce interference with other APs. Select one of the following Full (Full Power), 50%, 25%, 12.5% or Min (Minimum). See the product specifications for more information on your NWA’s output power. NWA1100-N User’s Guide...
  • Page 60 Reducing the GI increases data transfer rates but also increases interference. Increasing the GI reduces data transfer rates but also reduces interference. Apply Click Apply to save your changes. Cancel Click Cancel to begin configuring this screen afresh. NWA1100-N User’s Guide...
  • Page 61: Multi Ssid Mode

    Chapter 5 Wireless Settings Screen 5.4.5 Multi SSID Mode Use this screen to have the NWA function in Multi SSID mode. Select Multi SSID as the Operating Mode. The following screen diplays. Figure 23 Wireless > Wireless Settings: Multi SSID NWA1100-N User’s Guide...
  • Page 62 Enter a VLAN ID number from 1 to 4094. Packets coming from the WLAN using this SSID profile are tagged with the VLAN ID number by the NWA. Different BSSID profiles can use the same or different VLAN IDs. This allows you to split wireless stations into groups using similar VLAN IDs. NWA1100-N User’s Guide...
  • Page 63 Basic (1~11 Mbps only): Clients can always connect to the access point at this speed. • Optional: Clients can connect to the access point at this speed, when permitted to do so by the AP. • Disable: Clients cannot connect to the access point at this speed. NWA1100-N User’s Guide...
  • Page 64: Technical Reference

    The NWA uses WMM QoS to prioritize traffic streams according to the IEEE 802.1q or DSCP information in each packet’s header. The NWA automatically determines the priority to use for an individual traffic stream. This prevents reductions in data transmission for applications that are sensitive to latency and jitter (variations in delay). NWA1100-N User’s Guide...
  • Page 65: Additional Wireless Terms

    RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. NWA1100-N User’s Guide...
  • Page 66: Multi Ssid Screen

    Use the Wireless > Multi SSID screen to configure up to eight SSID profiles for your NWA (see Section 6.2 on page 67). 6.1.2 What You Need To Know The following terms and concepts may help as you read through this chapter. NWA1100-N User’s Guide...
  • Page 67: The Multi Ssid Screen

    AP to associate with, this is the name that is broadcast and seen in the wireless client utility. Security This field indicates which security profile is currently associated with each SSID profile. See Section 7.4.1 on page 75 for more information. NWA1100-N User’s Guide...
  • Page 68: Configuring Ssid

    If you do not need to use RADIUS authentication, ignore this field. See Section 8.4 on page 85 for more information. MAC Filtering Select a MAC filter profile from the drop-down list box. If you do not want to use MAC filtering on this profile, select Disable. NWA1100-N User’s Guide...
  • Page 69: Technical Reference

    The NWA uses WMM QoS to prioritize traffic streams according to the IEEE 802.1q or DSCP information in each packet’s header. The NWA automatically determines the priority to use for an NWA1100-N User’s Guide...
  • Page 70: Type Of Service (Tos)

    224, 192 voice 160, 128 video 96, 0 besteffort 64, 32 background A. The NWA also uses best effort for any DSCP value for which another WMM QoS priority is not specified (255, 158 or 37 for example). NWA1100-N User’s Guide...
  • Page 71: Wireless Security Screen

    It can also hide its identity in the network. 7.2 What You Can Do in this Chapter Use the Wireless > Security screen to choose the security mode for your NWA (see Section 7.4 on page 73). NWA1100-N User’s Guide...
  • Page 72: What You Need To Know

    • WPA2. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. • WPA2-MIX. This commands the NWA to use either WPA2 or WPA depending on which security mode the wireless client uses. NWA1100-N User’s Guide...
  • Page 73: The Security Screen

    Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAPv2) or Generic Token Card (GTC). Further information on these terms can be found in Appendix D on page 177. 7.4 The Security Screen Use this screen to choose the security mode for your NWA. NWA1100-N User’s Guide...
  • Page 74 Note that some screens display differently depending on the operating mode selected in the Wireless > Wireless Settings screen. Note: You must enable the same wireless security settings on the NWA and on all wireless clients that you want to associate with it. NWA1100-N User’s Guide...
  • Page 75: Security: Wep

    If you chose 152-bit WEP, then enter 16 ASCII characters or 32 hexadecimal characters ("0-9", "A-F"). You must configure all four keys, but only one key can be activated at any one time. Apply Click Apply to save your changes. NWA1100-N User’s Guide...
  • Page 76: Security: 802.1X Only

    This is the name that identifying this profile. Security Mode Choose 802.1X in this field. Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. Back Click Back to return to the previous screen. NWA1100-N User’s Guide...
  • Page 77 Password Supply the password of the account created in the RADIUS server. Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. Back Click Back to return to the previous screen. NWA1100-N User’s Guide...
  • Page 78: Security: 802.1X + Static Wep

    There are four data encryption keys to secure your data from eavesdropping by unauthorized wireless users. The values for the keys must be set up exactly the same on the access points as they are on the wireless clients. NWA1100-N User’s Guide...
  • Page 79 Use this screen to use 802.1x authentication with a static WEP key for your NWA that is in Wireless Client operating mode. Select 802.1x in the Security Mode field to display the following screen. Figure 35 Security: 802.1x + Static WEP for Wireless Client NWA1100-N User’s Guide...
  • Page 80: Security: Wpa, Wpa2 Or Wpa2-Mix

    Back Click Back to return to the previous screen. 7.4.4 Security: WPA, WPA2 or WPA2-MIX This screen varies depending on whether you select Access Point, Multi SSID or Wireless Client in the Wireless > Wireless Settings screen. NWA1100-N User’s Guide...
  • Page 81 Enter how often you want the NWA to send a new group key out to all clients. Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. Back Click Back to return to the previous screen. NWA1100-N User’s Guide...
  • Page 82 Password Supply the password of the account created in the RADIUS server. Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. Back Click Back to return to the previous screen. NWA1100-N User’s Guide...
  • Page 83: Security: Wpa-Psk, Wpa2-Psk, Wpa2-Psk-Mix

    • If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher bit key offers better security. You can manually enter 64-bit, 128-bit or 152-bit WEP keys. More information on Wireless Security can be found in Appendix D on page 177. NWA1100-N User’s Guide...
  • Page 84: Radius Screen

    • Authentication which determines the identity of the users. • Authorization which determines the network services available to authenticated users once they are connected to the network. • Accounting which keeps track of the client’s network activity. NWA1100-N User’s Guide...
  • Page 85: The Radius Screen

    Specify the NAS identifier (a RADIUS attribute) that the NWA uses to identify itself to a RADIUS server for authentication. RADIUS Option Configure the fields below to set up user authentication and accounting. Primary Select Active to enable user authentication/accounting through an external server. NWA1100-N User’s Guide...
  • Page 86 NWA. The key must be the same on the external accounting server and your NWA. The key is not sent over the network. Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. NWA1100-N User’s Guide...
  • Page 87: Mac Filter Screen

    Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of each device to configure MAC filtering on the NWA. NWA1100-N User’s Guide...
  • Page 88: Mac Filter Screen

    Use this screen to enable MAC address filtering in your NWA. You can specify MAC addresses to either allow or deny association with your NWA. Click Wireless > MAC Filter. The screen displays as shown. Figure 42 Wireless > MAC Filter NWA1100-N User’s Guide...
  • Page 89 Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless station to be allowed or denied access to the NWA. Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. Back Click Back to return to the previous screen. NWA1100-N User’s Guide...
  • Page 90: Ip Screen

    Use the IP screen to configure the IP address of your NWA (see Section 10.4 on page 91). 10.3 What You Need to Know The Ethernet parameters of the NWA are preset in the factory with the following values: IP address of 192.168.1.2 Subnet mask of 255.255.255.0 (24 bits) NWA1100-N User’s Guide...
  • Page 91: Ip Screen

    NWA; over the WAN, the gateway must be the IP address of one of the remote nodes. Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. NWA1100-N User’s Guide...
  • Page 92: Technical Reference

    In RSTP, the port states are Discarding, Learning, and Forwarding. 10.5.2.2 STP Terminology The root bridge is the base of the spanning tree; it is the bridge with the lowest identifier value (MAC address). NWA1100-N User’s Guide...
  • Page 93: How Stp Works

    All BPDUs are received and processed. Learning All BPDUs are received and processed. Information frames are submitted to the learning process but not forwarded. Forwarding All BPDUs are received and processed. All information frames are received and forwarded. NWA1100-N User’s Guide...
  • Page 94: System Screens

    11.3 What You Need To Know IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses NWA1100-N User’s Guide...
  • Page 95 The subnet mask specifies the network number portion of an IP address. Your device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the device unless you are instructed to do otherwise. NWA1100-N User’s Guide...
  • Page 96: General Screen

    Select an Ethernet port speed and duplex mode from the drop-down list. Select Auto if you would like to have the system configure this automatically. Apply Click Apply to save your changes. Cancel Click Cancel to reload the previous configuration for this screen. NWA1100-N User’s Guide...
  • Page 97: Password Screen

    (*) for each character you type. Retype to Confirm Retype your new system password for confirmation. Apply Click Apply to save your changes. Reset Click Reset to reload the previous configuration for this screen. NWA1100-N User’s Guide...
  • Page 98: Time Screen

    Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT). Apply Click Apply to save your changes. Refresh Click Refresh to reload the previous configuration for this screen. NWA1100-N User’s Guide...
  • Page 99: Technical Reference

    If the synchronization fails, then the NWA goes through the rest of the list in order from the first one tried until either it is successful or all the pre-defined NTP time servers have been tried. NWA1100-N User’s Guide...
  • Page 100: Remote Management

    • Use the FTP screen to configure through which interface(s) and from which IP address(es) you can use File Transfer Protocol (FTP) to manage the NWA. You can use FTP to upload the latest firmware for example (see Section 12.5 on page 104). NWA1100-N User’s Guide...
  • Page 101: What You Need To Know

    Your NWA supports SNMP agent functionality, which allows a manager station to manage and monitor the NWA through the network. The NWA supports SNMP version one (SNMPv1) and version two (SNMPv2c). The next figure illustrates an SNMP management operation. . NWA1100-N User’s Guide...
  • Page 102 • You may only have one remote management session running at one time. The NWA automatically disconnects a remote management session of lower priority when another remote management session of higher priority starts. The priorities for the different types of remote management sessions are as follows: Telnet HTTP NWA1100-N User’s Guide...
  • Page 103: The Telnet Screen

    Choose Selected to just allow the computer with the MAC address that you specify to access the NWA using this service. Apply Click Apply to save your customized settings and exit this screen. Reset Click Reset to begin configuring this screen afresh. NWA1100-N User’s Guide...
  • Page 104: The Ftp Screen

    12.6 The WWW Screen Use this screen to configure your NWA via the World Wide Web (WWW) using a Web browser. This lets you specify which IP addresses or computers are able to communicate with and access the NWA. NWA1100-N User’s Guide...
  • Page 105 Choose Selected to just allow the computer with the MAC address that you specify to access the NWA using this service. Apply Click Apply to save your customized settings and exit this screen. Reset Click Reset to begin configuring this screen afresh. NWA1100-N User’s Guide...
  • Page 106: The Snmp Screen

    Select the check box to enable the SNMP administrator account for authentication with SNMPv3Admin SNMP managers using SNMP v3. User Name Specify the user name of the SNMP administrator account. Password Enter the password for SNMP administrator authentication. Confirm Password Retype the password for confirmation. NWA1100-N User’s Guide...
  • Page 107 You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Server Access Select the interface(s) through which a computer may access the NWA using this service. NWA1100-N User’s Guide...
  • Page 108: Technical Reference

    The NWA supports MIB II that is defined in RFC-1213 and RFC-1215 as well as the proprietary ZyXEL private MIB. The purpose of the MIBs is to let administrators collect statistical data and monitor status and performance. NWA1100-N User’s Guide...
  • Page 109: Snmp Traps

    Ethernet port (LAN) enet2 Wireless LAN adaptor WLAN2 Virtual enet3 ~ enet9 WLAN1 in MBSSID mode enet10 ~ enet16 WLAN2 in MBSSID mode enet17 ~ enet21 WLAN1 in WDS mode enet22 ~ enet26 WLAN2 in WDS mode NWA1100-N User’s Guide...
  • Page 110: Certificate Screen

    NWA, you should verify that you have the correct certificate. Key distribution is simple and very secure since you can freely distribute public keys and you never need to transmit private keys. NWA1100-N User’s Guide...
  • Page 111: Certificates Screen

    This section provides technical background information about the topics covered in this chapter. 13.5.1 Private-Public Certificates When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure. NWA1100-N User’s Guide...
  • Page 112: Certification Authorities

    Browse to where you have the certificate saved on your computer. Make sure that the certificate has a “.cer” or “.crt” file name extension. Figure 58 Certificates on Your Computer NWA1100-N User’s Guide...
  • Page 113 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may vary according to your situation. Possible examples would be over the telephone or through an HTTPS connection. NWA1100-N User’s Guide...
  • Page 114: Log Screens

    (Section 14.4 on page 115). • Use the Log Settings screen to configure where and when the NWA will send the logs, and which logs and/or immediate alerts it will send (Section 14.5 on page 116). NWA1100-N User’s Guide...
  • Page 115: What You Need To Know

    Figure 62 on page 117). Options include logs about system maintenance, system errors and access control. Click a column heading to sort the entries. A triangle indicates the direction of the sort order. Figure 61 View Log NWA1100-N User’s Guide...
  • Page 116: Log Settings Screen

    This field states the reason for the log. 14.5 Log Settings Screen Use this screen to configure to where and when the NWA is to send the logs and which logs and/or immediate alerts it is to send. NWA1100-N User’s Guide...
  • Page 117 Logs are sent to the e-mail address specified in this field. If this field is left blank, logs will not be sent via e-mail. SMTP If you use SMTP authentication, the mail receiver should be the owner of the SMTP Authentication account. NWA1100-N User’s Guide...
  • Page 118 Select the categories of alerts for which you want the NWA to immediately send e- mail alerts. Apply Click Apply to save your customized settings and exit this screen. Reset Click Reset to reconfigure all the fields in this screen. NWA1100-N User’s Guide...
  • Page 119: Maintenance

    HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. 15.4 Client Information Screen Use this screen to view the wireless stations that are currently associated with the NWA. NWA1100-N User’s Guide...
  • Page 120: Channel Scan Screen

    Click Maintenance > Channel Scan to display the screen shown next. Wait a moment while the NWA compiles the information. Figure 64 Channel Scan NWA1100-N User’s Guide...
  • Page 121: F/W Upload Screen

    The following table describes the labels in this screen. Table 43 Firmware Upload LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse ... to find NWA1100-N User’s Guide...
  • Page 122 After two minutes, log in again and check your new firmware version in the Status screen. If the upload was not successful, the following screen will appear. Click Return to go back to the F/ W Upload screen. Figure 68 Firmware Upload Error NWA1100-N User’s Guide...
  • Page 123: Configuration File Screen

    Type in the location of the file you want to upload in this field or click Browse ... to find Browse... Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them. Upload Click Upload to begin the upload process. NWA1100-N User’s Guide...
  • Page 124 Quick Start Guide for details on how to set up your computer’s IP address. If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration screen. Figure 72 Configuration Upload Error NWA1100-N User’s Guide...
  • Page 125: Back To Factory Defaults

    Use this screen to reboot the NWA without turning the power off. Click Maintenance > Reboot. The following screen displays. Figure 74 Reboot Screen Click Reboot to have the NWA reboot. This does not affect the NWA's configuration. NWA1100-N User’s Guide...
  • Page 126: Troubleshooting

    Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. Disconnect and re-connect the power adaptor to the NWA. If the problem continues, contact the vendor. NWA1100-N User’s Guide...
  • Page 127: Nwa Access And Login

    Reset the device to its factory defaults, and try to access the NWA with the default IP address. See your Quick Start Guide. If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. NWA1100-N User’s Guide...
  • Page 128: Internet Access

    Disconnect all the cables from your device, and follow the directions in the Quick Start Guide again. If the problem continues, contact your ISP. I cannot access the Internet anymore. I had access to the Internet (with the NWA), but my Internet connection is not available anymore. NWA1100-N User’s Guide...
  • Page 129: Wireless Lan

    NWA. Make sure your computer (with a wireless adapter installed) is within the transmission range of the NWA. Check that both the NWA and your wireless client are using the same wireless and wireless security settings. NWA1100-N User’s Guide...
  • Page 130: Appendix A Setting Up Your Computer's Ip Address

    145 • Linux: Ubuntu 8 (GNOME) page 148 • Linux: openSUSE 10.3 (KDE) page 152 Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. NWA1100-N User’s Guide...
  • Page 131 Appendix A Setting Up Your Computer’s IP Address Click Start > Control Panel. In the Control Panel, click the Network Connections icon. Right-click Local Area Connection and then select Properties. NWA1100-N User’s Guide...
  • Page 132 Appendix A Setting Up Your Computer’s IP Address On the General tab, select Internet Protocol (TCP/IP) and then click Properties. NWA1100-N User’s Guide...
  • Page 133 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. NWA1100-N User’s Guide...
  • Page 134 Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. In the Control Panel, click the Network and Internet icon. Click the Network and Sharing Center icon. NWA1100-N User’s Guide...
  • Page 135 Appendix A Setting Up Your Computer’s IP Address Click Manage network connections. Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NWA1100-N User’s Guide...
  • Page 136 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NWA1100-N User’s Guide...
  • Page 137 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. NWA1100-N User’s Guide...
  • Page 138 Appendix A Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. Click Start > Control Panel. In the Control Panel, click View network status and tasks under the Network and Internet category. Click Change adapter settings. NWA1100-N User’s Guide...
  • Page 139 Appendix A Setting Up Your Computer’s IP Address Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NWA1100-N User’s Guide...
  • Page 140 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NWA1100-N User’s Guide...
  • Page 141 Click OK to close the Internet Protocol (TCP/IP) Properties window. Click OK to close the Local Area Connection Properties window. Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. NWA1100-N User’s Guide...
  • Page 142 Appendix A Setting Up Your Computer’s IP Address The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple > System Preferences. NWA1100-N User’s Guide...
  • Page 143 Appendix A Setting Up Your Computer’s IP Address In the System Preferences window, click the Network icon. When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. NWA1100-N User’s Guide...
  • Page 144 • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. Click Apply Now and close the window. NWA1100-N User’s Guide...
  • Page 145 Network Interface from the Info tab. Figure 75 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. Click Apple > System Preferences. NWA1100-N User’s Guide...
  • Page 146 In System Preferences, click the Network icon. When the Network preferences pane opens, select Ethernet from the list of available connection types. From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: NWA1100-N User’s Guide...
  • Page 147 • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NWA. Click Apply and close the window. NWA1100-N User’s Guide...
  • Page 148 The following screens use the default Ubuntu 8 installation. Note: Make sure you are logged in as the root administrator. Follow the steps below to configure your computer IP address in GNOME: Click System > Administration > Network. NWA1100-N User’s Guide...
  • Page 149 Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. In the Authenticate window, enter your admin account name and password then click the Authenticate button. NWA1100-N User’s Guide...
  • Page 150 • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen. NWA1100-N User’s Guide...
  • Page 151 Appendix A Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Click the Close button to apply the changes. NWA1100-N User’s Guide...
  • Page 152 The following screens use the default openSUSE 10.3 installation. Note: Make sure you are logged in as the root administrator. Follow the steps below to configure your computer IP address in the KDE: NWA1100-N User’s Guide...
  • Page 153 Appendix A Setting Up Your Computer’s IP Address Click K Menu > Computer > Administrator Settings (YaST). When the Run as Root - KDE su dialog opens, enter the admin password and click OK. NWA1100-N User’s Guide...
  • Page 154 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. NWA1100-N User’s Guide...
  • Page 155 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. Click Next to save the changes and close the Network Card Setup window. NWA1100-N User’s Guide...
  • Page 156 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 79 openSUSE 10.3: KNetwork Manager NWA1100-N User’s Guide...
  • Page 157 Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 80 openSUSE: Connection Status - KNetwork Manager NWA1100-N User’s Guide...
  • Page 158: Appendix B Pop-Up Windows, Javascript And Java Permissions

    In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 81 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. In Internet Explorer, select Tools, Internet Options, Privacy. NWA1100-N User’s Guide...
  • Page 159 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. In Internet Explorer, select Tools, Internet Options and then the Privacy tab. NWA1100-N User’s Guide...
  • Page 160 Select Settings…to open the Pop-up Blocker Settings screen. Figure 83 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. NWA1100-N User’s Guide...
  • Page 161 Figure 84 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed. NWA1100-N User’s Guide...
  • Page 162 Figure 85 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default). NWA1100-N User’s Guide...
  • Page 163 Figure 86 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. NWA1100-N User’s Guide...
  • Page 164 Click OK to close the window. Figure 87 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. NWA1100-N User’s Guide...
  • Page 165 Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the screen that appears. Figure 89 Mozilla Firefox: TOOLS > Options NWA1100-N User’s Guide...
  • Page 166 Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 90 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly. NWA1100-N User’s Guide...
  • Page 167 Figure 91 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the left- side menu. Select the check boxes as shown in the following screen. Figure 92 Opera: Enabling Java NWA1100-N User’s Guide...
  • Page 168 Appendix B Pop-up Windows, JavaScript and Java Permissions To customize JavaScript behavior in the Opera browser, click JavaScript Options. Figure 93 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply. NWA1100-N User’s Guide...
  • Page 169: Appendix C Ip Addresses And Subnetting

    192.168.1.1). Each of these four parts is known as an octet. An octet is an eight-digit binary number (for example 11000000, which is 192 in decimal notation). Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal. NWA1100-N User’s Guide...
  • Page 170 Host ID 00000010 By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. NWA1100-N User’s Guide...
  • Page 171 This is usually specified by writing a “/” followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. NWA1100-N User’s Guide...
  • Page 172 You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub- networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25. NWA1100-N User’s Guide...
  • Page 173 Table 49 Subnet 1 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE IP Address (Decimal) 192.168.1. IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 NWA1100-N User’s Guide...
  • Page 174 11111111.11111111.11111111. 11000000 Subnet Address: Lowest Host ID: 192.168.1.193 192.168.1.192 Broadcast Address: Highest Host ID: 192.168.1.254 192.168.1.255 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). NWA1100-N User’s Guide...
  • Page 175 NO. SUBNETS HOST BITS SUBNET 255.255.128.0 (/17) 32766 255.255.192.0 (/18) 16382 255.255.224.0 (/19) 8190 255.255.240.0 (/20) 4094 255.255.248.0 (/21) 2046 255.255.252.0 (/22) 1022 255.255.254.0 (/23) 255.255.255.0 (/24) 255.255.255.128 (/25) 255.255.255.192 (/26) 1024 255.255.255.224 (/27) 2048 255.255.255.240 (/28) 4096 NWA1100-N User’s Guide...
  • Page 176 Regardless of your particular situation, do not create an arbitrary IP address; always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466, Guidelines for Management of IP Address Space. NWA1100-N User’s Guide...
  • Page 177: Appendix D Wireless Lans

    (AP). Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless client A and B can access the wired network and communicate with each other. When Intra-BSS is NWA1100-N User’s Guide...
  • Page 178 APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN. The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate neighborhood. NWA1100-N User’s Guide...
  • Page 179 A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node. Both stations (STA) are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they NWA1100-N User’s Guide...
  • Page 180 AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. NWA1100-N User’s Guide...
  • Page 181 Wireless security is vital to your network to protect wireless communication between wireless clients, access points and the wired network. Wireless security methods available on the NWA are data encryption, wireless client authentication, restricting access by device MAC address and hiding the NWA identity. NWA1100-N User’s Guide...
  • Page 182 • Authentication Determines the identity of the users. • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. NWA1100-N User’s Guide...
  • Page 183 For EAP-TLS authentication type, you must first have a wired connection to the network and obtain the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs) can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner. NWA1100-N User’s Guide...
  • Page 184 The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. NWA1100-N User’s Guide...
  • Page 185 Cipher block chaining Message authentication code Protocol (CCMP). TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server. AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit mathematical algorithm NWA1100-N User’s Guide...
  • Page 186 WPA. At the time of writing, the most widely available supplicant is the WPA patch for Windows XP, Funk Software's Odyssey client. The Windows XP patch is a free download that adds WPA capability to Windows XP's built-in "Zero Configuration" wireless client. However, you must run Windows XP to use it. NWA1100-N User’s Guide...
  • Page 187 The AP checks each wireless client's password and allows it to join the network only if the password matches. The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over the network, but is derived from the PSK and the SSID. NWA1100-N User’s Guide...
  • Page 188: Security Parameters Summary

    An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. NWA1100-N User’s Guide...
  • Page 189 For omni-directional antennas mounted on a table, desk, and so on, point the antenna up. For omni-directional antennas mounted on a wall or ceiling, point the antenna down. For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. NWA1100-N User’s Guide...
  • Page 190 Appendix D Wireless LANs For directional antennas, point the antenna in the direction of the desired coverage area. NWA1100-N User’s Guide...
  • Page 191: Appendix E Text File Based Auto Configuration

    Note: If adjacent APs use the same configuration file, you should leave out the channel setting since they could interfere with each other’s wireless traffic. Configuration Via SNMP You can configure and trigger the auto configuration remotely via SNMP. NWA1100-N User’s Guide...
  • Page 192 If you have any difficulties with the configuration file upload, you can try using the following MIB 10 to 20 seconds after using SNMP to have the AP download the configuration file. Table 62 Displaying the File Version ITEM OBJECT ID DESCRIPTION pwTftpOpStatus 1.3.6.1.4.1.890.1.9.1.6 This displays the current operating status of the TFTP client. NWA1100-N User’s Guide...
  • Page 193: Appendix F Open Software Announcements

    Open Software Announcements End-User License Agreement for "NWA1100-N WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
  • Page 194 IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION, THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. NWA1100-N User’s Guide...
  • Page 195 ZyXEL. Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the NWA1100-N User’s Guide...
  • Page 196 No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes Busybox, hostapd, wpa_supplicant, ntpclient, vsftpd, Linux Kernel and u-boot software under GPL 2.0 license.
  • Page 197 Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. NWA1100-N User’s Guide...
  • Page 198 NWA1100-N User’s Guide...
  • Page 199 "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. NWA1100-N User’s Guide...
  • Page 200 Various copyrights apply to this package, listed in various separate parts below. Please make sure that you read all the parts. ---- Part 1: CMU/UCD copyright notice: (BSD like) ----- Copyright 1989, 1991, 1992 by Carnegie Mellon University NWA1100-N User’s Guide...
  • Page 201 CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. ---- Part 2: Networks Associates Technology, Inc copyright notice (BSD) ----- Copyright (c) 2001-2003, Networks Associates Technology, Inc All rights reserved. NWA1100-N User’s Guide...
  • Page 202 OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. NWA1100-N User’s Guide...
  • Page 203 CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE NWA1100-N User’s Guide...
  • Page 204 * Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to endorse or promote NWA1100-N User’s Guide...
  • Page 205 * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the NWA1100-N User’s Guide...
  • Page 206 Center of Beijing University of Posts and Telecommunications. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, NWA1100-N User’s Guide...
  • Page 207 OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 7: Fabasoft R&D Software GmbH & Co KG copyright notice (BSD) ----- Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003 oss@fabasoft.com Author: Bernhard Penz <bernhard.penz@fabasoft.com> NWA1100-N User’s Guide...
  • Page 208 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ---- Part 8: Apple Inc. copyright notice (BSD) ----- NWA1100-N User’s Guide...
  • Page 209 USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF NWA1100-N User’s Guide...
  • Page 210 LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, NWA1100-N User’s Guide...
  • Page 211 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL STEPHEN BLACKHEATH BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES NWA1100-N User’s Guide...
  • Page 212 Foundation, but the instance of code that it refers to (the U-Boot source code) is copyrighted by me and others who actually wrote it. -- Wolfgang Denk ============================================================= ========== GNU GENERAL PUBLIC LICENSE Version 2, June 1991 NWA1100-N User’s Guide...
  • Page 213 To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you NWA1100-N User’s Guide...
  • Page 214 To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. NWA1100-N User’s Guide...
  • Page 215 License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. NWA1100-N User’s Guide...
  • Page 216 License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) NWA1100-N User’s Guide...
  • Page 217 Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, NWA1100-N User’s Guide...
  • Page 218 If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as NWA1100-N User’s Guide...
  • Page 219 Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. NWA1100-N User’s Guide...
  • Page 220 NWA1100-N User’s Guide...
  • Page 221 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes NWA1100-N User’s Guide...
  • Page 222 YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS NWA1100-N User’s Guide...
  • Page 223: Appendix G Customer Support

    • Brief description of the problem and the steps you took to solve it. Corporate Headquarters (Worldwide) Taiwan • ZyXEL Communications Corporation • http://www.zyxel.com Asia China • ZyXEL Communications (Shanghai) Corp. ZyXEL Communications (Beijing) Corp. ZyXEL Communications (Tianjin) Corp. • http://www.zyxel.cn India • ZyXEL Technology India Pvt Ltd • http://www.zyxel.in Kazakhstan •...
  • Page 224 • ZyXEL Singapore Pte Ltd. • http://www.zyxel.com.sg Taiwan • ZyXEL Communications Corporation • http://www.zyxel.com Thailand • ZyXEL Thailand Co., Ltd • http://www.zyxel.co.th Vietnam • ZyXEL Communications Corporation-Vietnam Office • http://www.zyxel.com/vn/vi Europe Austria • ZyXEL Deutschland GmbH • http://www.zyxel.de Belarus • ZyXEL BY • http://www.zyxel.by...
  • Page 225 Appendix G Customer Support Belgium • ZyXEL Communications B.V. • http://www.zyxel.com/be/nl/ Bulgaria • ZyXEL България • http://www.zyxel.com/bg/bg/ Czech • ZyXEL Communications Czech s.r.o • http://www.zyxel.cz Denmark • ZyXEL Communications A/S • http://www.zyxel.dk Estonia • ZyXEL Estonia • http://www.zyxel.com/ee/et/ Finland • ZyXEL Communications •...
  • Page 226 • ZyXEL Communications Poland • http://www.zyxel.pl Romania • ZyXEL Romania • http://www.zyxel.com/ro/ro Russia • ZyXEL Russia • http://www.zyxel.ru Slovakia • ZyXEL Communications Czech s.r.o. organizacna zlozka • http://www.zyxel.sk Spain • ZyXEL Spain • http://www.zyxel.es Sweden • ZyXEL Communications • http://www.zyxel.se Switzerland •...
  • Page 227 • http://www.zyxel.com/ec/es/ Ecuador • ZyXEL Communication Corporation • http://www.zyxel.com/ec/es/ Middle East Egypt • ZyXEL Communication Corporation • http://www.zyxel.com/homepage.shtml Middle East • ZyXEL Communication Corporation • http://www.zyxel.com/homepage.shtml North America • ZyXEL Communications, Inc. - North America Headquarters • http://www.us.zyxel.com/ NWA1100-N User’s Guide...
  • Page 228 Appendix G Customer Support Oceania Australia • ZyXEL Communications Corporation • http://www.zyxel.com/au/en/ Africa South Africa • Nology (Pty) Ltd. • http://www.zyxel.co.za NWA1100-N User’s Guide...
  • Page 229: Appendix H Legal Information

    The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 230 Por medio de la presente ZyXEL declara que el equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. [Greek] ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ ZyXEL ΔΗΛΩΝΕΙ ΟΤΙ εξοπλισμός ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕC. NWA1100-N User’s Guide...
  • Page 231 Indoor and Outdoor (EIRP) (mW) 2400-2483.5 5150-5350 5470-5725 1000 Belgium The Belgian Institute for Postal Services and Telecommunications (BIPT) must be notified of any outdoor wireless link having a range exceeding 300 meters. Please check http://www.bipt.be for more details. NWA1100-N User’s Guide...
  • Page 232 2. The regulatory limits for maximum output power are specified in EIRP. The EIRP level (in dBm) of a device can be calculated by adding the gain of the antenna used(specified in dBi) to the output power available at the connector (specified in dBm). NWA1100-N User’s Guide...
  • Page 233: Safety Warnings

    Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately. NWA1100-N User’s Guide...
  • Page 234 Lo smaltimento abusivo del prodotto da parte del detentore comporta l’applicazione delle sanzioni amministrative previste dalla normativa vigente." Environmental Product Declaration NWA1100-N User’s Guide...
  • Page 235: Index

    Index Index Numbers 802.1x-Only Basic Service Set see BSS 802.1x-Static128 Basic Service Set, See BSS 802.1x-Static64 beacon Beacon Interval 52, 63 Bridge Bridge loops Bridge Protocol Data Units (BPDUs) Access Point 12, 38 access privileges 16, 49, 177 Accounting Server Advanced Encryption Standard See AES.
  • Page 236 Index CTS (Clear to Send) restrictions customer support Generic Token Card Date and time start disclaimer Guide Distribution System Quick Start documentation related Domain Name Server (DNS) hidden node DTIM Interval 52, 63 dynamic WEP key exchange IANA 92, 176 IBSS IEEE 802.11g EAP Authentication...
  • Page 237 Index Channel Usage Configuration F/W Upload jitter Restart Restore Management Information Base (MIB) managing the device using Telnet. See command interface. using the command interface. See command 73, 75, 80 interface. max age MBSSID Media Access Control Message Integrity Check (MIC) latency message relay LEAP...
  • Page 238 Index PFX PKCS#12 remote management Preamble remote management limitations preamble mode Roaming Preamble Type root bridge 52, 56, 60, 63 Pre-Shared Key RTS (Request To Send) threshold priorities 179, 180 RTS/CTS Threshold Private-Public Certificates 52, 56, 60, 63, 65 product registration Protected Extensible Authentication Protocol 73, 186 Security Mode, Choosing the...
  • Page 239 Index Poll Interval Internet Refresh Interval Retry Count Web Configurator Statistics TTLS System Resources Tunneled Transport Layer Security system statistics Tutorial WLAN Type of Service STP - how it works STP path costs STP port states STP terminology User Authentication Subnet Subnet Mask 90, 95, 170...
  • Page 240 Index Wireless Client user authentication vs WPA2-PSK Wireless Security wireless client supplicant how to improve with RADIUS application example Levels WPA2-MIX wireless security 16, 181 WPA2-Pre-Shared Key Wireless Security Screen 802.1x Only WPA2-PSK 185, 186 Access Point application example 76, 78 Wireless Client WPA2-PSK-MIX 77, 79...

Table of Contents