Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Wireless Access Point
NXC-8160
ZyXEL Communications NXC-8160 Manuals
Manuals and User Guides for ZyXEL Communications NXC-8160. We have
5
ZyXEL Communications NXC-8160 manuals available for free PDF download: User Manual, Quick Start Manual, Specifications, Release Note
ZyXEL Communications NXC-8160 User Manual (205 pages)
Business WLAN Controller
Brand:
ZyXEL Communications
| Category:
Controller
| Size: 5 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
15
List of Tables
19
Introduction
21
PART I Introduction
21
Chapter 1 Getting to Know Your NXC-8160
23
Applications of the NXC-8160
23
NXC-8160 Overview
23
Wireless Internet Access
23
Captive Portal Security
24
Figure 1 Wireless Internet Access
24
Figure 2 Captive Portal
24
Figure 3 Backup NXC-8160
25
Front Panel Leds (Lights)
26
Good Habits for Managing the NXC-8160
26
Backup NXC-8160
25
Ways to Manage the NXC-8160
25
Figure 4 Front Panel
26
Table 1 Front Panel Leds (Lights)
26
Chapter 2 Introducing the Web Configurator
27
Accessing the NXC-8160 Web Configurator
27
Overview
27
Saving Changes
27
Figure 5 Status Screen
28
Figure 6 Web Configurator Status Screen
29
Figure 7 the Navigation Panel
30
Table 4 Navigation Panel Summary
30
About Screen
31
Table 3 Web Configurator Status Screen
29
Navigation Panel
30
Main Window
28
Navigating the NXC-8160 Web Configurator
28
Table 2 Title Bar: Web Configurator Icon
28
Title Bar
28
Status Screen
29
Figure 8 Web Configurator about Screen
31
Table 5 Web Configurator about Screen
31
Part II: LAN and WAN Settings
33
LAN Settings
35
Overview
35
What You Can Do in this Chapter
35
What You Need to Know
35
Table 6 LAN
37
Figure 12 LAN > Wireless Subnets
39
Table 7 LAN > Wireless Subnets
39
Figure 11 VLAN Application Example
38
Technical Reference
39
The Wireless Subnets Screen
39
WLAN Settings
41
Figure 13 Multiple Essids Example
44
Figure 14 WLAN > ESSID Definition > ESSID Settings
44
Table 8 WLAN > ESSID Definition > ESSID Settings
45
About ESSID Security Settings
47
Figure 15 Security: None
49
Table 11 SSID & Security: None
49
Figure 16 Security: WEP64/WEP128
50
Table 12 Security: WEP64/WEP128
50
Figure 17 Security: Static WEP + IEEE 802.1X Authentication
51
Table 13 Security: Static WEP + IEEE 802.1X Authentication
51
Figure 18 Security: WPA-Personal/Wpa2-Personal
52
Figure 19 Security: WPA-Enterprise/Wpa2-Enterprise
53
Figure 20 WLAN > ESSID Definition > SSID Table
54
Table 15 Security: WPA-Enterprise/Wpa2-Enterprise
54
Figure 21 WLAN > ESSID Definition > MAC ACL
55
Table 16 WLAN > ESSID Definition > SSID Table
55
The MAC ACL Screen
55
Figure 22 WLAN > ESSID Definition > RADIUS
56
Table 17 WLAN > ESSID Definition > MAC ACL
56
The RADIUS Screen
56
Table 18 WLAN > ESSID Definition > RADIUS
57
The WMM Screen
57
Figure 23 WLAN > ESSID Definition > WMM
58
Figure 24 WLAN > Radios
59
Table 20 WLAN > Radios
60
Technical Reference
61
The Assignments Screen
61
Table 9 Security Modes
47
Table 10 Types of Encryption for each Type of Authentication
48
Configuring ESSID Security Settings
49
Table 19 WLAN > ESSID Definition > WMM
58
The Radios Screen
59
Table 14 Security: WPA-Personal/Wpa2-Personal
53
Renaming Essids
54
LAN and WAN Settings
33
Chapter 3 LAN Settings
35
Figure 9 LAN and WAN
35
Before You Begin
36
Figure 10 LAN Settings
36
The LAN Screen
36
Vlan
37
Figure 25 WLAN > Assignments
61
Table 21 WLAN > Assignments
61
Figure 26 Example of a Wireless Network
62
Chapter 4 WLAN Settings
41
Overview
41
What You Can Do in this Chapter
41
What You Need to Know
41
The ESSID Settings Screen
43
Access Points and System Tools
63
Part III: Access Points and System Tools
63
Access Points
65
System Tools
67
Figure 28 System Tools > Apply
68
Figure 29 System Tools > Reboot
68
Table 23 System Tools > Apply
68
Figure 30 System Tools > Maintenance
69
Figure 31 System Tools > Time & Date
70
Table 26 System Tools > Time & Date
70
Figure 32 System Tools > Passwords
71
Table 27 System Tools > Passwords
71
The Passwords Screen
71
The Upgrade Screen
72
Table 25 System Tools > Maintenance
69
The Time & Date Screen
70
Table 24 System Tools > Reboot
68
The Maintenance Screen
69
Chapter 5 Access Points
65
Figure 27 Access Points
65
Overview
65
The Access Points Screen
65
What You Can Do in this Chapter
65
What You Need to Know
65
Table 22 Access Points
66
Chapter 6 System Tools
67
NXC-8160 User's Guide
67
Overview
67
What You Can Do in this Chapter
67
What You Need to Know
67
The Apply Screen
68
The Reboot Screen
68
Figure 33 System Tools > Upgrade
72
Table 28 System Tools > Upgrade
72
Part IV: Advanced Settings, Events and Reports
73
Advanced Settings
75
Table 35 Advanced > Centralized Configuration (Master)
84
The IDS Screen
85
Advanced Settings, Events and Reports
73
Chapter 7 Advanced Settings
75
Overview
75
What You Can Do in this Chapter
75
What You Need to Know
75
Figure 34 Primary NXC-8160 Example
76
Network Redundancy
76
Figure 35 Backup NXC-8160 Example
77
Configuring the Redunancy Screen
78
Figure 36 Advanced > Redundancy
78
Figure 37 Advanced > Syslog & Monitor
79
Table 30 Advanced > Syslog & Monitor
79
Figure 38 SNMP Management Model
80
Configuring SNMP
81
Figure 39 Advanced > SNMP
81
Table 31 Advanced > SNMP
81
Table 32 SNMP Traps
81
Table 33 Zyxel Centralized Configuration Specifications
82
The Centralized Configuration Screen
82
Figure 40 Advanced > Centralized Configuration (Member Device)
83
Figure 41 Advanced > Centralized Configuration (Master Controller)
83
Table 34 Advanced > Centralized Configuration (Member)
83
Figure 42 Advanced > IDS
85
Table 36 Advanced > IDS
85
The Portal Screen
86
Figure 43 Advanced > Portal
87
Figure 44 Advanced > Others
92
Table 38 Advanced > Others
92
Figure 45 Centralized Configuration Example
93
Figure 46 SSH Communication over the WAN Example
93
Technical Reference
93
Figure 47 How SSH Works
94
Chapter 8 Events & Reports
95
Table 29 Advanced > Redundancy
78
The Syslog & Monitor Screen
79
The SNMP Screen
80
Table 37 Advanced > Portal
88
Custom Web
91
The Others Screen
92
Events & Reports
95
Figure 48 Events & Reports > Events Log
95
Table 39 Events & Logs > Events Log
96
Table 40 Events & Logs > Severity Indicators
96
Figure 49 Events & Reports > Events Log History
98
Table 42 Events & Logs > Events Log History
98
The Reports Screen
99
Overview
95
The Events Log Screen
95
What You Can Do in this Chapter
95
Table 41 Events & Logs > Severity Indicators
96
The Events Log History Screen
98
Figure 50 Events & Reports > Events Log History
99
Table 43 Events & Logs > Events Log History
99
Troubleshooting and Specifications
101
Part V: Troubleshooting and Specifications
101
Chapter 9 Troubleshooting
103
Power, Hardware Connections, and Leds
103
Troubleshooting
103
NXC-8160 Access and Login
104
Internet Access
106
Chapter 10
107
Product Specifications
107
Table 44 Hardware Specifications
107
Table 45 Firmware Specifications
107
Figure 51 Console Cable DB-9 End Pin Layout
108
Table 46 Console Port Pin Assignments
108
Table 47 Ethernet Cable Pin Assignments
108
Part VI: Appendices and Index
111
Appendices and Index
111
Appendix A Setting up Your Computer's IP Address
113
Figure 52 Windows XP: Start Menu
114
Figure 53 Windows XP: Control Panel
114
Figure 54 Windows XP: Control Panel > Network Connections > Properties
115
Figure 55 Windows XP: Local Area Connection Properties
115
Figure 56 Windows XP: Internet Protocol (TCP/IP) Properties
116
Figure 57 Windows Vista: Start Menu
117
Figure 58 Windows Vista: Control Panel
117
Figure 59 Windows Vista: Network and Internet
117
Figure 60 Windows Vista: Network and Sharing Center
118
Figure 61 Windows Vista: Network and Sharing Center
118
Figure 62 Windows Vista: Local Area Connection Properties
119
Figure 63 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
120
Figure 64 Mac os X 10.4: Apple Menu
121
Figure 65 Mac os X 10.4: System Preferences
121
Figure 66 Mac os X 10.4: Network Preferences
122
Figure 67 Mac os X 10.4: Network Preferences > TCP/IP Tab
122
Figure 68 Mac os X 10.4: Network Preferences > Ethernet
123
Figure 69 Mac os X 10.4: Network Utility
123
Figure 70 Mac os X 10.5: Apple Menu
124
Figure 71 Mac os X 10.5: Systems Preferences
124
Figure 72 Mac os X 10.5: Network Preferences > Ethernet
125
Figure 73 Mac os X 10.5: Network Preferences > Ethernet
126
Figure 74 Mac os X 10.5: Network Utility
126
Figure 75 Ubuntu 8: System > Administration Menu
127
Figure 76 Ubuntu 8: Network Settings > Connections
127
Figure 77 Ubuntu 8: Administrator Account Authentication
128
Figure 78 Ubuntu 8: Network Settings > Connections
128
Figure 79 Ubuntu 8: Network Settings > Properties
129
Figure 80 Ubuntu 8: Network Settings > DNS
129
Figure 81 Ubuntu 8: Network Tools
130
Figure 82 Opensuse 10.3: K Menu > Computer Menu
131
Figure 83 Opensuse 10.3: K Menu > Computer Menu
131
Figure 84 Opensuse 10.3: Yast Control Center
132
Figure 85 Opensuse 10.3: Network Settings
132
Figure 86 Opensuse 10.3: Network Card Setup
133
Figure 87 Opensuse 10.3: Network Settings
134
Figure 88 Opensuse 10.3: Knetwork Manager
135
Figure 89 Opensuse: Connection Status - Knetwork Manager
135
Appendix B Importing Certificates
137
Figure 90 Internet Explorer 7: Certification Error
138
Figure 91 Internet Explorer 7: Certification Error
138
Figure 92 Internet Explorer 7: Certificate Error
138
Figure 93 Internet Explorer 7: Certificate
139
Figure 94 Internet Explorer 7: Certificate Import Wizard
139
Figure 95 Internet Explorer 7: Certificate Import Wizard
140
Figure 96 Internet Explorer 7: Certificate Import Wizard
140
Figure 97 Internet Explorer 7: Select Certificate Store
140
Figure 98 Internet Explorer 7: Certificate Import Wizard
141
Figure 99 Internet Explorer 7: Security Warning
141
Figure 100 Internet Explorer 7: Certificate Import Wizard
142
Figure 101 Internet Explorer 7: Website Identification
142
Figure 102 Internet Explorer 7: Public Key Certificate File
143
Figure 103 Internet Explorer 7: Open File - Security Warning
143
Figure 104 Internet Explorer 7: Tools Menu
144
Figure 105 Internet Explorer 7: Internet Options
144
Figure 106 Internet Explorer 7: Certificates
145
Figure 107 Internet Explorer 7: Certificates
145
Figure 108 Internet Explorer 7: Root Certificate Store
145
Figure 109 Firefox 2: Website Certified by an Unknown Authority
146
Figure 110 Firefox 2: Page Info
146
Figure 111 Firefox 2: Tools Menu
147
Figure 112 Firefox 2: Options
147
Figure 113 Firefox 2: Certificate Manager
148
Figure 114 Firefox 2: Select File
148
Figure 115 Firefox 2: Tools Menu
149
Figure 116 Firefox 2: Options
149
Figure 117 Firefox 2: Certificate Manager
150
Figure 118 Firefox 2: Delete Web Site Certificates
150
Figure 119 Opera 9: Certificate Signer Not Found
151
Figure 120 Opera 9: Security Information
151
Figure 121 Opera 9: Tools Menu
152
Figure 122 Opera 9: Preferences
152
Figure 123 Opera 9: Certificate Manager
153
Figure 124 Opera 9: Import Certificate
153
Figure 125 Opera 9: Install Authority Certificate
154
Figure 126 Opera 9: Install Authority Certificate
154
Figure 127 Opera 9: Tools Menu
155
Figure 128 Opera 9: Preferences
155
Figure 129 Opera 9: Certificate Manager
156
Figure 130 Konqueror 3.5: Server Authentication
157
Figure 131 Konqueror 3.5: Server Authentication
157
Figure 132 Konqueror 3.5: KDE SSL Information
157
Figure 133 Konqueror 3.5: Public Key Certificate File
158
Figure 134 Konqueror 3.5: Certificate Import Result
158
Figure 135 Konqueror 3.5: Kleopatra
158
Figure 136 Konqueror 3.5: Settings Menu
159
Figure 137 Konqueror 3.5: Configure
159
Appendix C IP Addresses and Subnetting
161
Introduction to Ip Addresses
161
Figure 138 Network Number and Host ID
162
Table 48 IP Address Network Number and Host ID Example
162
Table 49 Subnet Masks
163
Table 50 Maximum Host Numbers
163
Table 51 Alternative Subnet Mask Notation
163
Figure 139 Subnetting Example: before Subnetting
164
Figure 140 Subnetting Example: after Subnetting
165
Table 52 Subnet 1
165
Table 53 Subnet 2
166
Table 54 Subnet 3
166
Table 55 Subnet 4
166
Table 56 Eight Subnets
166
Table 57 24-Bit Network Number Subnet Planning
167
Table 58 16-Bit Network Number Subnet Planning
167
Configuring Ip Addresses
168
Figure 141 Conflicting Computer IP Addresses Example
169
Figure 142 Conflicting Computer IP Addresses Example
169
Figure 143 Conflicting Computer and Router IP Addresses Example
170
Appendix D Pop-Up Windows, Javascripts and Java Permissions
171
Figure 144 Pop-Up Blocker
171
Figure 145 Internet Options: Privacy
172
Figure 146 Internet Options: Privacy
173
Figure 147 Pop-Up Blocker Settings
173
Figure 148 Internet Options: Security
174
Figure 149 Security Settings - Java Scripting
175
Figure 150 Security Settings - Java
175
Figure 151 Java (Sun)
176
Figure 152 Mozilla Firefox: Tools > Options
177
Figure 153 Mozilla Firefox Content Security
177
Appendix E Wireless Lans
179
Figure 154 Peer-To-Peer Communication in an Ad-Hoc Network
179
Figure 155 Basic Service Set
180
Figure 156 Infrastructure WLAN
181
Figure 157 RTS/CTS
182
Fragmentation Threshold
182
Table 59 IEEE 802.11G
183
Table 60 Wireless Security Levels
184
Types of Eap Authentication
185
Table 61 Comparison of EAP Authentication Types
187
Figure 158 WPA(2) with RADIUS Application Example
189
Figure 159 WPA(2)-PSK Authentication
190
Table 62 Wireless Security Relational Matrix
190
Antenna Characteristics
191
Types of Antennas for Wlan
191
Positioning Antennas
192
Appendix F Legal Information
193
Zyxel Limited Warranty
195
Appendix G Customer Support
197
Index
203
Advertisement
ZyXEL Communications NXC-8160 User Manual (160 pages)
Business WLAN Controller
Brand:
ZyXEL Communications
| Category:
Controller
| Size: 5 MB
Table of Contents
Contents Overview
9
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Table of Contents
11
List of Figures
15
List of Tables
19
Introduction
21
PART I Introduction
21
Chapter 1 Getting to Know Your NXC-8160
23
Application for the NXC-8160
23
Wireless Internet Access
23
Backup NXC-8160
24
Figure 1 Wireless Internet Access
24
Figure 2 Backup NXC-8160
24
NXC-8160 Overview
23
Figure 3 Front Panel
25
Front Panel Leds (Lights)
25
Good Habits for Managing the NXC-8160
25
Ways to Manage the NXC-8160
25
Table 1 Front Panel Leds (Lights)
26
Accessing the NXC-8160 Web Configurator
27
Chapter 2 Introducing the Web Configurator
27
Navigating the NXC-8160 Web Configurator
27
Title Bar
28
Main Window
28
Status Screen
28
Figure 4 Status Screen
28
Table 2 Title Bar: Web Configurator Icon
28
Figure 5 Web Configurator Status Screen
29
Table 3 Web Configurator Status Screen
29
Navigation Panel
30
About Screen
30
Table 4 Screens Summary
30
Figure 6 Web Configurator about Screen
31
Table 5 Web Configurator about Screen
31
Web Configurator Overview
27
Web Configurator
33
LAN Screen
35
Chapter 3 LAN Screen
35
Figure 7 LAN and WAN
35
Private IP Addresses
36
Management IP Addresses
36
IP Address and Subnet Mask
35
LAN and WAN
35
Vlan
37
VLAN Tagging
37
VLAN Application Example
37
Figure 8 VLAN Application Example
38
Lan
38
Figure 9 LAN
39
Table 6 LAN
39
Chapter 4 Centralized Configuration
41
Figure 10 Centralized Configuration Example
41
Introduction to Centralized Configuration
41
Ssh
41
Table 7 Zyxel Centralized Configuration Specifications
41
Figure 11 SSH Communication over the WAN Example
42
Figure 12 How SSH Works
42
How SSH Works
42
Centralized Configuration Screen
43
Figure 13 Centralized Configuration (Member)
43
SSH Implementation on the NXC-8160
43
Requirements for Using SSH
43
Figure 14 Centralized Configuration (Master)
44
Table 8 Centralized Configuration (Member)
44
Table 9 Centralized Configuration (Master)
44
Chapter 5 Wireless LAN
47
Wireless LAN Introduction
47
Figure 15 Example of a Wireless Network
47
Wireless Security Overview
48
Ssid
48
User Authentication
48
Encryption
49
Table 10 Types of Encryption for each Type of Authentication
49
Additional Installation Requirements for Using 802.1X
50
Introduction to RADIUS
50
Configuring WLAN
50
Figure 16 WLAN
51
Rename Ssids
53
Table 11 WLAN
53
Configuring Wireless Security
54
Figure 17 WLAN > SSID Table
54
Table 12 WLAN > SSID Table
54
Table 13 Security Modes
54
Figure 18 SSID & Security
55
Table 14 SSID & Security
55
No Security
56
Static WEP
57
Figure 19 SSID & Security: None
57
Table 15 SSID & Security: None
57
Figure 20 SSID & Security: WEP
58
Table 16 SSID & Security: WEP
58
Static WEP + IEEE 802.1X (LEAP)
59
Figure 21 SSID & Security: Static WEP + IEEE 802.1X (LEAP)
59
Table 17 SSID & Security: Static WEP + IEEE 802.1X (LEAP)
59
Wpa-Psk
60
Wpa
61
Figure 22 SSID & Security: WPA-PSK
61
Table 18 SSID & Security: WPA-PSK
61
Figure 23 SSID & Security: WPA
62
Table 19 SSID & Security: WPA
62
Wireless LAN
47
Advanced Screen
63
Chapter 6 Advanced Screen
63
Snmp
63
Figure 24 SNMP Management Model
63
SNMP Traps
64
Configuring the Advanced Screen
64
Table 20 SNMP Traps
64
Figure 25 Advanced
65
Table 21 Advanced
65
Chapter 7
67
Access Points Screen
67
Figure 26 Access Points
67
Table 22 Access Points
67
Chapter 8 Maintenance Screen
69
Maintenance Overview
69
Figure 27 Maintenance
69
Configuring Syslog & Monitor
70
Table 23 Access Points
70
Figure 28 Syslog & Monitor
71
Table 24 Syslog & Monitor
71
Maintenance Screen
69
Chapter 9 Password
73
Configuring Password
73
Figure 29 Password
73
Table 25 Password
73
Password
73
Troubleshooting and Specifications
75
Part III: Troubleshooting and Specifications
75
Chapter 10 Troubleshooting
77
Power, Hardware Connections, and Leds
77
NXC-8160 Access and Login
78
Internet Access
79
Chapter 11
81
Product Specifications
81
Table 26 Hardware Specifications
81
Table 27 Firmware Specifications
81
Figure 30 Console Cable DB-9 End Pin Layout
82
Table 28 Console Port Pin Assignments
82
Table 29 Ethernet Cable Pin Assignments
82
Appendices and Index
85
Part IV: Appendices and Index
85
Appendix A Setting up Your Computer's IP Address
87
Figure 31 Windows 95/98/Me: Network: Configuration
88
Installing Components
88
Figure 32 Windows 95/98/Me: TCP/IP Properties: IP Address
89
Figure 33 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
90
Verifying Settings
90
Figure 34 Windows XP: Start Menu
91
Figure 35 Windows XP: Control Panel
91
Figure 36 Windows XP: Control Panel: Network Connections: Properties
92
Figure 37 Windows XP: Local Area Connection Properties
92
Figure 38 Windows XP: Internet Protocol (TCP/IP) Properties
93
Figure 39 Windows XP: Advanced TCP/IP Properties
94
Figure 40 Windows XP: Internet Protocol (TCP/IP) Properties
95
Windows Vista
95
Figure 41 Windows Vista: Start Menu
96
Figure 42 Windows Vista: Control Panel
96
Figure 43 Windows Vista: Network and Internet
96
Figure 44 Windows Vista: Network and Sharing Center
96
Figure 45 Windows Vista: Network and Sharing Center
97
Figure 46 Windows Vista: Local Area Connection Properties
97
Figure 47 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
98
Figure 48 Windows Vista: Advanced TCP/IP Properties
99
Figure 49 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
100
Figure 50 Macintosh os 8/9: Apple Menu
101
Figure 51 Macintosh os 8/9: TCP/IP
101
Figure 52 Macintosh os X: Apple Menu
102
Macintosh os X
102
Figure 53 Macintosh os X: Network
103
Figure 54 Red hat 9.0: KDE: Network Configuration: Devices
104
Figure 55 Red hat 9.0: KDE: Ethernet Device: General
104
Figure 56 Red hat 9.0: KDE: Network Configuration: DNS
105
Figure 57 Red hat 9.0: KDE: Network Configuration: Activate
105
Using Configuration Files
105
Figure 58 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
106
Figure 59 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
106
Figure 60 Red hat 9.0: DNS Settings in Resolv.conf
106
Figure 61 Red hat 9.0: Restart Ethernet Card
106
Figure 62 Red hat 9.0: Checking TCP/IP Properties
107
Appendix B IP Addresses and Subnetting
109
Introduction to Ip Addresses
109
Figure 63 Network Number and Host ID
110
Table 30 IP Address Network Number and Host ID Example
110
Subnet Masks
110
Table 31 Subnet Masks
111
Table 32 Maximum Host Numbers
111
Table 33 Alternative Subnet Mask Notation
111
Figure 64 Subnetting Example: before Subnetting
112
Figure 65 Subnetting Example: after Subnetting
113
Table 34 Subnet 1
113
Table 35 Subnet 2
114
Table 36 Subnet 3
114
Table 37 Subnet 4
114
Table 38 Eight Subnets
114
Table 39 24-Bit Network Number Subnet Planning
115
Table 40 16-Bit Network Number Subnet Planning
115
Figure 66 Conflicting Computer IP Addresses Example
117
Figure 67 Conflicting Computer IP Addresses Example
117
Figure 68 Conflicting Computer and Router IP Addresses Example
118
Appendix C Pop-Up Windows, Javascripts and Java Permissions
119
Figure 69 Pop-Up Blocker
119
Internet Explorer Pop-Up Blockers
119
Figure 70 Internet Options: Privacy
120
Figure 71 Internet Options: Privacy
121
Figure 72 Pop-Up Blocker Settings
121
Figure 73 Internet Options: Security
122
Figure 74 Security Settings - Java Scripting
123
Figure 75 Security Settings - Java
123
Java Permissions
123
Figure 76 Java (Sun)
124
Figure 77 Mozilla Firefox: Tools > Options
125
Figure 78 Mozilla Firefox Content Security
125
Appendix D Wireless Lans
127
Figure 79 Peer-To-Peer Communication in an Ad-Hoc Network
127
Wireless Lan Topologies
127
Figure 80 Basic Service Set
128
Figure 81 Infrastructure WLAN
129
Fragmentation Threshold
130
Table 41 IEEE 802.11G
131
Preamble Type
131
Table 42 Wireless Security Levels
132
Types of Radius Messages
133
Types of Eap Authentication
133
Table 43 Comparison of EAP Authentication Types
135
Dynamic Wep Key Exchange
135
Wpa and Wpa2
135
Wireless Client Wpa Supplicants
137
Wpa with Radius Application Example
137
Table 44 Wireless Security Relational Matrix
138
Security Parameters Summary
138
Antenna Characteristics
139
Antenna Gain
139
Appendix E Legal Information
141
Zyxel Limited Warranty
143
Appendix F Customer Support
145
Index
151
ZyXEL Communications NXC-8160 Quick Start Manual (67 pages)
Business WLAN Controller
Brand:
ZyXEL Communications
| Category:
Controller
| Size: 1 MB
Table of Contents
Table of Contents
1
Quick Start Guide
1
English
2
Accessing the Web Configurator
4
Deutsch
8
Español
16
Français
24
Italiano
32
Русский
40
Svenska
48
简体中文
56
繁體中文
62
Advertisement
ZyXEL Communications NXC-8160 Release Note (4 pages)
Firmware Release Note Release V1.00
Brand:
ZyXEL Communications
| Category:
Controller
| Size: 0 MB
Table of Contents
Known Issues
2
Zyxel V1.00_Zt.0 Release Notes
2
New Features and Functionalities
2
Solved Issues and Limitations
2
Reported Issues and Solutions
2
Installation and Upgrade Notes
3
Downgrade Notes
3
Operation Notes
3
Known Limitations
3
Zyxel V1.00_Zt.0_B1 Release Notes
3
New Features and Functionalities
3
Solved Issues and Limitations
3
Reported Issues and Solutions
3
ZyXEL Communications NXC-8160 Specifications (4 pages)
802.11a/g Ultra-thin Wireless Business Access Point; Business Wireless LAN Controller
Brand:
ZyXEL Communications
| Category:
Wireless Access Point
| Size: 0 MB
Advertisement
Related Products
ZyXEL Communications NXC5200
ZyXEL Communications NWA-3160
ZyXEL Communications NWA-3500
ZyXEL Communications NWA3160-N
ZyXEL Communications NWA5560-N
ZyXEL Communications NWA5550-N
ZyXEL Communications nwa1100-n
ZyXEL Communications NWA5121-N
ZyXEL Communications NWA1100-NH
ZyXEL Communications NWA1123 Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL