Gebruiksaanwijzing /service van het product NWA3550 van de fabrikant ZyXEL Communications
Ga naar pagina of 344
www .zyxel.com NW A3550 IEEE 802.1 1a/b/g Outdoor WLAN Access Point User ’ s Guide V ersion 3.60 6/2008 Edition 2 DEFAULT LOGIN IP Address http://1 92 .
.
About This User's Guide NWA3550 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the ZyXEL Device using the web configurator . Y ou should have at leas t a basic knowledge of TCP/IP networking concepts and topology .
Document Conventions NWA3550 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide.
Document Conventions NWA3550 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the followi ng generic icons. The ZyXEL Device icon is not an exact representation of your device.
Safety Warnings NWA3550 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids.
Safety Warnings NWA3550 User’s Guide 7.
Safety Warnings NWA3550 User’s Guide 8.
Contents Overview NWA3550 User’s Guide 9 Contents Overview Introduction .......................................... ........................................................................ .......... 31 Introducing the ZyXEL Device ............... ..
Contents Overview NWA3550 User’s Guide 10.
Table of Contents NWA3550 User’s Guide 11 Table of Contents About This User's Guide ................................ ........................................................................ .. 3 Document Conventions.............................
Table of Contents NWA3550 User’s Guide 12 2.3 Navigating the Web Configurator ..................... ................ ................ ................. ................ ... 45 Chapter 3 St atus Screens ...................................... ........
Table of Contents NWA3550 User’s Guide 13 5.4.5 Configure the SERVER_2 Network ............... ................ ................ ................ ............. 79 5.4.6 Checking your Settings and T esting the Conf iguration .............. ..........
Table of Contents NWA3550 User’s Guide 14 7.7.3 AP+Bridge Mode .......... ................ ................. ................ ................ ................ ........... 106 7.7.4 MBSSID Mode .......................... ................ ...........
Table of Contents NWA3550 User’s Guide 15 10.5 Configuring Roaming ............... ................ ... ................ ............. ................ ................ ....... .1 3 7 10.5.1 Requirements fo r Roaming .. ............. ...............
Table of Contents NWA3550 User’s Guide 16 13.1 1.2 Configuring SNMP . ................ ............. ................ ................ ................. ................ . 165 13.1 1.2. 1 The SNMPv3 User Pr ofile Screen ................... .........
Table of Contents NWA3550 User’s Guide 17 17.2 Configuring VLAN .......... ...... ............. ................ ................. ................ ............. .............. ... 204 17.2.1 Wireless VLAN ........... .... ................ .........
Table of Contents NWA3550 User’s Guide 18 Appendix C Pop-up Windows, JavaScripts and Java Permissions ...................................... 283 Appendix D Importing Certificates .................................................. ...................
List of Figures NWA3550 User’s Guide 19 List of Figures Figure 1 Access Point Application ............ ....... ......... ............. ................. ................ ................ ... ............. 34 Figure 2 Bridge Application .............
List of Figure s NWA3550 User’s Guide 20 Figure 39 T utorial: Example Network .... .......... ...... ............. ................ ................ ................. ......... .......... 76 Figure 40 T utorial: SSID Profile .................... ...
List of Figures NWA3550 User’s Guide 21 Figure 82 ROGUE AP > Configuration ............ ................ ................ ................ ................ ................ .... . 148 Figure 83 ROGUE AP > Friendly AP ............... ..........
List of Figure s NWA3550 User’s Guide 22 Figure 125 S pecifying Windows-Group C ondition ..................... ................ ................ ................... ........ 2 12 Figure 126 Adding VLAN Group . .................... ............. ....
List of Figures NWA3550 User’s Guide 23 Figure 168 Mac OS X 10.4: Network Preferences > Et hernet ...... ................ ................ ................ ........ 255 Figure 169 Mac OS X 10.4: Network Utility ........ ... ............. ........
List of Figure s NWA3550 User’s Guide 24 Figure 21 1 Internet Explorer 7: Select Certificate S tore ............ ................ ................ ................ .......... .2 9 2 Figure 212 Internet Explorer 7: Certificate I mport Wizard ........
List of Figures NWA3550 User’s Guide 25 Figure 254 Subnetting Example: After Subnetting .................... ................ ................ ................ ........... 317 Figure 255 T ext File Based Auto Configuration ........ .................
List of Figure s NWA3550 User’s Guide 26.
List of Tables NWA3550 User’s Guide 27 List of Tables T able 1 The St atus Screen .......................... ................ ................ ................ ................ .......... ............. ... 47 T able 2 The Management Mode Screen ....
List of Tables NWA3550 User’s Guide 28 T able 39 WIR ELESS > MAC Filter .... ................ ................ ................ ................ ................. .......... ....... 135 T able 40 MAC Address Filter ....................... .......
List of Tables NWA3550 User’s Guide 29 T able 82 ZyXEL Device Compatible Antenna Cables .................... ................ ................ ................ ..... 240 T able 83 Power over Ethernet Injector S pecifications ................ .......
List of Tables NWA3550 User’s Guide 30.
31 P ART I Introduction Introducing the ZyXEL Device (33) Introducing the W eb Configurator (43) S tatus Screens (47) T utorial (55).
32.
NWA3550 User’s Guide 33 C HAPTER 1 Introducing the ZyXEL Device This chapter introduces the main applications and features of the ZyXEL Device. It also introduces the ways yo u can manage the ZyXEL Device.
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 34 1.2.1 Access Point The ZyXEL Device is an ideal access solution fo r wireless Internet connection. A typical Internet access application for your ZyX EL Device is shown as follows. Clients A , B and C can access the wired network through the ZyXEL Devices.
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 35 Figure 2 Bridge Application Figure 3 Repeater Application 1.2.3 AP + Bridge In AP+Bridge mode, the ZyXEL Device supports both AP and bridge connectio n at the same time. In the figure below , A and B use X as an AP to access the wired network, while X and Y communicate in bridge mode.
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 36 Figure 4 AP+Bridge Application 1.2.4 MBSSID A BSS (Basic Service Set) is the set of devices forming a single wireless network (usually an access point and one or more wireless clients). An SSID (Se rvice Set IDentifier) is the name of a BSS.
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 37 Figure 5 Multiple BSSs 1.2.5 Pre-Configured SSID Profiles The ZyXEL Device has two pre-configured SSID profiles.
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 38 Figure 6 Dual WLAN Ad aptors Examp le 1.3 CAPW AP The ZyXEL Device supports CAPW AP (Control And Provisioning of W ireless Access Points). This is ZyXEL ’ s implementation of the IETF’ s (Internet Engineering T ask Force) CAPW AP protocol.
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 39 Figure 7 CAPW AP Network Example 1.4 W ays to Manage the ZyXEL Device Use any of the following method s to manage the ZyXEL Device. • W eb Configurator . This is recommended fo r everyday management of the ZyXEL Device using a (s upported) we b browser .
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 40 • Change any default passwords on the ZyX EL Device, such as the password used for accessing the ZyXEL Device’ s web configurator (if it has a web configurator). Use a password with a combination of letters and nu mbers and change your password regularly .
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 41 " Y our ZyXEL Device has two wirele ss LAN adaptors, WLAN1 and WLAN2. WLAN1 uses the RF1 antenna and WLAN2 uses the RF2 antenna. If you connect only one antenna, you can use only the associated wireless LAN adaptor .
Chapter 1 Introducing the ZyXEL Device NWA3550 User’s Guide 42.
NWA3550 User’s Guide 43 C HAPTER 2 Introducing the Web Configurator This chapter describes how to access the ZyXEL Device’ s web configura tor and provides an overview of its screens.
Chapter 2 Introducing the Web Configur ator NWA3550 User’s Guide 44 Figure 8 Change Password Screen 6 Click Apply in the Replace Certificate screen to create a certificate using your ZyXEL Device’ s MAC address that will be specific to this device.
Chapter 2 Introducing the Web Configurator NWA3550 User’s Guide 45 2.2.1 Methods of Restoring Factory-Default s Y ou can erase the current configuration and rest ore factory defaults in the following ways: • Use the web configurator to restore defaults (refer to Chapter 18 on page 221 ).
Chapter 2 Introducing the Web Configur ator NWA3550 User’s Guide 46.
NWA3550 User’s Guide 47 C HAPTER 3 Status Screens The St a t u s screen displays wh en you log in to the ZyXEL Device, or click ST A TUS in the navigation menu. Use the St a t u s screens to look at the current status of the device, system resources, interface s and SSID status.
Chapter 3 Sta tus Screens NWA3550 User’s Guide 48 System Information System Name This field displays the ZyXE L Device system name. It is used for identification. Y ou can chan ge this in the System > General screen’s System Name field. Model This field displ ays the ZyXEL Device’s exact model name.
Chapter 3 Status Screens NWA3550 User’s Guide 49 S tatus This field indicate s whether or not the Z yXEL Device is using the interface. For each interface, this field displays Up when the ZyXEL Device is using the interface and Down when the ZyXEL Device is n ot using the interface.
Chapter 3 Sta tus Screens NWA3550 User’s Guide 50.
NWA3550 User’s Guide 51 C HAPTER 4 Management Mode This chapter discusses the MGNT MODE (Management Mode) screen. This screen determines whether the ZyXEL Device is used in its default, standalone mode, or as part of a CAPW AP (Control And Provisioning of W ireless Access Points) network.
Chapter 4 Manage ment Mode NWA3550 User’s Guide 52 4.1.1 CAPW AP Discovery and Management The link between CAPW AP-enabled access points proceeds as follows: 1 An AP in managed AP mo de joins a wired network (receives a dynamic IP address). 2 The AP sends out a management request, looking for an AP in CAPW AP AP controller mode.
Chapter 4 Manag ement Mode NWA3550 User’s Guide 53 Figure 13 CAPW AP and DHCP Option 43 4.1.4 Notes on CAPW AP This section lists some add itional features of ZyXEL ’ s implementation of the CAPW AP protocol.
Chapter 4 Manage ment Mode NWA3550 User’s Guide 54 The following table describes the labels in this screen. T able 2 The Management Mode Screen LABEL DESCRIPTION S tandalone AP Select this to manage the ZyXEL Device usi ng its own web configurator , neither managing nor managed by other devices.
NWA3550 User’s Guide 55 C HAPTER 5 Tutorial This chapter first provides an overview of ho w to configure the wireless LAN on your ZyXEL Device, and then gives step-by- step guidelines showing how to configure your ZyXEL Device for some example scenarios.
Chapter 5 Tutorial NWA3550 User’s Guide 56 5.1.1.1 Configuring Dual WLAN Adaptors The ZyXEL Device is equipped with dual wire less adaptors. This means you can configure two dif fe rent wireless networks to operate simultaneously . See Section 1.2.6 on pa ge 37 for details.
Chapter 5 T utorial NWA3550 User’s Guide 57 Figure 15 Configuring Wireless LAN S elect Operating Mode Access Point Bridge / Repeater Mo de. AP + Bridge Mode. MBSSID Mode. Select 802.1 1 Mode and Channel ID . Select SSID Configure SSID P rofile . Edit Security Pr ofile .
Chapter 5 Tutorial NWA3550 User’s Guide 58 5.1.3 Further Reading Use these links to find more information on the steps: • Choosing 802.1 1 Mode : see Section 7.7. 1 on page 98 . • Choosing a wireless Channel ID : see Section 7.7. 1 on page 98 . • Selecting and configuring SSID pr ofile (s): see Section 7.
Chapter 5 T utorial NWA3550 User’s Guide 59 Figure 16 T utorial: Example MBSSID Set up The standard network ( SSID04 ) has ac cess to all resources. The V oIP ne twork ( V oIP_SSID ) has access to a ll resources and a high Quality of Service (QoS) setting (see Chapter 7 on page 91 for information on QoS).
Chapter 5 Tutorial NWA3550 User’s Guide 60 Figure 17 T utorial: Wireless LAN: Before Select MBSSID from the Operating Mode drop-down list box. The screen displays as follows.
Chapter 5 T utorial NWA3550 User’s Guide 61 This Select SSID Pr ofile table allows you to activate or deactivate SSID profiles. Y our wireless network was previously using the SSID04 profile, so select SSID04 in on e of the Profile list b oxes (number 3 in this example).
Chapter 5 Tutorial NWA3550 User’s Guide 62 Figure 20 T utorial: V oIP SSID Profile Edit • Choose a new SSID for the V oIP network. In this example, enter V OIP_SSID_Example . Note that although the SSID chan ges, the SSID profile name ( V oIP_SSID ) remains the same as before.
Chapter 5 T utorial NWA3550 User’s Guide 63 Figure 21 T utorial: V oIP Sec urity Y ou already chose to use the security02 profile for this network, so select the radio button for security02 and click Edit .
Chapter 5 Tutorial NWA3550 User’s Guide 64 • Click Apply . The WIRELESS > Security screen displays. Ensure that the Prof ile Name for entry 2 displays “ Vo I P _ S e c u r i t y ” and that the Security Mode is WP A2-PSK . Figure 23 T utorial: V oIP Sec urity: Updated 5.
Chapter 5 T utorial NWA3550 User’s Guide 65 Figure 25 T utorial: Guest Edit • Choose a new SSID for the guest network. In this example, enter Guest_SSID_Example . Note that although the SSID chan ges, the SSID profile name ( Guest_SSID ) remains the same as before.
Chapter 5 Tutorial NWA3550 User’s Guide 66 • Select WP A-PSK in the Security Mode field. WP A-PSK provides strong security that is supported by most wireless clients. Even though your Guest_SSID clients d o not have access to sensitive information on the network, you should not leave the network without security .
Chapter 5 T utorial NWA3550 User’s Guide 67 Figure 29 T utorial: Layer 2 Isolation Profile Enter the MAC addresses and descriptions of the two network devices you want users on the guest network to be able to access: the main network router (00: AA:00:AA:00:AA) and the network printer (AA:00:AA:00:AA:00).
Chapter 5 Tutorial NWA3550 User’s Guide 68 Figure 30 T utorial: Activate G uest Profile Y our guest wireless network is now ready to use. 5.2.4 T esting the Wireless Networks T o make sure that the three networks ar e correctly configured, do the following.
Chapter 5 T utorial NWA3550 User’s Guide 69 Y our wireless network operates in an of fice bu ilding. It consists of four access points (all ZyXEL Devices) and a variable number of wireless clients.
Chapter 5 Tutorial NWA3550 User’s Guide 70 " The ZyXEL Device can detect the MA C addresses of APs automatically . However , it is more secure to obtai n the correct MAC addr esses from another source and add them to the friendly AP list ma nually .
Chapter 5 T utorial NWA3550 User’s Guide 71 2 Fill in the MAC Addr ess and Description fields as in the following table. Click Add after you enter the details of each AP to include it in the list.
Chapter 5 Tutorial NWA3550 User’s Guide 72 Figure 34 T utorial: Configurat ion 4 Click Export . If a window similar to th e following appears, click Save . Figure 35 T utorial: Warning 5 Save the friendly AP list somewhere it can be accessed by all the other access points on the network.
Chapter 5 T utorial NWA3550 User’s Guide 73 5.3.2 Activate Period ic Rogue AP Detection T ake the following steps to activ ate rogue AP detection on the first of your ZyXEL Devices. 1 In the ROGUE AP > Configuration screen, select Enable from the Rogue AP Period Detection field.
Chapter 5 Tutorial NWA3550 User’s Guide 74 Figure 38 T utorial: Log Settings • In this example, your mail server ’ s IP address is 192.1 68.1.25 . Enter this IP address in the Mail Server field. • Enter a subject line for the alert e-mails in the Mail Subject field.
Chapter 5 T utorial NWA3550 User’s Guide 75 Now you need to config ure the other wireless access points on your network to do the same things. For each access point, take the following steps. 1 From a computer on the wired network, ente r the access point’ s IP address and login to its W eb configurator .
Chapter 5 Tutorial NWA3550 User’s Guide 76 Y ou have tw o secure servers ( 1 and 2 in the following figure). W ireless user “Alice” ( A ) needs to access server 1 (but should not access server 2 ) and wireless user “Bob” ( B ) needs to access server 2 (but should not access server 1 ).
Chapter 5 T utorial NWA3550 User’s Guide 77 2 Configure the SER VER_1 network’ s MAC filter profile . 3 Configure the SER VER_1 network’ s layer-2 isolation profile. 4 Repeat steps 1 ~ 3 for the SER VER_2 network. 5 Check your settings and test the configuration.
Chapter 5 Tutorial NWA3550 User’s Guide 78 Figure 40 T utorial: SSID Profile 2 Select SER VER_1 ’ s entry and click Edit . The following screen displays. Figure 41 T utorial: SSID Edit Select l2Isolation03 in the L2 Isolatio n field, a nd select macf ilter03 in the MAC Filtering field.
Chapter 5 T utorial NWA3550 User’s Guide 79 Figure 42 T utorial: Layer-2 Isolation Edit Enter the network switch’ s MAC Address and add a Description (“NET_SWITCH” in this case) in Set 1 ’s e n t r y. Enter server 1’ s MAC Address and add a Description (“SER VER_1” in this case) in Set 2 ’s e n t r y.
Chapter 5 Tutorial NWA3550 User’s Guide 80 T o do this, repeat the procedure in Section 5.4.4 on page 77 , substituting the following information. 5.4.6 Checking your Settings and T esting the Configuration Use the following sections to ensure that yo ur wireless networks are set up correctly .
Chapter 5 T utorial NWA3550 User’s Guide 81 Figure 44 T utorial: SSID Profiles Activated 2 Next, click the SSID tab. Check that each configured SSID profile uses the correct Security , Layer -2 Is olation and MAC Filter profiles, as shown in the following figure.
Chapter 5 Tutorial NWA3550 User’s Guide 82 Attempt to access the Internet. Y o u should be able to do so. Attempt to access Server 2 . Y ou should be unable to do so.
83 P ART II The W eb Configurator System Screens (85) W ireless Config uration (91) W ireless Security Configuration (109) MBSSID and SSID (121) Other W ireless Configuration (129) IP Screen (141) Rog.
84.
NWA3550 User’s Guide 85 C HAPTER 6 System Screens 6.1 System Overview This section provides information on general system setup. 6.2 Configuring General Setup Click SYSTEM > General . Figure 46 System > General The following table describes the labels in this screen.
Chapter 6 System Screens NWA3550 User’s Guide 86 6.3 Administrator Authentication on RADIUS The administrator authentication on RADIUS fe ature lets a (external or internal) RADIUS server authenticate management logins t o the Zy XEL Device.
Chapter 6 S ystem Screen s NWA3550 User’s Guide 87 Figure 47 SYSTEM > Password. The following table describes the labels in this screen. Ta b l e 1 1 Password LABEL DESCRIPTIONS Enable Admin at Local Select this check box to have the de vice authenticate ma nagement l ogins to the device.
Chapter 6 System Screens NWA3550 User’s Guide 88 6.4 Configuring T ime Setting T o change your ZyX EL Device’ s time and date, click SYSTEM > T ime Setting . The screen appears as shown. Use this screen to configur e the ZyXEL Device’ s time based on yo ur local time zone.
Chapter 6 S ystem Screen s NWA3550 User’s Guide 89 The following table describes the labels in this screen. T able 12 SYSTEM > Time Setting LABEL DESCRIPTION Current T ime This field displays the time of your ZyXEL Device. Each time you reload this page, th e ZyXEL Device synchronizes the tim e with the time server (if configured).
Chapter 6 System Screens NWA3550 User’s Guide 90 6.5 Pre-defined NTP T ime Servers List When you turn on the ZyXEL De vice for the first time, the date and time start at 2000-01-01 00:00:00.
NWA3550 User’s Guide 91 C HAPTER 7 Wireless Configuration This chapter discusses how to configure the ZyXEL Device’ s Wire l es s screens. 7.1 Wireless Network Overview The following figure provides an exampl e of a wireless network. Figure 49 Example of a Wireless Network The wireless network is the part in the blue circle.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 92 Like radio stations or television channels, e ach wireless network uses a spec ific channel, or frequency , to send and receive information. • Every device in the same wireless networ k must use security compatible with the AP .
Chapter 7 Wireless Configuration NWA3550 User’s Guide 93 7.3.1.1 WMM QoS Priorities The following table describes the WMM QoS pr iority levels that the ZyXEL Device uses. 7.3.2 A TC Automatic T raffic Classifier (A TC) is a bandwidth management tool that prioritizes data packets sent across the network.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 94 Y ou should activate A TC on the ZyXEL Device if your wireless network includes netw orking devices that do no t support WMM QoS, or if you want to prioritize traf fic but do not want to configure WMM QoS settings.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 95 7.3.4 T ype Of Service (T oS) Network traffic can be classified by setting the T o S (T ype Of Service) values at the data source (for example, at the ZyXEL Device) so a server can decide the best method of delivery , that is the least cost, fastest route and so on.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 96 The following table lists which WMM QoS priori ty level the ZyXEL Device uses for specific DSCP values. 7.4 Sp anning T ree Protocol (STP) STP detects and breaks network loops and provide s backup links betw een switches, bridge s or routers.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 97 For each LAN segment, a designated bridge is sel ected. This bridge has the lowest cost to the root among the bridges co nnected to the LAN.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 98 7.6 Wireless Screen Overview The following is a list of the wireless scree ns you can configure on the ZyXEL Device. 1 Configure the ZyXEL Device to operate in AP , Bridge/Repeater , AP+Bridge or MBSSID mode in the W i reless screen.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 99 Figure 51 Wireless: Access Point The following table describes the general wireless LAN labels in this screen. T able 22 Wireless: Access Point LABEL DESCRIPTION WLAN Interface Select which WLAN adapter you want to configure.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 100 Disable channel switching for DFS This field displays only when you select 802.1 1a in the 802.1 1 Mde field. Select this if you do not want to use DFS (Dynamic Frequency Selection) . Choose Channel ID Set the operating frequency/channel de pending on your particular region.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 101 7.7.2 Bridge/Repeater Mode The ZyXEL Device can act as a wireless network bridge and establish wireless links with other APs. Y ou need to know the MAC address of the peer device, which also must be in bridge mode.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 102 Figure 52 Bridging Example Be careful to avoid bridg e loops when you enable bridging in th e ZyXEL Device. Bridge loops cause broadcast traffic to circ le the network endlessly , resulting in possible throughput degradation and disru ption of communications.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 103 Figure 54 Bridge Loop: Bridge Connected to Wired LAN T o prevent bridge loops, ensu re that you enable STP in the Wi re l e ss screen or your ZyXEL Device is not set to bridge mode while co nnec ted to both wired and wireless segments of the same LAN.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 104 Figure 55 Wireless: Brid ge/Repeate r The following table describes the bridge labels in this screen. T able 23 Wireless: Bridge/Repeater LABEL DESCRIPTIONS WLAN Interface Select which WLAN adap ter you want to config ure.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 105 802.1 1 mode Select 802.1 1b Only to allow only IEEE 802.1 1b compliant WLAN devices to associate with the ZyXEL Device. Select 802.1 1g Only to allow only IEEE 802.1 1g compliant WLAN devices to associate with the ZyXEL Device.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 106 See T able 22 on page 99 for information on the ot her labels in this screen. 7.7.3 AP+Bridge Mode Select AP+Bridge as the Operating Mo de in the WIRELESS > Wir eless screen to have the ZyXEL Device function as a bridge and access point simultaneously .
Chapter 7 Wireless Configuration NWA3550 User’s Guide 107 Figure 56 Wireless: AP+Bridge See the tables describing the fields in the Access Point and Bridge/Repeater operating modes for descriptions of the fields in this screen.
Chapter 7 Wireless Configuration NWA3550 User’s Guide 108 7.7.4 MBSSID Mode Select MBSSID as the Operating Mode . Refer to Chapter 9 on page 121 for configuration instructions and deta iled informati on. See Chapter 8 o n page 109 for details on the security settings.
NWA3550 User’s Guide 109 C HAPTER 8 Wireless Security Configuration This chapter describes how to use the Security and RADIUS screens to configure wireless security on your ZyXEL Device. 8.1 Wireless Security Overview The following sections introduce different types of wireless security you can set up in the wireless network.
Chapter 8 Wireless Secu rity Configuration NWA3550 User’s Guide 11 0 8.1.3 User Authentication Authentication is the process of verifying whet her a wireless device is allowed to use the wireless network. Y ou can make every user log in to the wireless network before they can use it.
Chapter 8 Wireless Se curity Configuration NWA3550 User’s Guide 111 When you use WP A2 or WP A2-PSK in your ZyXEL Device, you can select WP A2-MIX or WP A2-PSK-MIX to support WP A as well.
Chapter 8 Wireless Secu rity Configuration NWA3550 User’s Guide 11 2 Figure 57 Wireless > Security The following table describes the labels in this screen. The next screen varies according to the Security Mode you select. 8.3.1 Security: WEP Select WEP in the Security Mode field to display the following screen.
Chapter 8 Wireless Se curity Configuration NWA3550 User’s Guide 11 3 Figure 58 WIRELESS > Security: WEP The following table describes the labels in this screen. 8.3.2 Security: 802.1x Only Select 8021x-Only in the Secu rity Mode field to display the following screen.
Chapter 8 Wireless Secu rity Configuration NWA3550 User’s Guide 11 4 Figure 59 Security: 802.1x Only The following table describes the labels in this screen. 8.3.3 Security: 802.1x S tatic 64-bit, 802.1x S t atic 128-bit Select 8021x-S tatic64 or 802 1x-S tatic128 in the Security Mode field to display the following screen.
Chapter 8 Wireless Se curity Configuration NWA3550 User’s Guide 11 5 Figure 60 Security: 802.1x Static 64-bit, 802.1x Static 128-bit The following table describes the labels in this screen. T able 29 Security: 802.1x Static 64-b it, 802.1x Sta t ic 128-bit LABEL DESCRIPTION Profile Name T ype a name to i dentify this security profile.
Chapter 8 Wireless Secu rity Configuration NWA3550 User’s Guide 11 6 8.3.4 Security: WP A Select WP A in t he Security Mode field to display the followi ng screen. Figure 61 Security: WP A The following table describes the labels in this screen. 8.3.
Chapter 8 Wireless Se curity Configuration NWA3550 User’s Guide 11 7 Figure 62 Security:WP A2 or WP A2-MIX The following table describes the labels not previously discussed T able 31 Security: WPA2 or WPA2-MIX LABEL DESCRIPTIONS Profile Name T ype a name to iden tify this security profile.
Chapter 8 Wireless Secu rity Configuration NWA3550 User’s Guide 11 8 8.3.6 Security: WP A-PSK, WP A2-PSK, WP A2-PSK-MIX Select WP A-PSK , WP A2-PSK or WP A2-PSK-MIX in the Security Mode field to display the following screen.
Chapter 8 Wireless Se curity Configuration NWA3550 User’s Guide 11 9 8.4 Introduction to RADIUS RADIUS is based on a client-sever model that supports authentication and accounting, where the access point is the client and the server is the RADIUS server .
Chapter 8 Wireless Secu rity Configuration NWA3550 User’s Guide 120 The following table describes the labels in this screen. T able 33 RADIUS LABEL DESCRIPTION Index Sel ect the RADIUS profile you want to configure from the drop-down list box. Profile Name T ype a name for the RAD IUS profile associated with the Index number above.
NWA3550 User’s Guide 121 C HAPTER 9 MBSSID and SSID This chapter describes how to configure and use your ZyXEL Device’ s MBSSID mode and configure SSID profiles. 9.1 Wireless LAN Infrastructures See the W ireless LAN chapter for some basic WLAN scenarios and terminology .
Chapter 9 MBSSID and SSID NWA3550 User’s Guide 122 The switch adds PVID (Port VLAN IDentit y) tags to incoming frames that don’t already have tags (on switch ports wh ere PVI D is enabled).
Chapter 9 MBSSID and SSID NWA3550 User’s Guide 123 Figure 66 Wireless: Multiple BSS The following table describes the labels in this screen. T able 34 Wireless: Multiple BSS LABEL DESCRIPTION WLAN Interface Select which WLAN adapter you want to configure.
Chapter 9 MBSSID and SSID NWA3550 User’s Guide 124 802.1 1 Mode Select 802.1 1b Only to allow only I EEE 802.1 1b compliant WLAN devices to associate with the ZyXEL Device. Select 802.1 1g Only to allow only I EEE 802.1 1g compliant WLAN devices to associate with the ZyXEL Device.
Chapter 9 MBSSID and SSID NWA3550 User’s Guide 125 9.2 SSID When the ZyXEL Device is set to Access Point, AP+Bridge or MBSSID mode, you need to choose the SSID profile(s) you want to use in your wireless network (see Section 7.6 on page 98 for more information on operating modes).
Chapter 9 MBSSID and SSID NWA3550 User’s Guide 126 Figure 67 SSID The following table describes the labels in this screen. T able 35 SSID LABEL DESCRIPTION Index This field displays the index number of each SSID profile. Name This field displays the identification name of each SSID profile on the ZyXEL Device.
Chapter 9 MBSSID and SSID NWA3550 User’s Guide 127 9.2.2 Configuring SSID Each SSID profile references the settings configured in the following screens: • WIRELESS > Security (one of the security profil es). • WIRELESS > RADIUS (one of the RADIUS profiles).
Chapter 9 MBSSID and SSID NWA3550 User’s Guide 128 QoS Select the Quality of Service priority for this BSS’ s traffic. • In the pre-configured V oIP_SSID profile, the QoS setting is Vo I P . This is not user-con figurable. The Vo I P setting is avail able only on the Vo I P _ S S I D profile, and provides the highest level of Qo S.
NWA3550 User’s Guide 129 C HAPTER 10 Other Wireless Configuration This chapter describes how to configure the Layer -2 Isolation and MAC Filter screens on your ZyXEL Device.
Chapter 10 Other Wire less Configuration NWA3550 User’s Guide 130 Figure 69 Layer-2 Isolation Application MAC addresses that are not listed in the Allow devices with these MAC addresses table are blocked from communica ting with the ZyXEL Devi ce’ s wireless clients except for broadcast packets.
Chapter 10 Other Wireless Configu ration NWA3550 User’s Guide 131 Figure 70 WIRELESS > Layer 2 Isolation The following table describes the labels in this screen. 10.3 Configuring Layer-2 Isolation T o configure layer-2 isolation, click WIRELESS > Layer-2 Isolation > Edit .
Chapter 10 Other Wire less Configuration NWA3550 User’s Guide 132 Figure 71 WIRELESS > Layer-2 Isolat ion Configuration Screen The following table describes th e labels in this screen. T able 38 WIRELESS > Layer-2 Isol ation Configuration LABEL DESCRIPTION Profile Name T ype a name to identify this layer-2 isolation profile.
Chapter 10 Other Wireless Configu ration NWA3550 User’s Guide 133 10.3.1 Layer-2 Isolation Examples The following section sho ws you example laye r -2 isolation configur ations on the ZyXEL Device ( A ).
Chapter 10 Other Wire less Configuration NWA3550 User’s Guide 134 10.3.1.2 Layer-2 Isolation Ex ample 2 In the following exam ple wireless clients 1 and 2 can communicate with access point D and file server C but not wireless client 3 . • Enter the router ’ s, server ’ s and access point D ’ s MAC addresses in the MAC Address fields.
Chapter 10 Other Wireless Configu ration NWA3550 User’s Guide 135 Figure 75 WIRELESS > MAC Filter The following table describes the labels in this screen. 10.4.1 Configuring MAC Filtering T o change your ZyXEL Device ’ s MAC filter settings, click WIRELESS > MAC Filter > Edit .
Chapter 10 Other Wire less Configuration NWA3550 User’s Guide 136 Figure 76 MAC Addres s Filter The following table describes the labels in this screen. T able 40 MAC Address Filter LABEL DESCRIPTION Profile Name Ty p e a name to identify this profile.
Chapter 10 Other Wireless Configu ration NWA3550 User’s Guide 137 " T o a ctivate MAC fi ltering on an SSID p rof ile, select the corr ect filter from the Enable MAC Filtering drop-down list box in the WIRELESS > SSID > Edit screen and click Apply .
Chapter 10 Other Wire less Configuration NWA3550 User’s Guide 138 Figure 77 Roaming Example The steps below describe the roaming process. 1 W ireless station Y moves from the coverage area of access point AP 1 to that of access point AP 2 . 2 W ireless station Y sc ans and detects the signal of access point AP 2 .
Chapter 10 Other Wireless Configu ration NWA3550 User’s Guide 139 Figure 78 Roaming Select the Enable Roaming check box and click Apply ..
Chapter 10 Other Wire less Configuration NWA3550 User’s Guide 140.
NWA3550 User’s Guide 141 C HAPTER 11 IP Screen This chapter discusses how to config ure IP settings on the ZyXEL Device. 1 1.1 Factory Ethernet Default s The Ethernet parameters of the ZyXEL Device are preset in the fact ory with the following values: 1 IP address of 192.
Chapter 11 IP Screen NWA3550 User’s Guide 142 " Regardless of your particular situation, do not create an ar bitrary IP address; always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, Address Allocati on for Private Internets and RFC 1466, Guideli nes for Management of IP Address S pace.
Chapter 11 IP Scree n NWA3550 User’s Guide 143 Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh. T able 42 IP Setup LABEL DESCRIPTI ON.
Chapter 11 IP Screen NWA3550 User’s Guide 144.
NWA3550 User’s Guide 145 C HAPTER 12 Rogue AP This chapter discusses rogue wireless access poin ts (APs) and how to c onfigure the ZyXEL Device’ s rogue AP detection feature. 12.1 Rogue AP Introduction A rogue AP is a wireless access point operating in a network’ s coverage area that is not a sanctioned part of that network.
Chapter 12 Rogue AP NWA3550 User’s Guide 146 Figure 80 Rogue AP: Example 12.2.1 “Honeypot” Att ack Rogue APs need not be co nnected to the legitimate network to pose a severe security threat.
Chapter 12 Rogue AP NWA3550 User’s Guide 147 Figure 81 “Honeypot” Att a ck 12.3 Configuring Rogue AP Detection Y ou can configure the ZyXEL Device to de tect rogue IEEE 802.1 1a (5 GHz) and IEEE 802.1 1b/g (2.4 GHz) APs. If you have more than one AP in your wireless network, you must also configure the list of “friendly” APs.
Chapter 12 Rogue AP NWA3550 User’s Guide 148 Figure 82 ROGUE AP > Configuration The following table describes the labels in this screen. 12.3.2 Rogue AP: Friendly AP The friendly AP list displays deta ils of all the access points in your area that you know are not a threat.
Chapter 12 Rogue AP NWA3550 User’s Guide 149 Figure 83 ROGUE AP > Friendly AP The following table describes the labels in this screen. 12.3.3 Rogue AP List This list displays details of all IEEE 802.
Chapter 12 Rogue AP NWA3550 User’s Guide 150 Figure 84 ROGUE AP > Rogue AP The following table describes the labels in this screen. T able 45 ROGUE AP > Rogue AP LABEL DESCRIPTION Rogue AP List This displays details o f access points in the ZyXEL Device’s coverage area that are not listed in the friendly AP list (see Sect ion 12.
NWA3550 User’s Guide 151 C HAPTER 13 Remote Management Screens This chapter provides information on the Remote Management screens. 13.1 Remote Management Overview Remote management allows you to determ ine which services/protocols can access which ZyXEL Device interface (if any) from which computers.
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 152 13.1.2 System T imeout There is a default system management idle tim eout of five minutes (three hundre d seconds). The ZyXEL Device automatically logs you out if the management session remains idle for longer than this timeout period.
Chapter 13 Remot e Management Screens NWA3550 User’s Guide 153 The SSH client sends a connection request to the SSH server . The server identifies itself with a host key . The client encrypts a rand omly generated session ke y with the host key and server key and sends the result back to the server .
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 154 Figure 86 Remote Management: T elnet The following table describes the labels in this screen.
Chapter 13 Remot e Management Screens NWA3550 User’s Guide 155 13.6 Configuring FTP Y ou can use FTP (File T ransfer Protocol) to upload and download the ZyXEL Device’ s firmware and configuration files, please see the User ’ s Guide chapter on firmware and configuration file maintenance for details.
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 156 13.7 WWW (HTTP and HTTPS) HTTPS (HyperT ext T ransfer Protocol over Secure Socket Layer , or HTTP over SSL) is a web protocol that encrypts and decrypts web pages.
Chapter 13 Remot e Management Screens NWA3550 User’s Guide 157 13.8 Configuring WWW T o change your ZyXEL Device’ s W orld W ide W eb settings, click REMOTE MGNT > WWW . Figure 89 Remote Management: WWW The following table describes the labels in this screen.
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 158 13.9 HTTPS Example If you haven’t changed the default HTTPS port on the ZyXEL Device, then in your browser enter “https://ZyXEL Dev.
Chapter 13 Remot e Management Screens NWA3550 User’s Guide 159 13.9.2 Net scape Navigator W arning Messages When you attempt to access the ZyXEL Device HTTPS server , a W ebsite Certified by an Unknown Authority screen pops up asking if you trust the server certificate.
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 160 • The issuing certificate author ity of the ZyXEL Device’ s HT TPS server certificate is not one of the browser ’ s trusted certificate authoritie s.
Chapter 13 Remot e Management Screens NWA3550 User’s Guide 161 Figure 93 Example: Lock Denoting a Secure Conn ection Click Login and you then see the next sc reen. The factory default certificate is a common de fault certificate for all ZyXEL Device models.
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 162 Figure 95 Device-specific Certificate Click Ignore in the Replace Certificate screen to use the common ZyXEL Device certificate. Y ou will then see this information in the My Certificates screen.
Chapter 13 Remot e Management Screens NWA3550 User’s Guide 163 " SNMP is available only if TCP/IP is configured. Figure 97 SNMP Management Model An SNMP managed network consis ts of two main types of comp onent: ag ents and a manager . An agent is a management software module that resi des in a managed device (the ZyXEL Device).
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 164 13.10.1 Supported MIBs The ZyXEL Device supports MIB II, which is defined in RFC-1213 and RFC- 1215, as well as the proprietary ZyXEL private MIB. The purpose of the MIBs is to let administrators collect statistical data and monito r status and performance.
Chapter 13 Remot e Management Screens NWA3550 User’s Guide 165 13.1 1 SNMP T rap Interface Index Some traps include an SNMP in terface index. The following ta ble maps the SNMP interface indexes to the ZyXEL Device’ s physical and virtual ports. 13.
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 166 Figure 98 Remote Management: SNMP The following table describes the labels in this screen.
Chapter 13 Remot e Management Screens NWA3550 User’s Guide 167 13.1 1.2.1 The SNMPv3 User Profile Screen Use this screen to set up the details of SNMPv3 users. Click Configure SNMPv3 User Profile in the REMOTE MGNT > SNMP scree n. The following screen displays.
Chapter 13 Remo te Management Screens NWA3550 User’s Guide 168 Confirm Password Re-enter the Password . Access T ype For the administrator , this is always Set . SNMP Set commands allow the administrator to make configuratio n changes. Authentication Protoc ol Select an authentication algorithm.
NWA3550 User’s Guide 169 C HAPTER 14 Internal RADIUS Server The ZyXEL Device can use its interna l RADIUS server to authenticate wireless clients. It ca n also serve as a RADIUS server to authenticate other APs and their wireless clients. For more background information on RADIUS, see Section 8.
Chapter 14 Internal RADIUS Server NWA3550 User’s Guide 170 " The internal RADIUS server does not support domain account s (DOMAIN/ user). When you configur e your Windows XP SP2 Wire less Zero Configuration PEAP/MS-CHAPv2 settings, deselec t the Use Windows logon name and password check box.
Chapter 14 Internal RADIUS Server NWA3550 User’s Guide 171 14.3 T rusted AP Overview A trusted AP is an AP that uses the ZyXEL De vice’ s internal RADIUS server to authenticate its wireless clients. Each wireless client must ha ve a user name and password configured in the AUTH.
Chapter 14 Internal RADIUS Server NWA3550 User’s Guide 172 Figure 101 T rusted AP Overview 1 Configure an IP address and shared secret in the T rusted AP database to authenticate an AP as a trusted AP .
Chapter 14 Internal RADIUS Server NWA3550 User’s Guide 173 Figure 102 T rusted AP Screen The following table describes the labels in this screen. T able 55 Trusted AP LABEL DESCRIPTION Index This field displays the trusted AP index number .
Chapter 14 Internal RADIUS Server NWA3550 User’s Guide 174 14.5 Configuring T rusted Users A trusted user entry consists of a wireless client user name and password. T o configure trusted user entries, click AUTH SERV ER > T rusted Users . The screen appears as shown.
Chapter 14 Internal RADIUS Server NWA3550 User’s Guide 175 Password T ype a password (up to 31 ASCII cha racters) for this user profile. Note that as you type a password, the screen displays a (*) for each character you type. The password on the wireless client’s utilit y must be the same as this password.
Chapter 14 Internal RADIUS Server NWA3550 User’s Guide 176.
NWA3550 User’s Guide 177 C HAPTER 15 Certificates This chapter gives background in formation about public-key certificates and explains how to use them. 15.1 Certificates Overview The ZyXEL Device can use certificates (also ca lled digital IDs) to authenticate users.
Chapter 15 Certificates NWA3550 User’s Guide 178 Certification authorities maintain directory ser vers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled exp iration is called a CRL (Certificate Revocation List ).
Chapter 15 Certificates NWA3550 User’s Guide 179 Figure 105 Certificate Details 4 Use a secure method to verify that the certificate owner ha s the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may vary according to your situation.
Chapter 15 Certificates NWA3550 User’s Guide 180 Figure 106 My Certificates The following table describes the labels in this screen. T able 57 My Certificates LABEL DESCRIPTION PKI S torage S pace in Use This bar displays the percentage of the Zy XEL Device’s PKI storage space that is currently in use.
Chapter 15 Certificates NWA3550 User’s Guide 181 15.6 Certificate File Format s The certification authority certific ate that yo u want to import ha s to be in one of these file formats: • Binary X.509: This is an ITU-T recommen dation that defines th e formats for X.
Chapter 15 Certificates NWA3550 User’s Guide 182 15.7 Importing a Certificate Click CER TIFICA TES > My Certificates and then Import to open the My Certificate Import screen. Follow the instructions in this sc reen to save an exis ting certificate to the ZyXEL Device.
Chapter 15 Certificates NWA3550 User’s Guide 183 The following table describes the labels in this screen. 15.8 Creating a Certificate Click CER TIFICA TES > My Certificates and then Create to open the My Certifica te Create screen.
Chapter 15 Certificates NWA3550 User’s Guide 184 The following table describes the labels in this screen. T able 59 My Certificate Create LABEL DESCRIPTION Certificate Name T ype up to 31 ASC II characters (not including spaces) to identify this certificate.
Chapter 15 Certificates NWA3550 User’s Guide 185 After you click Apply in the My Certificate Create screen, you see a screen that tells you the ZyXEL Device is generating the self-signe d certificate or certification request.
Chapter 15 Certificates NWA3550 User’s Guide 186 Figure 109 My Certificate Details The following table describes the labels in this screen. T able 60 My Certificate Details LABEL DESCRIPTION Name This field displays the ide ntifying name of this certificate.
Chapter 15 Certificates NWA3550 User’s Guide 187 Certificate Path Cl ick the Refresh button to have this read -only te xt box display the hierarchy o f certification authorities that validate th e ce rtificate (and th e certificate itself).
Chapter 15 Certificates NWA3550 User’s Guide 188 15.10 T rusted CAs Click CER TIFICA TES > T rusted CAs to open the Tr u s t e d C A s screen. Thi s screen displays a summary list of certificates of the certification authorities that you ha ve set the ZyXEL Device to accept as trusted.
Chapter 15 Certificates NWA3550 User’s Guide 189 The following table describes the labels in this screen. 15.1 1 Importing a T rusted CA ’ s Certificate Click CER TIFICA TES > T rusted CAs to open the T rusted CAs screen and then click Import to open the T rusted CA Import screen.
Chapter 15 Certificates NWA3550 User’s Guide 190 " Y ou must remove any spaces from th e certificate’s filename before you can import the certificate. Figure 1 1 1 T ruste d CA Import The following table describes the labels in this screen. 15.
Chapter 15 Certificates NWA3550 User’s Guide 191 Figure 1 12 T rusted CA Details The following table describes the labels in this screen. T able 63 T rusted CA Details LABEL DESCRIPTION Name This field displays the identifying name of this certific ate.
Chapter 15 Certificates NWA3550 User’s Guide 192 Certifica te Information These read-only fields disp lay detailed information about the certificate . T ype This field displays genera l information about the certificat e. CA-signed me ans that a Certification Authorit y sig ned the certificate.
Chapter 15 Certificates NWA3550 User’s Guide 193 SHA1 Fingerprin t This is the cert ificate’s message digest that the ZyXEL Device calculated using the SHA1 algo rithm.
Chapter 15 Certificates NWA3550 User’s Guide 194.
NWA3550 User’s Guide 195 C HAPTER 16 Log Screens This chapter contains inform ation about configuring genera l log settings and viewing the ZyXEL Device’ s logs. 16.1 Configuring V iew Log The web confi gurator allows you to look at a ll of the ZyXEL Device’ s logs in one location.
Chapter 16 Log Scre ens NWA3550 User’s Guide 196 16.2 Configuring Log Settings T o change your ZyXEL De vice’ s log settings, click LOGS > Log Settings . The scre en appears as shown. Use the Log Settings screen to configure to where and when the ZyX EL Device is to send the logs and which logs and/or im mediate alerts it is to send.
Chapter 16 Log Screens NWA3550 User’s Guide 197 Figure 1 14 Log Settings The following table describes the labels in this screen. T able 65 Log Settings LABEL DESCRIPTI ON Address Info Mail Server Enter the server name or the IP address of the ma il server for the e-mail addresses specified below .
Chapter 16 Log Scre ens NWA3550 User’s Guide 198 16.3 Example Log Messages This section provides descriptions of some example log messages. SMTP Authentication If you us e SMTP authenticat ion, the mail receiver shoul d be the owner of the SMTP account.
Chapter 16 Log Screens NWA3550 User’s Guide 199 DHCP client gets %s A DHCP client got a new IP address from the DHCP server . DHCP client IP expired A DHCP client's IP address has expired. DHCP server assigns %s The DHCP server assigned an IP add ress to a client.
Chapter 16 Log Scre ens NWA3550 User’s Guide 200 16.4 Log Commands Go to the command inte rpreter interface (see Chapter 25 on page 257 for how to access and use the commands).
Chapter 16 Log Screens NWA3550 User’s Guide 201 16.5 Log Command Example This example shows how to set the ZyXEL Device to record the error logs and alerts and then view the results. ras> sys logs load ras> sys logs category error 3 ras> sys logs save ras> sys logs display access #.
Chapter 16 Log Scre ens NWA3550 User’s Guide 202.
NWA3550 User’s Guide 203 C HAPTER 17 VLAN This chapter discusses how to configure VLAN on the ZyXEL Device. 17.1 VLAN A VLAN (V irtual Local Area Network) allows a physical network to be partitioned into multiple logical networks. Stations on a logical network can belong to one or more groups.
Chapter 17 VLAN NWA3550 User’s Guide 204 17.2 Configuring VLAN The ZyXEL Device allows you to configure VL AN based on SSID profile (wireless VLAN), and / or based on your RA DIUS server (RADIUS VLAN). • When you use wireless VLAN, the ZyXEL Devi ce tags all packets from an SSID with the VLAN ID you set in the Wir eless VLA N screen.
Chapter 17 VLAN NWA3550 User’s Guide 205 Figure 1 15 Wireless VLAN The following table describes the labels in this screen T able 70 Wireless VLAN FIELD DESCRIPTION Enable VIRTUAL LAN Select this box to enable VLAN tagging. Management VLAN ID Enter a number from 1 to 4094 to define this VLAN group.
Chapter 17 VLAN NWA3550 User’s Guide 206 17.2.2 RADIUS VLAN Click VLAN > RADIUS VLAN . The following screen appe ars. Figure 1 16 RADIUS VLAN Name This is the name of the SSID profile. SSID This is the SSID the profile uses. VLAN ID Enter a VLAN ID numbe r from 1 to 4094.
Chapter 17 VLAN NWA3550 User’s Guide 207 The following table describes the labels in this screen. 17.2.3 Configuring Ma nagement VLAN Example This section shows you how to create a VLAN on an Ethernet switch. By default, the port on the ZyXEL Device is a member of the management VLAN (VLAN ID 1).
Chapter 17 VLAN NWA3550 User’s Guide 208 Figure 1 17 Management VLAN Configuration Example Perform the following steps in the switch we b configurator . This example us es the ZyXEL switch screenshots. 1 Click VLAN under Advanced Appli c ation . 2 Click St a t i c V L A N .
Chapter 17 VLAN NWA3550 User’s Guide 209 Figure 120 VLAN-Aware Switch - VLAN S tatus Follow the instructions in the Quick S tart Guide to set up yo ur ZyXEL Device for configuration.
Chapter 17 VLAN NWA3550 User’s Guide 210 17.2.4 Configuring Microsof t’ s IAS Server Example Dynamic VLAN assignme nt can be used with the ZyXEL Device . Dynamic VLAN assignment allows network admi nistrators to assign a speci fic VLAN (configured on the ZyXEL Device) to an individual’ s W indows Us er Account.
Chapter 17 VLAN NWA3550 User’s Guide 21 1 Figure 122 New Global Security Group 2 In VLAN Group ID Pr operties , click the Members tab. • The IAS uses group memberships to determ ine whic h user accounts belong to which VLAN groups. Click the Add button and co nfigure the VLAN group details.
Chapter 17 VLAN NWA3550 User’s Guide 212 •E n t e r a Policy friendly name that describes the policy . Each Remote Access Policy will be matched to one VLAN Gr oup. An example may be, Allow - VLAN 10 Policy . • Click Nex t . Figure 124 New Remote Access Policy for VLAN Group 2 The Conditions window displays.
Chapter 17 VLAN NWA3550 User’s Guide 213 Figure 126 Adding VLAN Group 6 When the Permissions options screen displays, select Grant r emote access permission . • Click Nex t to grant access based on group membership. • Click the Edit Profile button.
Chapter 17 VLAN NWA3550 User’s Guide 214 Figure 128 Authentication T ab Settings 8 Click the Encryption tab. Select the St r o n g e s t encryption option.
Chapter 17 VLAN NWA3550 User’s Guide 215 Figure 130 Connection Attributes Screen 11 The RADIUS Attribute screen displays. From the list, three RADIUS attributes will be added: • T unnel-Medium-T ype • T unnel-Pvt-Group-ID • T unnel-T ype • Click the Add button • Select T unnel-Medium-T ype • Click the Add button.
Chapter 17 VLAN NWA3550 User’s Guide 216 Figure 132 802 Attribute Setting for T unnel-Medium-T ype 13 Return to the RADIUS Attribute Sc reen shown as Figure 131 on page 215 . • Select T unnel-Pvt-Group-ID. • Click Add . 14 The Attribute Information screen displays.
Chapter 17 VLAN NWA3550 User’s Guide 217 Figure 134 VLAN Attribute Setting for T unnel-T ype 17 Return to the RADIUS Attribute Sc reen shown as Figure 131 on page 215 . • Click the Close button. • The completed Advanced tab configuration should rese mble the following screen.
Chapter 17 VLAN NWA3550 User’s Guide 218 17.2.5 Second Rx VLAN ID Example In this example, the ZyXEL Device is configured to tag packets from SSID01 with VLAN ID 1 and tag packets from SSID02 with VLAN ID 2. VLAN 1 and VLAN 2 have access to a server , S , and the Internet, as shown in the following figure.
Chapter 17 VLAN NWA3550 User’s Guide 219 4 Select the SSID profile you want to configure ( SSID03 in this example), and enter the VLAN ID number (between 1 and 4094). 5 Enter a Second Rx VLAN ID . The following screen shows SSID03 tagged with a VLAN ID of 3 and a Second Rx VLAN ID of 4 .
Chapter 17 VLAN NWA3550 User’s Guide 220.
NWA3550 User’s Guide 221 C HAPTER 18 Maintenance This chapter displays system information such as ZyNOS firmware, port IP addresses and port traffic statistics. 18.1 Maintenance Overview The maintenanc e screens can help you view system in forma tion, upload new firmware, manage configuratio n and restart your ZyXEL Device.
Chapter 18 Maintenance NWA3550 User’s Guide 222 18.2.1 System St atistics Click Maintenance > Show S tatistics . Read-only information here includes port status, packet specific statistics and bridge link status . Also provided are "system up time" and "poll interval(s)".
Chapter 18 Maintenance NWA3550 User’s Guide 223 The following table describes the labels in this screen. 18.3 Association List V iew the wireless stations tha t are curren tly associated with the ZyXEL Device in the Association List screen. Click MAINTENANCE > Association List to display the screen as shown next.
Chapter 18 Maintenance NWA3550 User’s Guide 224 Figure 140 Associa tion List The following table describes the labels in this screen. 18.4 Channel Usage The Channel Usage screen shows whether a channel is used by another wireless network or not.
Chapter 18 Maintenance NWA3550 User’s Guide 225 Figure 141 Channel Usage The following table describes the labels in this screen. 18.5 F/W Upload Screen Find firmware at www .zyxel.com in a file that (usually) uses the system model name with a "*.
Chapter 18 Maintenance NWA3550 User’s Guide 226 Figure 142 Firmware Uplo ad The following table describes the labels in this screen. 1 Do not turn off the ZyXEL Device wh ile firmware uploa d is in progress! After you see the Firmware Upload in Pr ocess screen, wait two minutes before logging into the ZyXEL Device again.
Chapter 18 Maintenance NWA3550 User’s Guide 227 Figure 144 Network T emporarily Disconnected After two minutes, log in again an d check your new firmware version in the System S tatus screen. If the upload was not successful, the following screen will appear .
Chapter 18 Maintenance NWA3550 User’s Guide 228 Figure 146 Configuration 18.6.1 Backup Configuration Backup configuration allows you to b ack up (save) the ZyXEL Device’ s current configuration to a file on your co mputer .
Chapter 18 Maintenance NWA3550 User’s Guide 229 1 Do not turn off the ZyXEL Device while configuration file upload is in progress. After you see a “restore configuration successf ul” scree n, you must then wait one minute before logging into th e ZyXEL Device again.
Chapter 18 Maintenance NWA3550 User’s Guide 230 18.6.3 Back to Factory Default s Pressing the Reset button in this section clears al l user-e ntered configuration information and returns the ZyXEL Device to its factory defau lts as shown on the screen.
231 P ART III T roubleshooting and S pecifications T roubleshooting (233) Product Specification s (237).
232.
NWA3550 User’s Guide 233 C HAPTER 19 Troubleshooting This chapter offers some sugg estions to solve problems you might encounter . The potential problems are divided into the following categories. • Power and Hardware Connections • ZyXEL Device Access and Login • Internet Access • W ireless Router/A P T roubles hooting 19.
Chapter 19 Trou bleshooting NWA3550 User’s Guide 234 V I forgot the password. 1 The default password is 1234 . 2 If this does not work, yo u have to reset the device to its factory defaults. Contact yo ur vendor . V I cannot see or access the Login screen in the web configurator .
Chapter 19 Trou bleshooting NWA3550 User’s Guide 235 4 If this does not work, yo u have to reset the device to its factory defaults. Contact yo ur vendor . V I cannot access the SMT . See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator .
Chapter 19 Trou bleshooting NWA3550 User’s Guide 236 V The Internet conn ection is slow or intermi ttent. 1 There might be a lot of traf fic on the ne twork. If the ZyXEL Device is sending or receiving a lot of information, try closing so me programs that use the Internet, especially peer-to-peer applications.
NWA3550 User’s Guide 237 C HAPTER 20 Product Specifications The following tables summarize the ZyXEL De vice’ s hardware and firmware features. T able 79 Hardware Specifications SPECIFICATIO N DES.
Chapter 20 Product Specifications NWA3550 User’s Guide 238 S torage Environmen t T emperature: -40º C ~ 60º C Humidity: 5% ~ 95% RH Approvals Radio • USA: FCC Part 15C 15.247 FCC Part 15E 15.407 FCC OET65 •E U : ETSI EN 300 328 V1.7.1 ETSI EN 301 893 V1.
Chapter 20 Product Specifications NWA3550 User’s Guide 239 STP (S panning T ree Protocol ) / RSTP (Rapid STP) (R)STP detects and breaks network loops and provides backup links between switches, bridges or routers.
Chapter 20 Product Specifications NWA3550 User’s Guide 240 Comp atible ZyXEL Antennas At the time of writing, you can use the fo llowing antennas in your ZyXEL Device. Comp atible ZyXEL Antenna Cables The following table shows you the cables you ca n use in the ZyXEL Devi ce to extend your connection to antennas at the time of writing.
Chapter 20 Product Specifications NWA3550 User’s Guide 241 Power over Ethernet (PoE) S pecifications Y ou can use a power over Et hernet injector to power this device . The injector must comply to IEEE 802.3af. T able 83 Power over Ethernet Inje ctor Specifications Power Output 15.
Chapter 20 Product Specifications NWA3550 User’s Guide 242.
243 P ART IV Appendices and Index Setting Up Y our Computer ’ s IP Address (245) W ireless LANs (269) Pop-up W indows, JavaScripts and Java Permissions (283) Importing Certificates (289) IP Addresse.
244.
NWA3550 User’s Guide 245 A PPENDIX A Setting Up Y our Computer ’ s IP Address " Y our specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 246 Figure 152 Windows XP: S tart Menu 2 In the Control Panel , click the Network Connections icon. Figure 153 Windows XP: Control Panel 3 Right-click Local Area Connection and then select Properties .
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 247 4 On the General tab, select Internet Protocol (TCP/IP) and t hen click Properties . Figure 155 Windows XP: Local Area Conne ction Properties 5 The Internet Protocol TCP/IP Pr operties window ope ns.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 248 Figure 156 Windows XP: Internet Protocol (TCP/IP) Propert ies 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically .
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 249 1 Click St a r t > Control Panel . Figure 157 Windows V ista: S tart Menu 2 In the Control Panel , click the Network and Intern et icon. Figure 158 Windows V ista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 250 Figure 160 Windows V ista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties .
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 251 Figure 162 Windows V ista: Local Area Connection Properties 7 The Internet Protocol V ersion 4 (TCP/IPv4) Properties window opens.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 252 Figure 163 Windows V ista: Internet Protocol V ersion 4 (TCP/IPv4) Prope rties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically .
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 253 1 Click Apple > System Preferences . Figure 164 Mac OS X 10.4: Apple Menu 2 In the System Prefer ences window , click the Network icon.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 254 Figure 166 Mac OS X 10.4: Network Preference s 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 167 Mac OS X 10.
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 255 •I n t h e Subnet Mask field, type your subnet mask. •I n t h e Router field, type the IP address of your device. Figure 168 Mac OS X 10.4: Network Preference s > Ethernet 6 Click Apply Now and clo se the window .
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 256 Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences . Figure 170 Mac OS X 10.5: Apple Menu 2 In System Prefer ences , click the Network icon.
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 257 Figure 172 Mac OS X 10.5: Network Preference s > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: •F r o m t h e Configure list, select Manually .
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 258 Figure 173 Mac OS X 10.5: Network Preference s > Ethernet 6 Click Apply and close the window .
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 259 Linux: Ubuntu 8 (GNOME) This section shows you how to co nfigure your computer ’ s TCP/IP settings in the GNU Object Model Environment (GNOME) us ing the Ubuntu 8 Linux distribution.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 260 3 In the Authenticate window , enter your admin acc ount name and pa ssword then click the Authenticate button.
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 261 Figure 179 Ubuntu 8: Network Settings > Properties •I n t h e Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. •I n t h e Configuration list, select S tatic IP address if you have a sta tic IP address.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 262 V erifying Settings Check your TCP/IP properties by clicking System > Administration > Network T ools , and then selecting the appropriate Network device from the Devices tab.
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 263 " Make sure you are logged in as the root administrator . Follow the steps below to configure yo ur computer IP address in the KDE: 1 Click K Menu > Computer > Administrator Settings (Y aST) .
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 264 Figure 184 openSUSE 10.3: Y aST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriat e connection Name from the list, and then click the Configure button.
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 265 Figure 186 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dy namic IP address. Select S tatically assigned IP Address if you have a static IP address.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 266 Figure 187 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window . V erifying Settings Click the KNetwork Manager icon on the Ta s k b a r to check your TCP/IP properties.
Appendix A Setting Up Your Compu t er’s IP Address NWA3550 User’s Guide 267 Figure 189 openSUSE: Connection S tatus - KNetwork Manager.
Appendix A Se tting Up Your Co mputer’s IP Address NWA3550 User’s Guide 268.
NWA3550 User’s Guide 269 A PPENDIX B W ireless LANs Wireless LAN T opologies This section discusses ad-hoc and in frastructure w ireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an inde pendent (Ad-hoc) WLAN that connects a se t of computers with wireless adapters (A, B, C).
Appendix B Wireless LANs NWA3550 User’s Guide 270 Figure 191 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlappi ng BSSs, each containing an access point, with each access point connected together by a wired network.
Appendix B Wir eless LANs NWA3550 User’s Guide 271 Figure 192 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.1 1a/b/g wireless devices.
Appendix B Wireless LANs NWA3550 User’s Guide 272 Figure 193 RTS /C T S When station A sends data to the AP , it might not know that the station B is already using the channel.
Appendix B Wir eless LANs NWA3550 User’s Guide 273 If the Fragmentation Threshold value is smaller than the RT S /C T S value (see previously) you set then the R TS (Request T o Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmen ted before they reach R TS/CTS size.
Appendix B Wireless LANs NWA3550 User’s Guide 274 W ireless security methods availabl e on the ZyXEL Device are data encryption, wireless client authentication, restricting access by devi ce MAC address and hiding the ZyXEL Device identity .
Appendix B Wir eless LANs NWA3550 User’s Guide 275 Determines the network services available to authenticated users once they are connected to the network.
Appendix B Wireless LANs NWA3550 User’s Guide 276 For EAP-TLS authentication type, you must firs t hav e a wired connection to the network and obtain the certificate(s) from a certificate authorit y (CA).
Appendix B Wir eless LANs NWA3550 User’s Guide 277 Dynamic WEP Key Exchange The AP maps a unique ke y that is generated w ith the RADIUS se rver . This key expires when the wireless connection times out, disconnects or reauthentic ation times out. A new WEP key is generated each time r eauthentication is performed.
Appendix B Wireless LANs NWA3550 User’s Guide 278 Encryption Both WP A and WP A2 improve data encryp tion by using T emporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IE EE 802.
Appendix B Wir eless LANs NWA3550 User’s Guide 279 Wireless Client WP A Supplicant s A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WP A. At the time of writing, the most widely available supplicant is the WP A patch for W indows XP , Funk Software's Odyssey client.
Appendix B Wireless LANs NWA3550 User’s Guide 280 4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data exchanged between them.
Appendix B Wir eless LANs NWA3550 User’s Guide 281 Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11 b) or 5GHz(IEEE 802.1 1a) is needed to communicate efficiently in a wireless LAN.
Appendix B Wireless LANs NWA3550 User’s Guide 282 For omni-directional antennas mounted on a table, desk, and so on, point the antenna up. For omni-directional antennas mounted on a wall or ceiling, point the antenn a down. For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible.
NWA3550 User’s Guide 283 A PPENDIX C Pop-up Windows, JavaScript s and Java Permissions In order to use the web configurator you need to allow: • W eb browser pop-u p windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default).
Appendix C Pop-up Windows, JavaScripts and Java Perm issions NWA3550 User’s Guide 284 2 Clear the Block pop-ups check box in the Pop-up Block e r section of the screen. This disables any web po p-up blockers you may have enabled . Figure 197 Internet Options: Privacy 3 Click Apply to save this setting.
Appendix C Pop-up Windows, JavaScripts and Java Per m issions NWA3550 User’s Guide 285 Figure 198 Internet Options: Privacy 3 T ype the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.
Appendix C Pop-up Windows, JavaScripts and Java Perm issions NWA3550 User’s Guide 286 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript s If pages of the web configura tor do not display properly in Internet Explorer , ch eck that JavaScripts are allowed.
Appendix C Pop-up Windows, JavaScripts and Java Per m issions NWA3550 User’s Guide 287 Figure 201 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer , click To o l s , Internet Options and then the Security tab. 2 Click the Custom Level.
Appendix C Pop-up Windows, JavaScripts and Java Perm issions NWA3550 User’s Guide 288 JA V A (Sun) 1 From Internet Explorer , click To o l s , Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is sele cted.
NWA3550 User’s Guide 289 A PPENDIX D Importing Certificates This appendix shows you how to import pub lic key certificates into your web browser . Public key certificates are used by web browsers to ensure that a secure web site is legitimate.
Appendix D Importing Certificates NWA3550 User’s Guide 290 Figure 204 Internet Explorer 7: Certification Erro r 2 Click Continue to this website (not r e commended) . Figure 205 Internet Explorer 7: Certification Erro r 3 In the Address Bar , click Certificate Error > View certificates .
Appendix D Importi ng Certificates NWA3550 User’s Guide 291 Figure 207 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard , click Nex t .
Appendix D Importing Certificates NWA3550 User’s Guide 292 Figure 209 Internet Explorer 7: Certificate Import Wizar d 7 Otherwise, select Place all certificates in the following store and then click Br owse .
Appendix D Importi ng Certificates NWA3550 User’s Guide 293 Figure 212 Internet Explorer 7: Certificate Import Wizar d 10 If you are presented with anot her Security W arning , click Ye s . Figure 213 Internet Explorer 7: Security Warning 11 Finally , click OK when presented with the successf ul certificate installation message.
Appendix D Importing Certificates NWA3550 User’s Guide 294 12 The next time you start Internet Explorer a nd go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar . Click it to view the page’ s We b s i t e Identification information.
Appendix D Importi ng Certificates NWA3550 User’s Guide 295 Figure 217 Internet Explorer 7: Open File - Security W arning 3 Refer to steps 4-12 in the Internet Explorer procedure beginning on page 289 to complete the installation process.
Appendix D Importing Certificates NWA3550 User’s Guide 296 Figure 219 Internet Explorer 7: Internet Options 3 In the Certificates dialog box, click the T rusted Root Certificates Authorities tab, select the certificate that you wa nt to delete, and then click Remove .
Appendix D Importi ng Certificates NWA3550 User’s Guide 297 Figure 221 Internet Explorer 7: Certificates 5 In the Root Certificate S tore dialo g box, click Ye s . Figure 222 Internet Explorer 7: Root Certificate S tore 6 The next time you go to the web site that issued the public key c ertificate you just removed, a certific ation error appears.
Appendix D Importing Certificates NWA3550 User’s Guide 298 3 The certificate is stored and you can now c onnect securely to the web configurator . A sealed padlock appears in th e address bar , which you can click to op en the Page Info > Security window to view the web pa ge’ s security information .
Appendix D Importi ng Certificates NWA3550 User’s Guide 299 Figure 226 Firefox 2: Options 3 In the Certificate Manager dialo g box, click W eb Sites > Import . Figure 227 Firefox 2: Certificate Manager 4 Use the Select File dialog box to locate the certificate and then click Open .
Appendix D Importing Certificates NWA3550 User’s Guide 300 Figure 228 Firefox 2: Select File 5 The next time you visit the web site, click th e padlock in the address bar to open the Page Info > Security window to see the web pa ge’ s security information.
Appendix D Importi ng Certificates NWA3550 User’s Guide 301 Figure 230 Firefox 2: Options 3 In the Certificate Manager dialog box, select the W eb Sites tab, select the certificate that you want to remove, and then click Delete . Figure 231 Firefox 2: Certificate Manager 4 In the Delete W eb Site Certificates dialog box, click OK .
Appendix D Importing Certificates NWA3550 User’s Guide 302 Figure 232 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key c ertificate you just removed, a certific ation error appears.
Appendix D Importi ng Certificates NWA3550 User’s Guide 303 Figure 234 Opera 9: Security infor mation Inst allin g a St and-Alone Ce rtificate File in Opera Rather than browsing to a Z yXEL web configur ator and installing a public key certificate when prompted, you ca n install a stand-alone certificate file if one has been issued to you.
Appendix D Importing Certificates NWA3550 User’s Guide 304 Figure 236 Opera 9: Prefer ences 3 In the Certificates Manager , click Authorities > Import .
Appendix D Importi ng Certificates NWA3550 User’s Guide 305 4 Use the Import certificate dialog box to locate the certificate and then click Open. Figure 238 Opera 9: Import certifica te 5 In the Install authority certificate dialog box, click Instal l .
Appendix D Importing Certificates NWA3550 User’s Guide 306 Figure 240 Opera 9: Install authority certificate 7 The next time you visit the web site, click th e padlock in the address bar to open the Security information window to view the web page’ s security details.
Appendix D Importi ng Certificates NWA3550 User’s Guide 307 Figure 242 Opera 9: Prefer ences 3 In the Certificates manager , select the Authorities tab, select the certificate that you want to remove, and then click Delete .
Appendix D Importing Certificates NWA3550 User’s Guide 308 Figure 243 Opera 9 : Certificate manager 4 The next time you go to the web site that issued the public key c ertificate you just removed, a certific ation error appears.
Appendix D Importi ng Certificates NWA3550 User’s Guide 309 Figure 244 Konqueror 3.5: Serve r Authentication 3 Click For ever when prompted to accept the certificate. Figure 245 Konqueror 3.5: Serve r Authentication 4 Click the padlock in the address bar to open the KDE SSL Inf ormation w indow and view the web page’ s security details.
Appendix D Importing Certificates NWA3550 User’s Guide 310 Figure 247 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK . Figure 248 Konqueror 3.5: Certificate Im port Result The public key certificate appears in the KDE certificat e manager , Kleopatra .
Appendix D Importi ng Certificates NWA3550 User’s Guide 31 1 Figure 250 Konqueror 3.5: Settings Men u 2 In the Configure d ialog box, select Crypto . 3 On the Peer SSL Certificates tab, select the certificate you wa nt to delete and then click Remove .
Appendix D Importing Certificates NWA3550 User’s Guide 312.
NWA3550 User’s Guide 313 A PPENDIX E IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify ind ividual devices on a network. Every networking device (includin g computers, servers, routers, printe rs, etc.
Appendix E IP Addre sses and Subnetting NWA3550 User’s Guide 314 Figure 252 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the s ubnet mask.
Appendix E IP Addresses and Subnetting NWA3550 User’s Guide 315 Subnet masks are expressed in dotted decimal no tation just like IP addresses. The follow ing examples show the binary and decimal not ation for 8-bit, 16-bit, 24-bit an d 29-bit subnet masks.
Appendix E IP Addre sses and Subnetting NWA3550 User’s Guide 316 Subnetting Y ou can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the c ompany network for security reasons.
Appendix E IP Addresses and Subnetting NWA3550 User’s Guide 317 Figure 254 Subnetting Example: Af ter Subnetting In a 25-bit subnet the host ID has 7 bits , so each sub-network has a maximum of 2 7 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’ s address itself, all ones is the subnet’ s broadcast address).
Appendix E IP Addre sses and Subnetting NWA3550 User’s Guide 318 Example: Eight Subnet s Similarly , use a 27-bit mask to create eight subnets (000, 00 1, 010, 01 1, 100, 101, 1 10 and 111 ) . The following table shows IP address last octet values for each subnet.
Appendix E IP Addresses and Subnetting NWA3550 User’s Guide 319 Subnet Planning The following table is a summary for su bnet planning on a network with a 24-bit network number . The following table is a summary for su bnet planning on a network with a 16-bit network number .
Appendix E IP Addre sses and Subnetting NWA3550 User’s Guide 320 Configuring IP Addresses Where you obtain your netwo rk number depends on yo ur particular situation. If the ISP or your network administrator assigns yo u a bloc k of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
NWA3550 User’s Guide 321 A PPENDIX F T ext File Based Auto Configuration This chapter describes how admini strators can use text configuration files to configure the wireless LAN settings for multiple APs.
Appendix F Text File Ba sed Auto Configuration NWA3550 User’s Guide 322 " If adjacent APs use the sa me configuration file, you should leave out the channel setting since they could interfere with each other ’s wireless traffic.
Appendix F Text File Ba sed Auto Con figuration NWA3550 User’s Guide 323 Use the following procedure to have th e AP download the configuration file. V erifying Y our Configuration File Upload Via SNMP Y ou can use SNMP management software t o disp lay the configuration file version cu rrently on the device by using the fol lowing MIB.
Appendix F Text File Ba sed Auto Configuration NWA3550 User’s Guide 324 Configuration File Rules Y ou can only use the wlan and wcfg commands in the configur ation file. The AP ignores other ZyNOS commands but continues to check the next command. The AP ignores any improperly formatted commands and con tinues to check the next line.
Appendix F Text File Ba sed Auto Con figuration NWA3550 User’s Guide 325 Figure 258 802.1X Configuration File Example Figure 259 WP A-PSK Configuration File Example !#ZYXEL PROWLAN !#VERSION 12 wcfg.
Appendix F Text File Ba sed Auto Configuration NWA3550 User’s Guide 326 Figure 260 WP A Configuration File Example Wlan Command Configuration File Example This example configur ation file uses the w.
Appendix F Text File Ba sed Auto Con figuration NWA3550 User’s Guide 327 Figure 261 Wlan Configuration File Example !#ZYXEL PROWLAN !#VERSION 15 wcfg ssid 1 name ssid-wep wcfg ssid 1 security Test-w.
Appendix F Text File Ba sed Auto Configuration NWA3550 User’s Guide 328.
NWA3550 User’s Guide 329 A PPENDIX G Legal Information Copyright Copyright © 2008 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a wh.
Appendix G Legal Information NWA3550 User’s Guide 330 If this device does cause harmful inte rference to radio/television reception, which can be determined by turning th e device off and on, the user is enc ouraged to try to correct the interference by one or more of the following measures: 1 Reorient or relocate the receiving antenna.
Appendix G Legal Information NWA3550 User’s Guide 331 Vie wing Certifications 1 Go to http://www .zyxel.com . 2 Select your product on the ZyXEL home pag e to go to that product's page. 3 Select the certification you wish to view from this page.
Appendix G Legal Information NWA3550 User’s Guide 332.
NWA3550 User’s Guide 333 A PPENDIX H Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor . If you cannot contact yo ur vendor , then contac t a ZyXEL office for the region in which you bought the dev ice.
Appendix H Custo mer Support NWA3550 User’s Guide 334 • Address: 1005F , ShengGao Internationa l T ower , No.137 XianXia Rd., Shanghai • W eb: http://www .zyxel.cn Cost a Rica • Support E-mail: soporte@zyxel.co.cr • Sales E-mail: sales@zyxel.
Appendix H Customer Support NWA3550 User’s Guide 335 Germany • Support E-mail: support@zyxel.de • Sales E-mail: sales@zyxel.de • T elephone: +49-2405-6909-69 • Fax: +49-2405-6909-99 • W eb: www .zyxel.de • Re g ul a r Ma i l: ZyXEL Deut schland GmbH.
Appendix H Custo mer Support NWA3550 User’s Guide 336 Malaysia • Support E-mail: support@zyxel.com.my • Sales E-mail: sales@zyxel.com.my • T elephone: +603-8076-9933 • Fax: +603-8076- 9833 • W eb: http://www .zyxel.com.my • Regular Mail: ZyXEL Malaysia Sdn Bhd.
Appendix H Customer Support NWA3550 User’s Guide 337 Singapore • Support E-mail: support@zyxel.com.sg • Sales E-mail: sales@zyxel.com.sg • T elephone: +65-6899-6678 • Fax: +65-6899-8887 • W eb: http://www .zyxel.com.sg • Regular Mail: ZyXEL Singapore Pte Ltd.
Appendix H Custo mer Support NWA3550 User’s Guide 338 T urkey • Support E-mail: cso@zyxel.com.tr • T elephone: +90 212 222 55 22 • Fax: +90-212-220-2 526 • W eb: http:www .zyxel.com.tr • Address: Kaptanpasa Mahallesi Piyalep asa Bulvari Ortadogu Plaza N:14/13 K:6 Okmeydani/Sisli Istanbul/T urkey Ukraine • Support E-mail: su pport@ua.
Index NWA3550 User’s Guide 339 Index A access 34 access point 34 access privileges 36 address assignment 141 address filtering 33 administrator authentication on RADIU S 86 Advanced Encryption St andard See AES.
Index NWA3550 User’s Guide 340 dynamic WEP key exchange 277 E EAP authentication 275 encryption 35 , 278 ESS 270 ESSID 236 Extended Service Se t see ESS Extended Service Se t IDentification 101 , 12.
Index NWA3550 User’s Guide 341 N NA T 320 network 33 network access 33 network bridge 34 network traffic 33 O operating mode 33 out-of-band management 207 P Pairwise Master Key (PMK) 278 , 279 passw.
Index NWA3550 User’s Guide 342 STP - how it works 97 STP (S panning T ree Protocol) 23 9 STP path cost s 96 STP port states 97 STP terminology 96 subnet 313 subnet mask 238 , 314 subnetting 316 synt.
Index NWA3550 User’s Guide 343.
Index NWA3550 User’s Guide 344.
Een belangrijk punt na aankoop van elk apparaat ZyXEL Communications NWA3550 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen ZyXEL Communications NWA3550 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens ZyXEL Communications NWA3550 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding ZyXEL Communications NWA3550 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over ZyXEL Communications NWA3550 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van ZyXEL Communications NWA3550 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de ZyXEL Communications NWA3550 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met ZyXEL Communications NWA3550 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.