EasyManua.ls Logo

ZyXEL Communications NWA-3160 Series - Page 15

ZyXEL Communications NWA-3160 Series
320 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
ZyXEL NWA-3160 Series User’s Guide
15
Chapter 10
IP Screen................................................................................................................................ 133
10.1 Factory Ethernet Defaults ................................................................................................ 133
10.2 TCP/IP Parameters .........................................................................................................133
10.2.1 WAN IP Address Assignment ................................................................................. 133
10.3 Configuring IP .................................................................................................................. 134
Chapter 11
Rogue AP............................................................................................................................... 135
11.1 Rogue AP Introduction .....................................................................................................135
11.2 Rogue AP Examples ........................................................................................................ 135
11.2.1 “Honeypot” Attack ................................................................................................... 136
11.3 Configuring Rogue AP Detection ..................................................................................... 137
11.3.1 Rogue AP: Configuration ........................................................................................ 137
11.3.2 Rogue AP: Friendly AP .......................................................................................... 138
11.3.3 Rogue AP List ........................................................................................................ 139
Chapter 12
Remote Management Screens............................................................................................. 141
12.1 Remote Management Overview ...................................................................................... 141
12.1.1 Remote Management Limitations .......................................................................... 141
12.1.2 System Timeout .................................................................................................... 141
12.2 Configuring Telnet ............................................................................................................ 142
12.3 Configuring FTP .............................................................................................................. 143
12.4 Configuring WWW ...........................................................................................................144
12.5 SNMP .............................................................................................................................. 145
12.5.1 Supported MIBs ..................................................................................................... 146
12.5.2 SNMP Traps ........................................................................................................... 147
12.6 SNMP Traps .................................................................................................................... 147
12.6.1 Configuring SNMP ................................................................................................. 148
Chapter 13
Internal RADIUS Server........................................................................................................ 151
13.1 Internal RADIUS Overview .............................................................................................. 151
13.2 Internal RADIUS Server Setting ...................................................................................... 151
13.3 Trusted AP Overview .......................................................................................................153
13.4 Configuring Trusted AP ................................................................................................... 154
13.5 Configuring Trusted Users ............................................................................................... 155
Chapter 14
Certificates ............................................................................................................................ 157
14.1 Certificates Overview ....................................................................................................... 157
14.1.1 Advantages of Certificates ..................................................................................... 158

Table of Contents

Related product manuals