EasyManua.ls Logo

ZyXEL Communications NWA-3160 Series - Page 22

ZyXEL Communications NWA-3160 Series
320 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Figures
ZyXEL NWA-3160 Series User’s Guide
22
Figure 39 Tutorial: MAC Filter Edit (SERVER_1) ................................................................................... 72
Figure 40 Tutorial: SSID Profiles Activated ............................................................................................ 73
Figure 41 Tutorial: SSID Tab Correct Settings ........................................................................................ 73
Figure 42 System > General .................................................................................................................. 77
Figure 43 SYSTEM > Password. ............................................................................................................ 79
Figure 44 SYSTEM > Time Setting ........................................................................................................ 80
Figure 45 Basic Service set .................................................................................................................... 83
Figure 46 Extended Service Set ............................................................................................................. 84
Figure 47 DiffServ: Differentiated Service Field ...................................................................................... 87
Figure 48 Wireless: Access Point ........................................................................................................... 91
Figure 49 Bridging Example ................................................................................................................... 93
Figure 50 Bridge Loop: Two Bridges Connected to Hub ........................................................................ 93
Figure 51 Bridge Loop: Bridge Connected to Wired LAN ....................................................................... 94
Figure 52 Wireless: Bridge/Repeater ..................................................................................................... 94
Figure 53 Wireless: AP+Bridge .............................................................................................................. 97
Figure 54 EAP Authentication .............................................................................................................. 100
Figure 55 WPA(2)-PSK Authentication ................................................................................................. 102
Figure 56 WPA(2) with RADIUS Application Example ......................................................................... 103
Figure 57 Wireless > Security ............................................................................................................... 105
Figure 58 WIRELESS > Security: WEP ................................................................................................ 106
Figure 59 Security: 802.1x Only .......................................................................................................... 107
Figure 60 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ............................................................ 108
Figure 61 Security: WPA ..................................................................................................................... 109
Figure 62 Security:WPA2 or WPA2-MIX ................................................................................................110
Figure 63 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................111
Figure 64 RADIUS .................................................................................................................................112
Figure 65 Multiple BSS with VLAN Example .........................................................................................116
Figure 66 Wireless: Multiple BSS ..........................................................................................................116
Figure 67 SSID ......................................................................................................................................119
Figure 68 Configuring SSID .................................................................................................................. 120
Figure 69 Layer-2 Isolation Application ................................................................................................ 124
Figure 70 WIRELESS > Layer 2 Isolation ............................................................................................ 125
Figure 71 WIRELESS > Layer-2 Isolation Configuration Screen ......................................................... 126
Figure 72 Layer-2 Isolation Example Configuration ............................................................................. 127
Figure 73 Layer-2 Isolation Example 1 ................................................................................................. 127
Figure 74 Layer-2 Isolation Example 2 ................................................................................................. 128
Figure 75 WIRELESS > MAC Filter ...................................................................................................... 128
Figure 76 MAC Address Filter .............................................................................................................. 129
Figure 77 Roaming Example ................................................................................................................ 131
Figure 78 Roaming ............................................................................................................................... 132
Figure 79 IP Setup ................................................................................................................................ 134
Figure 80 Rogue AP: Example ............................................................................................................ 136
Figure 81 “Honeypot” Attack ................................................................................................................. 137

Table of Contents

Related product manuals