G-3000 Series
802.11b/g Wireless Access Point
User’s Guide
Version 3.60
10/2006
Edition 1
www.zyxel.com
About This User's Guide
About This User's Guide
Intended Audience
This manual is intended for people who want to configure the ZyXEL Device using the web
configurator. A basic knowledge of TCP/IP networking concepts and topology will be helpful
but is not necessary.
This User’s Guide covers configuration of the G-3000 and G-3000H. Screens and menus for
the G-3000 are shown. Screens and menus in the G-3000 may differ slightly. See your
device
’s Quick Start Guide for instructions on how to make hardware connections.
Related Documentation
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Supporting Disk
Refer to the included CD for support documents.
• ZyXEL Web Site
Please refer to www.zyxel.com
certifications.
for additional support documentation and product
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for
improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
G-3000 Series User’s Guide
3
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The G-3000 or G-3000H may be referred to as the “ZyXEL Device”, the “device”, the
“product” or the “system” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key.
“Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation
panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
G-3000 Series User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The ZyXEL Device icon is
not an exact representation of your device.
ZyXEL Device Computer Notebook computer
Server DSLAM Firewall
Telephone Switch Router
G-3000 Series User’s Guide
5
Safety Warnings
Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• ONLY qualified service personnel should service or disassemble this device.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right
supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a
new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• Antenna Warning! This device meets ETSI and FCC certification requirements when
using the included antenna(s). Only use the included antenna(s).
• If you wall mount your device, make sure that no electrical lines, gas or water pipes will
be damaged.
• The PoE (Power over Ethernet) devices that supply or receive power and their connected
Ethernet cables must all be completely indoors.
6
This product is recyclable. Dispose of it properly.
G-3000 Series User’s Guide
Safety Warnings
G-3000 Series User’s Guide
7
Safety Warnings
8
G-3000 Series User’s Guide
Contents Overview
Contents Overview
Introduction ............................................................................................................................ 33
Introducing the ZyXEL Device ...................................................................................................35
Introducing the Web Configurator .............................................................................................. 41
Wizard Setup ............................................................................................................................. 45
Tutorial ....................................................................................................................................... 53
The Web Configurator ...........................................................................................................65
System Screens ........................................................................................................................ 67
Wireless Configuration ............................................................................................................. 73
Wireless Security Configuration ................................................................................................87
MESSID and SSID .................................................................................................................. 105
Other Wireless Configuration ...................................................................................................115
IP Screen ................................................................................................................................. 123
Remote Management Screens ................................................................................................ 127
Auth Server .............................................................................................................................. 141
Certificates ............................................................................................................................... 147
Log Screens ............................................................................................................................ 165
VLAN ....................................................................................................................................... 173
Maintenance ............................................................................................................................ 189
SMT and Troubleshooting ...................................................................................................199
Introducing the SMT ................................................................................................................ 201
General Setup ......................................................................................................................... 207
LAN Setup ............................................................................................................................... 209
Dial-in User Setup ................................................................................................................... 221
VLAN Setup ............................................................................................................................. 223
SNMP Configuration ................................................................................................................ 225
System Security ....................................................................................................................... 227
System Information and Diagnosis .......................................................................................... 231
Firmware and Configuration File Maintenance ........................................................................ 237
System Maintenance and Information ..................................................................................... 249
Troubleshooting ....................................................................................................................... 255
Appendices and Index ......................................................................................................... 259
G-3000 Series User’s Guide
9
Contents Overview
10
G-3000 Series User’s Guide
Table of Contents
Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents.................................................................................................................... 11
List of Figures ......................................................................................................................... 21
List of Tables...........................................................................................................................29
Part I: Introduction................................................................................. 33
Chapter 1
Introducing the ZyXEL Device...............................................................................................35
1.1 Introducing the ZyXEL Device ............................................................................................ 35
1.2 Applications for the ZyXEL Device ...................................................................................... 35
1.2.1 Access Point .............................................................................................................. 36
1.2.2 Bridge / Repeater ....................................................................................................... 36
1.2.3 AP + Bridge ................................................................................................................ 37
1.2.4 MESSID (Multiple Extended Service Set IDentifier) ................................................... 38
1.3 Ways to Manage the ZyXEL Device .................................................................................... 39
1.4 Good Habits for Managing the ZyXEL Device ..................................................................... 40
Chapter 2
Introducing the Web Configurator ........................................................................................ 41
2.1 Web Configurator Overview ................................................................................................. 41
2.2 Accessing the Web Configurator ......................................................................................... 41
2.3 Resetting the ZyXEL Device ................................................................................................ 43
2.3.1 Methods of Restoring Factory-Defaults ...................................................................... 43
2.4 Navigating the Web Configurator ......................................................................................... 43
Chapter 3
Wizard Setup ........................................................................................................................... 45
3.1 Wizard Setup Overview ....................................................................................................... 45
3.1.1 Channel ...................................................................................................................... 45
G-3000 Series User’s Guide
11
Table of Contents
3.1.2 ESS ID ....................................................................................................................... 45
3.1.3 WEP Encryption ......................................................................................................... 45
3.2 Wizard Setup: General Setup .............................................................................................. 46
3.3 Wizard Setup: Wireless LAN ............................................................................................... 46
3.4 Wizard Setup: IP Address ...................................................................................................48
3.4.1 IP Address Assignment .............................................................................................. 48
3.4.2 IP Address and Subnet Mask ..................................................................................... 48
3.5 Basic Setup Complete ......................................................................................................... 50
Chapter 4
Tutorial ..................................................................................................................................... 53
4.1 How to Configure the Wireless LAN .................................................................................... 53
4.1.1 Choosing the Wireless Mode ..................................................................................... 53
4.1.1.1 Configuring Dual WLAN Adapters .................................................................... 53
4.2 How to Configure Multiple Wireless Networks ..................................................................... 54
4.2.1 Change the Operating Mode ...................................................................................... 55
4.2.2 Configure the VoIP Network ....................................................................................... 56
4.2.2.1 Set Up Security for the VoIP Profile .................................................................. 58
4.2.2.2 Activate the VoIP Profile ................................................................................... 60
4.2.3 Configure the Guest Network ..................................................................................... 60
4.2.3.1 Set Up Security for the Guest Profile ................................................................ 61
4.2.3.2 Set up Layer-2 Isolation .................................................................................... 62
4.2.3.3 Activate the Guest Profile ................................................................................. 63
4.2.4 Testing the Wireless Networks ................................................................................... 64
Part II: The Web Configurator ............................................................... 65
Chapter 5
System Screens ...................................................................................................................... 67
5.1 System Overview ................................................................................................................. 67
5.2 Configuring General Setup ..................................................................................................67
5.3 Administrator Authentication on RADIUS ............................................................................ 68
5.4 Configuring Password ......................................................................................................... 68
5.5 Configuring Time Setting ..................................................................................................... 70
5.5.1 Resetting the Time ..................................................................................................... 71
Chapter 6
Wireless Configuration.......................................................................................................... 73
6.1 Wireless LAN Overview ....................................................................................................... 73
6.1.1 BSS ............................................................................................................................ 73
6.1.2 ESS ............................................................................................................................ 74
12
G-3000 Series User’s Guide
Table of Contents
6.2 Wireless LAN Basics ........................................................................................................... 74
6.3 Quality of Service ................................................................................................................ 75
6.3.1 WMM QoS ..................................................................................................................75
6.3.1.1 WMM QoS Priorities ......................................................................................... 75
6.3.2 Type Of Service (ToS) ................................................................................................ 75
6.3.2.1 DiffServ ............................................................................................................. 75
6.3.2.2 DSCP and Per-Hop Behavior ........................................................................... 75
6.3.3 ToS (Type of Service) and WMM QoS ....................................................................... 76
6.4 Spanning Tree Protocol (STP) ............................................................................................. 76
6.4.1 Rapid STP .................................................................................................................. 76
6.4.2 STP Terminology ........................................................................................................ 76
6.4.3 How STP Works ......................................................................................................... 77
6.4.4 STP Port States ..........................................................................................................77
6.5 Wireless Screen Overview .................................................................................................. 78
6.6 Configuring Wireless Settings ............................................................................................. 78
6.6.1 Access Point Mode .................................................................................................... 78
6.6.2 Bridge/Repeater Mode ............................................................................................... 81
6.6.3 AP+Bridge Mode ........................................................................................................ 84
6.6.4 MESSID Mode ........................................................................................................... 85
Chapter 7
Wireless Security Configuration ........................................................................................... 87
7.1 Wireless Security Overview .................................................................................................87
7.1.1 Encryption .................................................................................................................. 87
7.1.2 Authentication ............................................................................................................ 87
7.1.3 Restricted Access ...................................................................................................... 87
7.1.4 Hide Identity ............................................................................................................... 88
7.1.5 WEP Encryption ......................................................................................................... 88
7.2 802.1x Overview .................................................................................................................. 88
7.3 EAP Authentication Overview .............................................................................................. 88
7.4 Introduction to WPA ............................................................................................................. 89
7.4.1 User Authentication ................................................................................................... 89
7.4.2 Encryption ................................................................................................................. 89
7.4.3 WPA(2)-PSK Application Example ............................................................................. 90
7.5 WPA(2) with RADIUS Application Example ......................................................................... 90
7.6 Security Modes .................................................................................................................... 91
7.7 Security Modes and Wireless Client Compatibility .............................................................. 92
7.8 Wireless Client WPA Supplicants ........................................................................................ 92
7.9 Wireless Security Effectiveness ........................................................................................... 93
7.10 Configuring Security .......................................................................................................... 93
7.10.1 Security: None ..........................................................................................................94
7.10.2 Security: No-Access ................................................................................................. 95
7.10.3 Security: WEP .......................................................................................................... 96
G-3000 Series User’s Guide
13
Table of Contents
7.10.4 Security: 802.1x Only, 802.1x Static 64-bit, 802.1x Static 128-bit ............................ 97
7.10.5 Security: 802.1x Dynamic 64-bit or 802.1x Dynamic 128-bit ................................... 98
7.10.6 Security: WPA, WPA2, WPA-MIX or WPA2-MIX ...................................................... 99
7.10.7 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ................................................ 100
7.11 Introduction to RADIUS ....................................................................................................102
7.12 Configuring RADIUS ........................................................................................................102
7.13 Configuring Local User Database .................................................................................... 104
Chapter 8
MESSID and SSID .................................................................................................................105
8.1 Wireless LAN Infrastructures ............................................................................................. 105
8.1.1 MESSID ...................................................................................................................105
8.1.2 Notes on Multiple ESS ............................................................................................. 105
8.1.3 Multiple ESS Example .............................................................................................. 105
8.1.4 Multiple ESS with VLAN Example ............................................................................ 106
8.1.5 Configuring Multiple ESSs ....................................................................................... 106
8.2 SSID .................................................................................................................................. 109
8.2.1 The SSID Screen ..................................................................................................... 109
8.2.2 Configuring SSID ...................................................................................................... 111
8.2.3 Second Rx VLAN ID ..................................................................................................113
Chapter 9
Other Wireless Configuration.............................................................................................. 115
9.1 Layer-2 Isolation Introduction .............................................................................................115
9.2 Configuring Layer-2 Isolation ..............................................................................................116
9.2.1 Layer-2 Isolation Examples .......................................................................................117
9.2.1.1 Layer-2 Isolation Example 1 ............................................................................117
9.2.1.2 Layer-2 Isolation Example 2 ............................................................................118
9.3 Configuring MAC Filter .......................................................................................................119
9.4 Configuring Roaming ......................................................................................................... 121
9.4.1 Requirements for Roaming ...................................................................................... 122
Chapter 10
IP Screen................................................................................................................................ 123
10.1 Factory Ethernet Defaults ................................................................................................ 123
10.2 TCP/IP Parameters .........................................................................................................123
10.2.1 WAN IP Address Assignment ................................................................................. 123
10.3 Configuring IP .................................................................................................................. 124
Chapter 11
Remote Management Screens............................................................................................. 127
14
11.1 Remote Management Overview ...................................................................................... 127
11.1.1 Remote Management Limitations ........................................................................... 127
G-3000 Series User’s Guide
Table of Contents
11.1.2 System Timeout ..................................................................................................... 128
11.2 Configuring Telnet ............................................................................................................ 128
11.3 Configuring FTP ............................................................................................................... 129
11.4 WWW (HTTP and HTTPS) ............................................................................................. 129
11.5 Configuring WWW ...........................................................................................................130
11.6 HTTPS Example .............................................................................................................. 132
11.6.1 Internet Explorer Warning Messages ..................................................................... 132
11.6.2 Netscape Navigator Warning Messages ................................................................ 133
11.6.3 Avoiding the Browser Warning Messages .............................................................. 134
11.6.4 Login Screen .......................................................................................................... 134
11.7 SNMP ............................................................................................................................... 137
11.7.1 Supported MIBs ...................................................................................................... 138
11.7.2 SNMP Traps ........................................................................................................... 138
11.8 SNMP Traps .................................................................................................................... 139
11.8.1 Configuring SNMP .................................................................................................. 139
Chapter 12
Auth Server............................................................................................................................ 141
12.1 Auth Server Overview ......................................................................................................141
12.2 Internal RADIUS Server Setting ...................................................................................... 142
12.3 Trusted AP Overview .......................................................................................................144
12.4 Configuring Trusted AP ................................................................................................... 144
12.5 Trusted Users Overview .................................................................................................. 146
Chapter 13
Certificates ............................................................................................................................147
13.1 Certificates Overview ....................................................................................................... 147
13.1.1 Advantages of Certificates ..................................................................................... 148
13.2 Self-signed Certificates .................................................................................................... 148
13.3 Verifying a Certificate ....................................................................................................... 148
13.3.1 Checking the Fingerprint of a Certificate on Your Computer .................................. 148
13.4 Configuration Summary ................................................................................................... 149
13.5 My Certificates ................................................................................................................. 149
13.6 Certificate File Formats .................................................................................................... 151
13.7 Importing a Certificate ..................................................................................................... 152
13.8 Creating a Certificate ....................................................................................................... 153
13.9 My Certificate Details ....................................................................................................... 156
13.10 Trusted CAs ................................................................................................................... 159
13.11 Importing a Trusted CA’s Certificate .............................................................................. 161
13.12 Trusted CA Certificate Details ....................................................................................... 162
Chapter 14
Log Screens ..........................................................................................................................165
G-3000 Series User’s Guide
15
Table of Contents
14.1 Configuring View Log ....................................................................................................... 165
14.2 Configuring Log Settings ................................................................................................. 167
14.3 Example Log Messages .................................................................................................. 169
14.4 Log Commands ............................................................................................................... 170
14.4.1 Configuring What You Want the ZyXEL Device to Log .......................................... 170
14.4.2 Displaying Logs ...................................................................................................... 171
14.5 Log Command Example .................................................................................................. 171
Chapter 15
VLAN ...................................................................................................................................... 173
15.1 VLAN ............................................................................................................................... 173
15.1.1 Management VLAN ID ........................................................................................... 173
15.1.2 VLAN Tagging ........................................................................................................ 173
15.2 Configuring VLAN ............................................................................................................ 174
15.2.1 VLAN ...................................................................................................................... 174
15.2.2 Configuring Management VLAN Example ............................................................. 176
15.2.3 Configuring Microsoft’s IAS Server Example ......................................................... 178
15.2.3.1 Configuring VLAN Groups ............................................................................ 179
15.2.3.2 Configuring Remote Access Policies ............................................................ 180
15.2.4 Second Rx VLAN ID Example ................................................................................ 186
15.2.4.1 Second Rx VLAN Setup Example ................................................................ 187
Chapter 16
Maintenance .......................................................................................................................... 189
16.1 Maintenance Overview .................................................................................................... 189
16.2 System Status Screen ..................................................................................................... 189
16.2.1 System Statistics .................................................................................................... 190
16.3 Association List ................................................................................................................ 191
16.4 Channel Usage ................................................................................................................ 192
16.5 F/W Upload Screen .........................................................................................................193
16.6 Configuration Screen ....................................................................................................... 195
16.6.1 Backup Configuration ............................................................................................. 196
16.6.2 Restore Configuration ........................................................................................... 196
16.6.3 Back to Factory Defaults ........................................................................................ 197
16.7 Restart Screen ................................................................................................................. 197
Part III: SMT and Troubleshooting...................................................... 199
Chapter 17
Introducing the SMT .............................................................................................................201
16
17.1 Accessing the SMT via the Console Port ........................................................................ 201
G-3000 Series User’s Guide
Table of Contents
17.1.1 Initial Screen ..........................................................................................................201
17.2 Connect to your ZyXEL Device Using Telnet ................................................................... 202
17.3 Entering the Password .................................................................................................... 202
17.4 Changing the System Password ..................................................................................... 202
17.5 Navigating the SMT Interface .......................................................................................... 203
17.5.1 SMT Main Menu Summary .................................................................................... 204
17.6 SMT Menus Overview .................................................................................................... 205
Chapter 18
General Setup........................................................................................................................ 207
18.1 General Setup ................................................................................................................. 207
18.1.1 Procedure To Configure Menu 1 ............................................................................ 207
Chapter 19
LAN Setup.............................................................................................................................. 209
19.1 LAN Setup ....................................................................................................................... 209
19.2 TCP/IP Ethernet Setup .................................................................................................... 209
19.3 Wireless LAN Setup ........................................................................................................210
19.3.1 Configuring MAC Address Filter ............................................................................. 212
19.3.2 Configuring Roaming ............................................................................................. 214
19.3.3 Configuring Bridge Link .......................................................................................... 215
19.3.4 Configuring Layer-2 Isolation ................................................................................. 217
19.3.5 Configuring SSID Profiles ...................................................................................... 218
Chapter 20
Dial-in User Setup................................................................................................................. 221
20.1 Dial-in User Setup ........................................................................................................... 221
Chapter 21
VLAN Setup ...........................................................................................................................223
21.1 VLAN Setup ..................................................................................................................... 223
Chapter 22
SNMP Configuration.............................................................................................................225
22.1 SNMP Configuration ........................................................................................................225
Chapter 23
System Security.................................................................................................................... 227
23.1 System Password ............................................................................................................ 227
23.2 Configuring Wireless Security Profiles ............................................................................ 227
Chapter 24
System Information and Diagnosis..................................................................................... 231
G-3000 Series User’s Guide
17
Table of Contents
24.1 System Status .................................................................................................................. 231
24.2 System Information .......................................................................................................... 233
24.2.1 System Information ................................................................................................ 233
24.2.2 Console Port Speed ............................................................................................... 234
24.3 Log and Trace .................................................................................................................. 234
24.3.1 Viewing Error Log ................................................................................................... 234
24.4 Diagnostic ........................................................................................................................ 235
Chapter 25
Firmware and Configuration File Maintenance..................................................................237
25.1 Filename Conventions ..................................................................................................... 237
25.2 Backup Configuration ......................................................................................................238
25.2.1 Backup Configuration Using FTP ........................................................................... 238
25.2.2 Using the FTP Command from the DOS Prompt ................................................... 239
25.2.3 Backup Configuration Using TFTP ......................................................................... 240
25.2.4 Example: TFTP Command ..................................................................................... 240
25.2.5 Backup Via Console Port ....................................................................................... 241
25.3 Restore Configuration ..................................................................................................... 242
25.3.1 Restore Using FTP ................................................................................................. 242
25.4 Uploading Firmware and Configuration Files .................................................................. 242
25.4.1 Firmware Upload .................................................................................................... 243
25.4.2 Configuration File Upload ....................................................................................... 243
25.4.3 Using the FTP command from the DOS Prompt Example ..................................... 244
25.4.4 TFTP File Upload ................................................................................................... 245
25.4.5 Example: TFTP Command ..................................................................................... 246
25.4.6 Uploading Via Console Port ................................................................................... 246
25.4.7 Uploading Firmware File Via Console Port ............................................................ 246
25.4.8 Example Xmodem Firmware Upload Using HyperTerminal ................................... 246
25.4.9 Uploading Configuration File Via Console Port ...................................................... 247
25.4.10 Example Xmodem Configuration Upload Using HyperTerminal ........................... 248
Chapter 26
System Maintenance and Information ................................................................................249
26.1 Command Interpreter Mode ............................................................................................ 249
26.1.1 Command Syntax ................................................................................................... 250
26.1.2 Command Usage ................................................................................................... 250
26.1.3 Brute-Force Password Guessing Protection .......................................................... 250
26.1.3.1 Configuring Brute-Force Password Guessing Protection: Example ............. 250
26.2 Time and Date Setting .....................................................................................................251
26.3 Remote Management Setup ............................................................................................ 252
26.3.1 Telnet ...................................................................................................................... 252
26.3.2 FTP ........................................................................................................................ 252
26.3.3 Web ........................................................................................................................ 252
18
G-3000 Series User’s Guide
Table of Contents
26.3.4 Remote Management Setup .................................................................................. 253
26.3.5 Remote Management Limitations .......................................................................... 254
26.4 System Timeout ............................................................................................................... 254
Chapter 27
Troubleshooting.................................................................................................................... 255
27.1 Power, Hardware Connections, and LEDs ...................................................................... 255
27.2 ZyXEL Device Access and Login .................................................................................... 255
27.3 Internet Access ................................................................................................................ 257
Part IV: Appendices and Index ........................................................... 259
Appendix A Product Specifications.......................................................................................261
Appendix B Setting up Your Computer’s IP Address............................................................ 267
Appendix C IP Addresses and Subnetting ........................................................................... 283
Appendix D IP Address Assignment Conflicts......................................................................291
Appendix E Wireless LANs ..................................................................................................295
Appendix F Pop-up Windows, JavaScripts and Java Permissions ...................................... 309
Appendix G Importing Certificates........................................................................................ 315
Appendix H Text File Based Auto Configuration ..................................................................327
Appendix I Wireless LAN Manager ......................................................................................335
Appendix J Legal Information ...............................................................................................349
Appendix K Customer Support .............................................................................................353
Index....................................................................................................................................... 357
G-3000 Series User’s Guide
19
Table of Contents
20
G-3000 Series User’s Guide
List of Figures
List of Figures
Figure 1 Access Point Application .......................................................................................................... 36
Figure 2 Bridge Application .................................................................................................................... 37
Figure 3 Repeater Application ................................................................................................................ 37
Figure 4 AP+Bridge Application ............................................................................................................. 38
Figure 5 Multiple BSSs ........................................................................................................................... 39
Figure 6 Change Password Screen ........................................................................................................ 42
Figure 7 Replace Certificate Screen ....................................................................................................... 42
Figure 8 The MAIN MENU Screen of the Web Configurator .................................................................. 43
Figure 9 Wizard 1 : General Setup ......................................................................................................... 46
Figure 10 Wizard 2 : Wireless LAN Setup .............................................................................................. 47
Figure 11 Wizard 3 : IP Address Assignment ......................................................................................... 49
Figure 12 Wizard 4 : Setup Complete .................................................................................................... 51
Figure 13 Tutorial: Example MESSID Setup .......................................................................................... 54
Figure 14 Tutorial: Wireless LAN: Before ............................................................................................... 55
Figure 15 Tutorial: Wireless LAN: Change Mode ................................................................................... 56
Figure 16 Tutorial: WIRELESS > SSID .................................................................................................. 57
Figure 17 Tutorial: VoIP SSID Profile Edit .............................................................................................. 58
Figure 18 Tutorial: VoIP Security ............................................................................................................ 59
Figure 19 Tutorial: VoIP Security Profile Edit .......................................................................................... 59
Figure 20 Tutorial: VoIP Security: Updated ............................................................................................ 60
Figure 21 Tutorial: Activate VoIP Profile ................................................................................................. 60
Figure 22 Tutorial: Guest Edit ................................................................................................................. 61
Figure 23 Tutorial: Guest Security Profile Edit ........................................................................................ 62
Figure 24 Tutorial: Guest Security: Updated .......................................................................................... 62
Figure 25 Tutorial: Layer 2 Isolation ....................................................................................................... 63
Figure 26 Tutorial: Activate Guest Profile ............................................................................................... 63
Figure 27 System General Setup ........................................................................................................... 67
Figure 28 Password. ............................................................................................................................... 69
Figure 29 Time Setting ........................................................................................................................... 70
Figure 30 Basic Service set .................................................................................................................... 73
Figure 31 Extended Service Set ............................................................................................................. 74
Figure 32 DiffServ: Differentiated Service Field ...................................................................................... 76
Figure 33 Wireless: Access Point ........................................................................................................... 79
Figure 34 Bridging Example ................................................................................................................... 81
Figure 35 Bridge Loop: Two Bridges Connected to Switch .................................................................... 82
Figure 36 Bridge Loop: Bridge Connected to Wired LAN ....................................................................... 82
Figure 37 Wireless: Bridge/Repeater ..................................................................................................... 83
Figure 38 Wireless: AP+Bridge .............................................................................................................. 84
G-3000 Series User’s Guide
21
List of Figures
Figure 39 EAP Authentication ................................................................................................................ 88
Figure 40 WPA(2)-PSK Authentication ................................................................................................... 90
Figure 41 WPA(2) with RADIUS Application Example ........................................................................... 91
Figure 42 Security .................................................................................................................................. 94
Figure 43 Security: None ........................................................................................................................ 95
Figure 44 Security: No-Access ............................................................................................................... 95
Figure 45 Security: WEP ........................................................................................................................ 96
Figure 46 Security: 802.1x Static 64-bit, 802.1x Static 128-bit .............................................................. 97
Figure 47 Security: WPA, 802.1x Dynamic 64-bit, 802.1x Dynamic 128-bit or WPA-MIX ..................... 99
Figure 48 Security:WPA2 or WPA2-MIX ............................................................................................... 100
Figure 49 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ........................................................... 101
Figure 50 RADIUS ................................................................................................................................ 102
Figure 51 Local User Database ........................................................................................................... 104
Figure 52 Multiple ESS with VLAN Example ........................................................................................ 106
Figure 53 Wireless: Multiple ESS ......................................................................................................... 107
Figure 54 SSID ......................................................................................................................................110
Figure 55 Configuring SSID ...................................................................................................................111
Figure 56 Second Rx VLAN ID Example ...............................................................................................113
Figure 57 Configuring SSID: Second Rx VLAN ID Example .................................................................114
Figure 58 Layer-2 Isolation Application .................................................................................................115
Figure 59 Layer-2 Isolation Configuration Screen .................................................................................116
Figure 60 Layer-2 Isolation Example .....................................................................................................117
Figure 61 Layer-2 Isolation Example 1 ..................................................................................................118
Figure 62 Layer-2 Isolation Example 2 ..................................................................................................119
Figure 63 MAC Address Filter .............................................................................................................. 120
Figure 64 Roaming Example ................................................................................................................ 121
Figure 65 Roaming ............................................................................................................................... 122
Figure 66 IP Setup ................................................................................................................................ 124
Figure 67 Remote Management: Telnet ............................................................................................... 128
Figure 68 Remote Management: FTP .................................................................................................. 129
Figure 69 HTTPS Implementation ........................................................................................................ 130
Figure 70 Remote Management: WWW ...............................................................................................131
Figure 71 Security Alert Dialog Box (Internet Explorer) ........................................................................132
Figure 72 Security Certificate 1 (Netscape) .......................................................................................... 133
Figure 73 Security Certificate 2 (Netscape) .......................................................................................... 133
Figure 74 Example: Lock Denoting a Secure Connection) ................................................................... 135
Figure 75 Replace Certificate ............................................................................................................... 135
Figure 76 Device-specific Certificate .................................................................................................... 136
Figure 77 Common ZyXEL Device Certificate ......................................................................................136
Figure 78 SNMP Management Model .................................................................................................. 137
Figure 79 Remote Management: SNMP ..............................................................................................140
Figure 80 ZyXEL Device Authenticates Wireless Stations ................................................................... 141
Figure 81 ZyXEL Device Authenticates other AP’s .............................................................................. 142
22
G-3000 Series User’s Guide
List of Figures
Figure 82 Internal RADIUS Server Setting Screen .............................................................................. 143
Figure 83 Trusted AP Overview ............................................................................................................ 144
Figure 84 Trusted AP Screen ............................................................................................................... 145
Figure 85 Certificates on Your Computer ............................................................................................. 148
Figure 86 Certificate Details ................................................................................................................ 149
Figure 87 My Certificates ...................................................................................................................... 150
Figure 88 My Certificate Import ............................................................................................................ 153
Figure 89 My Certificate Create ............................................................................................................ 154
Figure 90 My Certificate Details ........................................................................................................... 157
Figure 91 Trusted CAs .......................................................................................................................... 160
Figure 92 Trusted CA Import ................................................................................................................ 161
Figure 93 Trusted CA Details ............................................................................................................... 162
Figure 94 View Log ............................................................................................................................... 166
Figure 95 Log Settings ......................................................................................................................... 167
Figure 96 VLAN .................................................................................................................................... 175
Figure 97 Management VLAN Configuration Example ......................................................................... 176
Figure 98 VLAN-Aware Switch - Static VLAN ....................................................................................... 177
Figure 99 VLAN-Aware Switch ............................................................................................................. 177
Figure 100 VLAN-Aware Switch - VLAN Status .................................................................................... 177
Figure 101 VLAN Setup ........................................................................................................................ 178
Figure 102 New Global Security Group ............................................................................................... 179
Figure 103 Add Group Members ......................................................................................................... 180
Figure 104 New Remote Access Policy for VLAN Group .................................................................... 181
Figure 105 Specifying Windows-Group Condition ................................................................................ 181
Figure 106 Adding VLAN Group .......................................................................................................... 181
Figure 107 Granting Permissions and User Profile Screens ............................................................... 182
Figure 108 Authentication Tab Settings ................................................................................................ 182
Figure 109 Encryption Tab Settings ..................................................................................................... 183
Figure 110 Connection Attributes Screen ............................................................................................ 183
Figure 111 RADIUS Attribute Screen ................................................................................................... 184
Figure 112 802 Attribute Setting for Tunnel-Medium-Type .................................................................. 184
Figure 113 VLAN ID Attribute Setting for Tunnel-Pvt-Group-ID ........................................................... 185
Figure 114 VLAN Attribute Setting for Tunnel-Type .............................................................................185
Figure 115 Completed Advanced Tab ................................................................................................. 186
Figure 116 Second Rx VLAN ID Example ............................................................................................ 187
Figure 117 Configuring SSID: Second Rx VLAN ID Example .............................................................. 188
Figure 118 System Status ..................................................................................................................... 189
Figure 119 System Status: Show Statistics ........................................................................................... 190
Figure 120 Association List .................................................................................................................. 191
Figure 121 Channel Usage ................................................................................................................... 192
Figure 122 Firmware Upload ................................................................................................................ 193
Figure 123 Firmware Upload In Process .............................................................................................. 194
Figure 124 Network Temporarily Disconnected ....................................................................................194
G-3000 Series User’s Guide
23
List of Figures
Figure 125 Firmware Upload Error ....................................................................................................... 195
Figure 126 Configuration ...................................................................................................................... 195
Figure 127 Configuration Upload Successful ....................................................................................... 196
Figure 128 Network Temporarily Disconnected ....................................................................................196
Figure 129 Configuration Upload Error ................................................................................................. 197
Figure 130 Reset Warning Message .................................................................................................... 197
Figure 131 Restart Screen ................................................................................................................... 198
Figure 132 Initial Screen ....................................................................................................................... 201
Figure 133 Login ................................................................................................................................... 202
Figure 134 Menu 23 System Security .................................................................................................. 202
Figure 135 Menu 23.1 System Security: Change Password ................................................................ 203
Figure 136 SMT Main Menu ................................................................................................................. 204
Figure 137 Menu 1 General Setup ....................................................................................................... 207
Figure 138 Menu 3 LAN Setup ............................................................................................................ 209
Figure 139 Menu 3.2 TCP/IP Setup ..................................................................................................... 209
Figure 140 Menu 3.5 Wireless LAN Setup ........................................................................................... 210
Figure 141 Menu 3.5 Wireless LAN Setup ........................................................................................... 213
Figure 142 Menu 3.5.1 WLAN MAC Address Filter .............................................................................. 213
Figure 143 Menu 3.5 Wireless LAN Setup ........................................................................................... 214
Figure 144 Menu 3.5.2 - Roaming Configuration ................................................................................ 215
Figure 145 Menu 3.5 Wireless LAN Setup ........................................................................................... 216
Figure 146 Menu 3.5.4 Bridge Link Configuration ................................................................................216
Figure 147 Menu 3.5 Wireless LAN Setup ........................................................................................... 217
Figure 148 Menu 3.5.5 - Layer-2 Isolation ............................................................................................ 218
Figure 149 Menu 3.5 Wireless LAN Setup ........................................................................................... 219
Figure 150 Menu 3.5.6 - SSID Profile Edit ........................................................................................... 219
Figure 151 Menu 14- Dial-in User Setup .............................................................................................. 221
Figure 152 Menu 14.1- Edit Dial-in User .............................................................................................. 221
Figure 153 Menu 16 VLAN Setup ......................................................................................................... 224
Figure 154 Menu 22 SNMP Configuration ............................................................................................ 225
Figure 155 Menu 23 System Security .................................................................................................. 227
Figure 156 Menu 23.5 - Security Profile Edit ........................................................................................ 228
Figure 157 Menu 24 System Maintenance ........................................................................................... 231
Figure 158 Menu 24.1 System Maintenance: Status ............................................................................ 232
Figure 159 Menu 24.2 System Information and Console Port Speed .................................................. 233
Figure 160 Menu 24.2.1 System Information: Information ................................................................... 233
Figure 161 Menu 24.2.2 System Maintenance: Change Console Port Speed ..................................... 234
Figure 162 Menu 24.3 System Maintenance: Log and Trace ............................................................... 235
Figure 163 Sample Error and Information Messages ........................................................................... 235
Figure 164 Menu 24.4 System Maintenance: Diagnostic ..................................................................... 235
Figure 165 Menu 24.5 Backup Configuration ....................................................................................... 238
Figure 166 FTP Session Example ........................................................................................................ 239
Figure 167 System Maintenance: Backup Configuration ..................................................................... 241
24
G-3000 Series User’s Guide
List of Figures
Figure 168 System Maintenance: Starting Xmodem Download Screen ............................................... 241
Figure 169 Backup Configuration Example .......................................................................................... 241
Figure 170 Successful Backup Confirmation Screen ........................................................................... 241
Figure 171 Menu 24.6 Restore Configuration ...................................................................................... 242
Figure 172 Menu 24.7 System Maintenance: Upload Firmware .......................................................... 243
Figure 173 Menu 24.7.1 System Maintenance: Upload System Firmware .......................................... 243
Figure 174 Menu 24.7.2 System Maintenance: Upload System Configuration File ............................. 244
Figure 175 FTP Session Example ........................................................................................................ 245
Figure 176 Menu 24.7.1 as seen using the Console Port .................................................................... 246
Figure 177 Example Xmodem Upload .................................................................................................. 247
Figure 178 Menu 24.7.2 as seen using the Console Port ................................................................... 247
Figure 179 Example Xmodem Upload .................................................................................................. 248
Figure 180 Menu 24 System Maintenance ........................................................................................... 249
Figure 181 Valid CI Commands ............................................................................................................ 250
Figure 182 Menu 24.10 System Maintenance: Time and Date Setting ................................................ 251
Figure 183 Telnet Configuration on a TCP/IP Network ......................................................................... 252
Figure 184 Menu 24.11 Remote Management Control ........................................................................ 253
Figure 185 WIndows 95/98/Me: Network: Configuration ...................................................................... 268
Figure 186 Windows 95/98/Me: TCP/IP Properties: IP Address .......................................................... 269
Figure 187 Windows 95/98/Me: TCP/IP Properties: DNS Configuration .............................................. 270
Figure 188 Windows XP: Start Menu .................................................................................................... 271
Figure 189 Windows XP: Control Panel ............................................................................................... 271
Figure 190 Windows XP: Control Panel: Network Connections: Properties ......................................... 272
Figure 191 Windows XP: Local Area Connection Properties ............................................................... 272
Figure 192 Windows XP: Internet Protocol (TCP/IP) Properties .......................................................... 273
Figure 193 Windows XP: Advanced TCP/IP Properties ....................................................................... 274
Figure 194 Windows XP: Internet Protocol (TCP/IP) Properties .......................................................... 275
Figure 195 Macintosh OS 8/9: Apple Menu .......................................................................................... 276
Figure 196 Macintosh OS 8/9: TCP/IP ................................................................................................. 276
Figure 197 Macintosh OS X: Apple Menu ............................................................................................ 277
Figure 198 Macintosh OS X: Network .................................................................................................. 278
Figure 199 Red Hat 9.0: KDE: Network Configuration: Devices ......................................................... 279
Figure 200 Red Hat 9.0: KDE: Ethernet Device: General .................................................................. 279
Figure 201 Red Hat 9.0: KDE: Network Configuration: DNS ............................................................... 280
Figure 202 Red Hat 9.0: KDE: Network Configuration: Activate ........................................................ 280
Figure 203 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 ............................................... 281
Figure 204 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 ................................................... 281
Figure 205 Red Hat 9.0: DNS Settings in resolv.conf ........................................................................ 281
Figure 206 Red Hat 9.0: Restart Ethernet Card ................................................................................. 281
Figure 207 Red Hat 9.0: Checking TCP/IP Properties ....................................................................... 282
Figure 208 Network Number and Host ID ............................................................................................ 284
Figure 209 Subnetting Example: Before Subnetting ............................................................................ 286
Figure 210 Subnetting Example: After Subnetting ............................................................................... 287
G-3000 Series User’s Guide
25
List of Figures
Figure 211 IP Address Conflicts: Case A .............................................................................................. 291
Figure 212 IP Address Conflicts: Case B ............................................................................................. 292
Figure 213 IP Address Conflicts: Case C ............................................................................................. 292
Figure 214 IP Address Conflicts: Case D ............................................................................................. 293
Figure 215 Peer-to-Peer Communication in an Ad-hoc Network ......................................................... 295
Figure 216 Basic Service Set ............................................................................................................... 296
Figure 217 Infrastructure WLAN ........................................................................................................... 297
Figure 218 RTS/CTS ........................................................................................................................... 298
Figure 219 WPA(2) with RADIUS Application Example ....................................................................... 305
Figure 220 WPA(2)-PSK Authentication ............................................................................................... 306
Figure 221 Pop-up Blocker ................................................................................................................... 309
Figure 222 Internet Options: Privacy .................................................................................................... 310
Figure 223 Internet Options: Privacy .....................................................................................................311
Figure 224 Pop-up Blocker Settings ......................................................................................................311
Figure 225 Internet Options: Security ................................................................................................... 312
Figure 226 Security Settings - Java Scripting ....................................................................................... 313
Figure 227 Security Settings - Java ...................................................................................................... 313
Figure 228 Java (Sun) .......................................................................................................................... 314
Figure 229 Security Certificate ............................................................................................................. 315
Figure 230 Login Screen ...................................................................................................................... 316
Figure 231 Certificate General Information before Import .................................................................... 316
Figure 232 Certificate Import Wizard 1 ................................................................................................. 317
Figure 233 Certificate Import Wizard 2 ................................................................................................. 317
Figure 234 Certificate Import Wizard 3 ................................................................................................. 318
Figure 235 Root Certificate Store ......................................................................................................... 318
Figure 236 Certificate General Information after Import ....................................................................... 319
Figure 237 ZyXEL Device Trusted CA Screen ..................................................................................... 320
Figure 238 CA Certificate Example ...................................................................................................... 321
Figure 239 Personal Certificate Import Wizard 1 .................................................................................. 321
Figure 240 Personal Certificate Import Wizard 2 .................................................................................. 322
Figure 241 Personal Certificate Import Wizard 3 .................................................................................. 322
Figure 242 Personal Certificate Import Wizard 4 .................................................................................. 323
Figure 243 Personal Certificate Import Wizard 5 .................................................................................. 323
Figure 244 Personal Certificate Import Wizard 6 .................................................................................. 323
Figure 245 Access the ZyXEL Device Via HTTPS ............................................................................... 324
Figure 246 SSL Client Authentication ................................................................................................... 324
Figure 247 ZyXEL Device Secure Login Screen .................................................................................. 324
Figure 248 Text File Based Auto Configuration .................................................................................... 327
Figure 249 Configuration File Format ................................................................................................... 329
Figure 250 WEP Configuration File Example ....................................................................................... 330
Figure 251 802.1X Configuration File Example .................................................................................... 331
Figure 252 WPA-PSK Configuration File Example ............................................................................... 331
Figure 253 WPA Configuration File Example ....................................................................................... 332
26
G-3000 Series User’s Guide
List of Figures
Figure 254 wlan Configuration File Example ........................................................................................ 333
Figure 255 EMS Installation Wizard: Welcome Screen ....................................................................... 336
Figure 256 EMS Installation Wizard: Choose Destination Screen ...................................................... 336
Figure 257 EMS Installation Wizard: Complete Screen ...................................................................... 337
Figure 258 Starting the SNMPc Network Manager .............................................................................. 338
Figure 259 Accessing the SNMPc Startup Settings ............................................................................ 338
Figure 260 SNMPc Task Setup Screen ............................................................................................... 339
Figure 261 Accessing the Compile Mibs Screen .................................................................................. 339
Figure 262 Compile Mibs Screen ........................................................................................................ 340
Figure 263 Add Mib files Screen .......................................................................................................... 340
Figure 264 Compile Mibs Screen ........................................................................................................ 340
Figure 265 Compile Mibs Confirm Screen ............................................................................................ 341
Figure 266 Compile Mib OK Screen .................................................................................................... 341
Figure 267 Selecting the Root Subnet ................................................................................................ 342
Figure 268 Accessing the MAP Object Properties Screen ................................................................... 342
Figure 269 MAP Object Properties: General ...................................................................................... 342
Figure 270 MAP Object Properties: Access ......................................................................................... 343
Figure 271 Device Icon ......................................................................................................................... 343
Figure 272 Accessing the Discovery/Polling Agents Screen ................................................................ 344
Figure 273 Discovery/Polling Agents Screen ....................................................................................... 344
Figure 274 Device Icon ......................................................................................................................... 345
Figure 275 MAP Object Properties: Access ......................................................................................... 345
Figure 276 WLM EMS Screen ............................................................................................................ 346
G-3000 Series User’s Guide
27
List of Figures
28
G-3000 Series User’s Guide
List of Tables
List of Tables
Table 1 Wizard 1 : General Setup .......................................................................................................... 46
Table 2 Wizard 2 : Wireless LAN Setup ................................................................................................. 47
Table 3 Private IP Address Ranges ....................................................................................................... 48
Table 4 Wizard 3 : IP Address Assignment ........................................................................................... 49
Table 5 Tutorial: Example Information ................................................................................................... 55
Table 6 System General Setup .............................................................................................................. 67
Table 7 Password .................................................................................................................................. 69
Table 8 Time Setting .............................................................................................................................. 71
Table 9 WMM QoS Priorities ................................................................................................................. 75
Table 10 ToS and IEEE 802.1d to WMM QoS Priority Level Mapping .................................................. 76
Table 11 STP Path Costs ....................................................................................................................... 77
Table 12 STP Port States ...................................................................................................................... 77
Table 13 Wireless: Access Point ........................................................................................................... 79
Table 14 Wireless: Bridge/Repeater ...................................................................................................... 83
Table 15 Security Modes ....................................................................................................................... 91
Table 16 Security Modes for ZyXEL Device and Windows XP Wireless Client ..................................... 92
Table 17 Wireless Security Levels ......................................................................................................... 93
Table 18 Security ................................................................................................................................... 94
Table 19 Security: No-Access ................................................................................................................ 95
Table 20 Security: No-Access ................................................................................................................ 95
Table 21 Security: WEP ......................................................................................................................... 96
Table 22 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ................................................................97
Table 23 Security: 802.1x Dynamic 64-bit or 802.1x Dynamic 128-bit .................................................. 99
Table 24 Security: WPA2 or WPA2-MIX .............................................................................................. 100
Table 25 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ........................................................... 101
Table 26 RADIUS ................................................................................................................................ 103
Table 27 Local User Database ............................................................................................................ 104
Table 28 Wireless: Multiple ESS .......................................................................................................... 107
Table 29 SSID .......................................................................................................................................110
Table 30 Configuring SSID ................................................................................................................... 111
Table 31 Layer-2 Isolation Configuration ..............................................................................................117
Table 32 MAC Address Filter ............................................................................................................... 120
Table 33 Roaming ................................................................................................................................ 122
Table 34 Private IP Address Ranges ................................................................................................... 123
Table 35 IP Setup ................................................................................................................................ 124
Table 36 Remote Management Overview ...........................................................................................127
Table 37 Remote Management: Telnet ................................................................................................ 128
Table 38 Remote Management: FTP ................................................................................................... 129
G-3000 Series User’s Guide
29
List of Tables
Table 39 Remote Management: WWW ...............................................................................................131
Table 40 SNMP Traps .......................................................................................................................... 138
Table 41 SNMP Interface Index to Physical Port Mapping .................................................................. 139
Table 42 Remote Management: SNMP ............................................................................................... 140
Table 43 Internal RADIUS Server ........................................................................................................ 142
Table 44 My Certificates ...................................................................................................................... 143
Table 45 Trusted AP ............................................................................................................................ 145
Table 46 My Certificates ...................................................................................................................... 150
Table 47 My Certificate Import ............................................................................................................. 153
Table 48 My Certificate Create ............................................................................................................ 154
Table 49 My Certificate Details ............................................................................................................ 158
Table 50 Trusted CAs .......................................................................................................................... 160
Table 51 Trusted CA Import ................................................................................................................. 161
Table 52 Trusted CA Details ................................................................................................................ 163
Table 53 View Log ............................................................................................................................... 166
Table 54 Log Settings .......................................................................................................................... 168
Table 55 System Maintenance Logs .................................................................................................... 169
Table 56 ICMP Notes ........................................................................................................................... 169
Table 57 Sys log .................................................................................................................................. 170
Table 58 Log Categories and Available Settings ................................................................................. 170
Table 59 WIRELESS VLAN ................................................................................................................. 175
Table 60 Standard RADIUS Attributes ................................................................................................. 178
Table 61 System Status ....................................................................................................................... 189
Table 62 System Status: Show Statistics ............................................................................................. 190
Table 63 Association List ..................................................................................................................... 191
Table 64 Channel Usage ..................................................................................................................... 193
Table 65 Firmware Upload ................................................................................................................... 194
Table 66 Restore Configuration ........................................................................................................... 196
Table 67 Main Menu Commands ......................................................................................................... 203
Table 68 Main Menu Summary ............................................................................................................ 204
Table 69 SMT Menus Overview ........................................................................................................... 205
Table 70 Menu 1 General Setup .......................................................................................................... 207
Table 71 Menu 3.2 TCP/IP Setup ........................................................................................................ 210
Table 72 Menu 3.5 Wireless LAN Setup ...............................................................................................211
Table 73 Menu 3.5.1 WLAN MAC Address Filter ................................................................................ 214
Table 74 Menu 3.5.2 - Roaming Configuration .................................................................................... 215
Table 75 Menu 3.5.4 Bridge Link Configuration ................................................................................... 217
Table 76 Menu 3.5.5 - Layer-2 Isolation .............................................................................................. 218
Table 77 Menu 3.5.6 - SSID Profile Edit .............................................................................................. 220
Table 78 Menu 14.1- Edit Dial-in User ................................................................................................. 222
Table 79 Menu 16 VLAN Setup ........................................................................................................... 224
Table 80 Menu 22 SNMP Configuration .............................................................................................. 225
Table 81 Menu 3.5.6 - SSID Profile Edit .............................................................................................. 228
30
G-3000 Series User’s Guide