This manual is intended for people who want to configure the NWA using the web configurator.
Tips for Reading User’s Guides On-Screen
When reading a ZyXEL User’s Guide On-Screen, keep the following in mind:
• If you don’t already have the latest version of Adobe Reader, you can download it from http://
www.adobe.com.
• Use the PDF’s bookmarks to quickly navigate to the areas that interest you. Adobe Reader’s
bookmarks pane opens by default in all ZyXEL User’s Guide PDFs.
• If you know the page number or know vaguely which page-range you want to view, you can
enter a number in the toolbar in Reader, then press [ENTER] to jump directly to that page.
• Type [CTRL]+[F] to open the Adobe Reader search utility and enter a word or phrase. This can
help you quickly pinpoint the information you require. You can also enter text directly into the
toolbar in Reader.
• To quickly move around within a page, press the [SPACE] bar. This turns your cursor into a
“hand” with which you can grab the page and move it around freely on your screen.
• Embedded hyperlinks are actually cross-references to related text. Click them to jump to the
corresponding section of the User’s Guide PDF.
Related Documentation
•Quick Start Guide
The Quick Start Guide is designed to help you get your NWA up and running right away. It
contains information on setting up your network and configuring for Internet access.
•Support Disc
Refer to the included CD for support documents.
Documentation Feedback
Send your comments, questions or suggestions to: techwriters@zyxel.com.tw
Thank you!
The Technical Writing Team, ZyXEL Communications Corp.,
6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan.
NWA1100-N User’s Guide
3
Page 4
About This User's Guide
Need More Help?
More help is available at www.zyxel.com.
• Download Library
Search for the latest product updates and documentation from this link. Read the Tech Doc
Overview to find out how to efficiently use the documentation in order to better understand how
to use your product.
•Knowledge Base
If you have a specific question about your product, the answer may be here. This is a collection
of answers to previously asked questions about ZyXEL products.
•Forum
This contains discussions on ZyXEL products. Learn from others who use ZyXEL products and
share your experiences as well.
Customer Support
Should problems arise that cannot be solved by the methods listed above, you should contact your
vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you
bought the device.
See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following
information ready when you contact an office.
• Product model and serial number.
• Warrant y Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
4
NWA1100-N User’s Guide
Page 5
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
Warnings tell you about things that could harm you or your NWA.
Note: Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The NWA1100-N may be referred to as the “NWA”, the “device”, or the “ZyXEL Device” in this
User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the
“enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key. “Select”
or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel,
then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k”
for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so
on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
Icons Used in Figures
Figures in this User’s Guide use the following generic icons. The NWA icon is not an exact
representation of your NWA.
Graphics in this book may differ slightly from the product due to differences in operating systems,
operating system versions, or if you installed updated firmware/software for your device. Every
effort has been made to ensure that the information in this manual is accurate.
NWA1100-N User’s Guide
5
Page 6
Document Conventions
Ta ble 1 Common Icons
NWAComputerNotebook
ServerPrinterFirewall
SwitchRouterInternet Cloud
6
NWA1100-N User’s Guide
Page 7
Safety Warnings
Safety Warnings
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids .
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock
from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage
points or other risks. ONLY qualified service personnel should serv ice or disassemble this device. Please
contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for
example, 110V AC in North America or 230V AC in Europe).
• Do NOT remove the plug and connect it to a power outlet by itself; always attach the plug to the power
adaptor first before connecting it to a power outlet.
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the pro duct where an yone can
walk on the power adaptor or cord.
• Do NOT use the devi ce if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Do no t use the device outside, and make sure all the connections are indoors. There i s a remote risk of
electric shock from lightning.
• Do NOT obstruct the devi ce ventilation slots, as insufficient airflow may harm your device.
• Antenna Warning! This device meets ETSI and FCC certification requirements when using the inc luded
antenna(s). Only use the included antenna(s).
• If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged.
• The PoE (Power over Ethernet) devices that supply or receive power and their connected Ethernet cables
must all be completely indoors.
• This product is for indoor use only (utilisation intérieure exclusivement).
Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste
Electronics and Electrical Equipment. It means that used electrical and electronic products should not be
mixed with general waste. Used electrical and electronic equipment should be treated separately.
This chapter introduces the main applications and features of the NWA. It also discusses the ways
you can manage your NWA.
1.1 Introducing the NWA
Your NWA extends the range of your existing wired network without additional wiring, providing
easy network access to mobile users.
The NWA controls network access with MAC address filtering and RADIUS server authentication. It
also provides a high level of network traffic security, supporting IEEE 802.1x, Wi-Fi Protected
Access (WPA), WPA2 and WEP data encryption. Its Quality of Service (QoS) features allow you to
prioritize time-sensitive or highly important applications such as VoIP.
CHAPTER 1
Introducing the NWA
Your NWA is easy to install, configure and use. The embedded Web-based configurator enables
simple, straightforward management and maintenance.
See the Quick Start Guide for instructions on how to make hardware connections.
1.2 Applications for the NWA
The NWA can be configured to use the following WLAN operating modes:
1Access Point
2Bridge/Repeater
3AP + Bridge
4Wireless Client
5MBSSID
Applications for each operating mode are shown below.
NWA1100-N User’s Guide19
Page 20
Chapter 1 Introducing the NWA
1.2.1 Access Point
The NWA is an ideal access solution for wireless Internet connection. A typical Internet access
application for your NWA is shown as follows. Stations A, B and C can access the wired network
through the NWAs.
Figure 1 Access Point Application
1.2.2 Bridge / Repeater
The NWA can act as a wireless network bridge and establish wireless links with other APs. In the
figure below, the two NWAs (A and B) are connected to independent wired networks and have a
bridge connection (A can communicate with B) at the same time. A NWA in repeater mode (C in
Figure 3) has no Ethernet connection. When the NWA is in bridge mode, you should enable
Spanning Tree Protocol (STP) to prevent bridge loops.
When the NWA is in Bridge / Repeater mode, security between APs (the Wireless Distribution
System or WDS) is independent of the security between the wireless stations and the AP. If you do
not enable WDS security , traffic between APs is not encrypted. When WDS security is enabled, both
APs must use the same pre-shared key. See Section 6.4.2 on page 65 for more details.
Once the security settings of peer sides match one another, the connection between devices is
made.
20
NWA1100-N User’s Guide
Page 21
Chapter 1 Introducing the NWA
At the time of writing, WDS security is compatible with other ZyXEL NWA-series access points only.
Refer to your other access point’s documentation for details.
Figure 2 Bridge Application
Figure 3 Repeater Application
1.2.2.1 Bridge / Repeater Mode Example
In the example below, when both NWAs are in Bridge mode, they form a WDS (Wireless
Distribution System) allowing the computers in LAN 1 to connect to the computers in LAN 2.
Figure 4 Bridging Example
Be careful to avoid bridge loops when you enable bridging in the NWA. Bridge loops cause
broadcast traffic to circle the network endlessly, resulting in possible throughput degradation and
NWA1100-N User’s Guide
21
Page 22
Chapter 1 Introducing the NWA
disruption of communications. The following examples show two network topologies that can lead
to this problem:
• If two or more NWAs (in bridge mode) are connected to the same hub.
Figure 5 Bridge Loop: Two Bridges Connected to Hub
• If your NWA (in Bridge mode) is connected to a wired LAN while communicating with another
wireless bridge that is also connected to the same wired LAN.
Figure 6 Bridge Loop: Bridge Connected to Wired LAN
To prevent bridge loops, ensure that you enable STP in the Wireless screen or your NWA is not set
to bridge mode while connected to both wired and wireless segments of the same LAN.
1.2.3 AP + Bridge
In AP+Bridge mode, the NWA supports both AP and bridge connection at the same time.
In the figure below, A and B use X as an AP to access the wired network, while X and Y
communicate in bridge mode.
Using AP + Bridge mode, your NW A can extend the range of the WLAN. In the figure below , A and
B act as AP + Bridge devices that forward traffic between associated wireless workstations and the
wired LAN.
22
NWA1100-N User’s Guide
Page 23
Chapter 1 Introducing the NWA
When the NWA is in AP+Bridge mode, security between APs (the Wireless Distribution System or
WDS) is independent of the security between the wireless stations and the AP. If you do not enable
WDS security, traffic between APs is not encrypted. When WDS security is enabled, both APs must
use the same pre-shared key. See Section 6.4.3 on page 69 for more details.
Unless specified, the term “security settings” refers to the traffic between the wireless stations and
the NWA.
Figure 7 AP + Bridge Application
1.2.4 Wireless Client
The NWA can be used as a wireless client to communicate with an existing network. In the figure
below, the printer can receive requests from the wired computer clients A and B via the NWA in
Wireless Client mode.
Figure 8 Wireless Client Application
NWA1100-N User’s Guide
23
Page 24
Chapter 1 Introducing the NWA
1.2.5 MBSSID
A Basic Service Set (BSS) is the set of devices forming a single wireless network (usually an access
point and one or more wireless clients). The Service Set IDentifier (SSID) is the name of a BSS. In
Multiple BSS (MBSSID) mode, the NWA provides multiple virtual APs, each forming its own BS S and
using its own individual SSID profile.
You can configure up to eight SSID profiles, and have up to four active at any one time.
You can assign different wireless and security settings to each SSID profile. This allows you to
compartmentalize groups of users, set varying access privileges, and prioritize network traffic to
and from certain BSSs.
To the wireless clients in the network, each SSID appears to be a different access point. As in any
wireless network, clients can associate only with the SSIDs for which they have the correct security
settings.
For example, you might want to set up a wireless network in your office where Internet telephony
(VoIP) users have priority. You also want a regular wireless network for standard users, as well as a
‘guest’ wireless network for visitors. In the following figure, VoIP_SSID users have QoS priority,
SSID01 is the wireless network for standard users, and Guest_SSID is the wireless network for
guest users. In this example, the guest user is forbidden access to the wired Land Area Network
(LAN) behind the AP and can access only the Internet.
Figure 9 Multiple BSSs
24
NWA1100-N User’s Guide
Page 25
Chapter 1 Introducing the NWA
1.3 Ways to Manage the NWA
Use any of the following methods to manage the NWA.
• Web Configurator. This is recommended for everyday management of the NWA using a
(supported) web browser.
• Command Line Interface. Line commands are mostly used for troubleshooting by service
engineers.
• FTP (File Transfer Protocol) for firmware upgrades.
• SNMP (Simple Network Management Protocol). The device can be monitored by an SNMP
manager.
1.4 Configuring Yo ur NWA’s Security Features
Your NWA comes with a variety of security features. This section summarizes these features and
provides links to sections in the User’s Guide to configure security settings on your NWA. Follow the
suggestions below to improve security on your NWA and network.
1.4.1 Control Access to Your Device
Ensure only people with permission can access your NWA.
• Control physical access by locating devices in secure areas, such as locked rooms. Most NWAs
have a reset button. If an unauthorized person has access to the reset button, they can then
reset the device’s password to its default password, log in and reconfigure its settings.
• Change any default passwords on the NWA, such as the password used for accessing the NWA’s
web configurator (if it has a web configurator). Use a password with a combination of letters and
numbers and change your password regularly. Write down the password and put it in a safe
place.
• Avoid setting a long timeout period before the NW A’ s web configurator automatically times out. A
short timeout reduces the risk of unauthorized person accessing the web configurator while it is
left idle.
•See Chapter 5 on page 55 for instructions on changing your password and setting the timeout
period.
• Configure remote management to control who can manage your NWA. See Chapter 12 on page
109 for more information. If you enable remote management, ensure you have enabled remote
management only on the IP addresses, services or interfaces you intended and that other remote
management settings are disabled.
1.4.2 Wireless Security
Wireless devices are especially vulnerable to attack. If your NWA has a wireless function, take the
following measures to improve wireless security.
• Enable wireless security on your NWA. Choose the most secure encryption method that all
devices on your network support. See Section 8.4 on page 87 for directions on configuring
encryption. If you have a RADIUS server, enable IEEE 802.1x or WPA(2) user identification on
your network so users must log in. This method is more common in business environments.
NWA1100-N User’s Guide
25
Page 26
Chapter 1 Introducing the NWA
• Hide your wireless network name (SSID). The SSID can be regularly broadcast and unauthorized
users may use this information to access your network. See Section 6.4 on page 62 for directions
on using the web configurator to hide the SSID.
• Enable the MAC filter to allow only trusted users to access your wireless network or deny
unwanted users access based on their MAC address. See Section 10.4 on page 103 for directions
on configuring the MAC filter.
1.5 Good Habits for Managing the NWA
Do the following things regularly to make the NWA more secure and to manage it more effectively.
1.6 Hardware Connections
See your Quick Start Guide for information on making hardware connections.
26
NWA1100-N User’s Guide
Page 27
1.7 LEDs
Figure 10 LEDs
Chapter 1 Introducing the NWA
Ta ble 2 LEDs
LABELLEDCOLORSTATUSDESCRIPTION
1SYSGreenOnThe NWA is receiving power and ready for use.
RedFlashingThere is system error and the NWA cannot boot up.
OffThe NWA is not receiving power.
2WLANGreenOnThe wireless adaptor WLAN is active.
BlinkingThe wireless adaptor WLAN is active, and transmitting
OffThe wireless adaptor WLAN is not active.
3ETHERNETGreenOnThe NWA has a 10/100 Mbps Ethernet connection.
Blinking The NWA has a 10/100 Mbps Ethernet connection and
YellowOn The NWA has a 1000 Mbps Ethernet connection.
Blinking The NWA has a 1000 Mbps Ethernet connection and is
OffThe NWA does not have an Ethernet connection.
or receiving data.
is sending or receiving data.
sending/receiving data.
NWA1100-N User’s Guide
27
Page 28
Chapter 1 Introducing the NWA
28
NWA1100-N User’s Guide
Page 29
CHAPTER 2
Introducing the Web Configurator
This chapter describes how to access the NWA’s web configurator and provides an overview of its
screens.
2.1 Accessing the Web Configurator
1Make sure your hardware is properly connected and prepare your computer or computer network to
connect to the NWA (refer to the Quick Start Guide).
2Launch your web browser.
3Type "192.168.1.2" as the URL (default). The login screen appears.
Figure 11 The Login Screen
4Type “admin” as the (default) username and “1234” as the (default) password. Click Login.
5You should see a screen asking you to change your password (highly recommended) as shown
next. Type a new password (and retype it to confirm) then click Apply . Alternatively, click Ignore.
Note: If you do not change the password, the following screen appears every time you
login.
Figure 12 Change Password Screen
NWA1100-N User’s Guide29
Page 30
Chapter 2 Introducing the Web Configurator
You should now see the Status screen. See Chapter 2 on page 29 for details about the Status
screen.
Note: The management session automatically times out when the time period set in the
Administrator Inactivity Timer field expires (default five minutes). Simply log back
into the NWA if this happens.
2.2 Resetting the NWA
If you forget your password or cannot access the web configurator, you will need to use the RESET
button at the rear panel of the NWA. This replaces the current configuration file with the factorydefault configuration file. This means that you will lose all the settings you previously configured.
The password will be reset to “1234”.
Figure 13 The RESET Button
2.2.1 Methods of Restoring Factory-Defaults
You can erase the current configuration and restore factory defaults in two ways:
Use the RESET button to upload the default configuration file. Hold this button in for about 10
seconds (the lights will begin to blink). Use this method for cases when the password or IP address
of the NWA is not known.
Use the web configurator to restore defaults (refer to Section 15.7 on page 133).
2.3 Navigating the Web Configurator
The following summarizes how to navigate the web configurator from the Status screen.
30
NWA1100-N User’s Guide
Page 31
Chapter 2 Introducing the Web Configurator
Check the status bar at the bottom of the screen when you click Apply or OK to verify that the
configuration has been updated.
Figure 14 Status Screen of the Web Configurator
• Click the links on the left of the screen to configure advanced features such as SYSTEM (General,
Password and Time), WIRELESS (Wireless Settings, SSID, Security, RADIUS, MAC Filter), IP, REMOTE MGNT (Telnet, FTP, WWW and SNMP), CERTIFICATES, and LOGS (View Log and Log
Settings).
• Click MAINTENANCE to view information about your NWA or upgrade configuration a nd
firmware files. Maintenance features include Association List, Channel Usage, F/W
(firmware) Upload, Configuration File (Backup, Restore and Default) and Restart.
• Click LOGOUT at any time to exit the web configurator.
NWA1100-N User’s Guide
31
Page 32
Chapter 2 Introducing the Web Configurator
32
NWA1100-N User’s Guide
Page 33
The Status screens display when you log into the NWA, or click Status in the navigation menu.
Use the Status screens to look at the current status of the device, system resources, and
interfaces. The Status screens also provide detailed information about system statistics, associated
wireless clients, and logs.
3.1 The Status Screen
Use this screen to get a quick view of system, Ethernet, WLAN and other information regarding
your NWA.
Click Status. The following screen displays.
CHAPTER 3
Status Screens
Figure 15 The Status Screen
The following table describes the labels in this screen.
Ta ble 3 The Status Screen
LABELDESCRIPTION
Automatic Refresh
Interval
Refresh NowClick this to update this screen immediately.
System Information
Select how often you want the NWA to update this screen.
NWA1100-N User’s Guide33
Page 34
Chapter 3 Status Screens
Ta ble 3 The Status Screen (continued)
LABELDESCRIPTION
Device NameThis field displays the NWA system name. It is used for identification. You
WLAN Operation
Mode
Firmware VersionThis field displays the current version of the firmware inside the device . It
Current Date TimeThis field displays the date and time configured on the NWA. You can
Ethernet Information
LAN MAC AddressThis displays the MAC (Media Access Control) address of the NWA on the
IP AddressThis field displays the current IP address of the NWA on the network.
Subnet MaskSubnet masks determine the maximum number of possible hosts on a
Gateway IP AddressThis is the IP address of the gateway. The gateway is a router or switch
WLAN Information
SSIDThis field displays the SSID (Service Set Identifier). This is avai lable only
ChannelThe channel or frequency used by the NWA to send and receive
StatusThis shows the current status of the wireless LAN. This is available only
Security ModeThis displays the security mode the NWA is using.
System Resources
System Up TimeThis field displays the elapsed time since the NWA was turned on.
CPU UsageThis field displays what percentage of the NWA’s processing ability is
Memory UsageThis field displays what percentage of the NWA’s volatile memory is
Interface Status
InterfaceThis column displays each interface of the NWA.
StatusThis field indicates whether or not the NWA is using the interface.
ChannelClick this to see which wireless channels are currently in use in the local
RateFor the LAN port this displays the port speed and duplex setting.
can change this in the System > General screen’s Device Name field.
This field displays the current operating mode of the first wireless module
(Access Point, Bridge/Repeater, AP+Bridge, Wireless Client, or
MBSSID). You can change the operating mode in the Wireless >
Wireless Settings screen.
also shows the date the firmware version was created. You can change
the firmware version by uploading new firmware in Maintenance > F/W Upload.
change this in the System > Time Setting screen.
LAN. Every network device has a unique MAC address which identifies it
across the network.
network. You can also use subnet masks to divide one network into
multiple sub-networks.
on the same network segment as the device's LAN port. The gateway
helps forward packets to their destinations.
when the WLAN Operation Mode is Wireless Client.
information.
when the WLAN Operation Mode is Wireless Client.
currently being used. The higher the CPU usage, the more likely the NWA
is to slow down.
currently in use. The higher the memory usage, the more likely the NWA
is to slow down. Some memory is required just to start the NWA and to
run the web configurator.
For each interface, this field displays Up when the NWA is using the
interface and Down when the NWA is not using the interface.
area. See Section 15.5 on page 130.
For the WLAN interface, it displays the downstream and upstream
transmission rate or N/A if the interface is not in use.
34
NWA1100-N User’s Guide
Page 35
Ta ble 3 The Status Screen (continued)
LABELDESCRIPTION
LANThis field displays the number of wireless clients currently associated to
the first wireless module. Each wireless module supports up to 32
concurrent associations.
WLANThis field displays the number of wireless clients currently associated to
the second wireless module. Each wireless module supports up to 32
concurrent associations.
System Status
StatisticsClick this link to view port status and packet specific statistics. See
Section 3.1.1 on page 35.
Association ListClick this to see a list of wireless clients currently associated to each of
the NWA’s wireless modules. See Section 15.4 on page 129.
View LogClick this to see a list of logs produced by the NWA. See Chapter 14 on
page 123.
3.1.1 System Statistics Screen
Use this screen to view read-only information, including 802.11 Mode, Channel ID, Retry Count and
FCS Error Count. Also provided is the "poll interval". The Poll Interval field is configurable. The
fields in this screen vary according to the current wireless mode of each WLAN adaptor.
Chapter 3 Status Screens
Click Status > Statistics. The following screen pops up.
Figure 16 System Status: Statistics
The following table describes the labels in this screen.
Ta ble 4 System Status: Show Statistics
LABELDESCRIPTION
DescriptionThis is the wireless LAN adaptor.
802.11 ModeThis field shows which 802.11 mode the NWA is using.
Channel IDClick this to see which wireless channels are currently in use in the local area.
See Section 15.5 on page 130.
RX PKTThis is the number of received packets on this port.
TX PKTThis is the number of transmitted packets on this port.
Retry CountThis is the total number of retries for transmitted packets (TX).
FCS Error CountThis is the ratio percentage showing the total number of checksum error of
received packets (RX) over total RX.
Poll IntervalEnter the time interval for refreshi ng statistics.
Set IntervalClick this button to apply the new poll interval you entered above.
StopClick this button to stop refreshing statistics.
NWA1100-N User’s Guide
35
Page 36
Chapter 3 Status Screens
36
NWA1100-N User’s Guide
Page 37
CHAPTER 4
This chapter first provides an overview of how to configure the wireless LAN on your NW A, and then
gives step-by-step guidelines showing how to configure your NWA for some example scenarios.
4.1 How to Configure the Wireless LAN
This section illustrates how to choose which wireless operating mode to use on the NWA and how to
set up the wireless LAN in each wireless mode. See Section 4.1.3 on page 38 for links to more
information on each step.
4.1.1 Choosing the Wireless Mode
•Use Access Point operating mode if you want to allow wireless clients to access your wired
network, all using the same security and Quality of Service (QoS) settings. See Section 1.2.1 on
page 20 for details.
•Use Bridge / Repeater operating mode if you want to use the NWA to communicate with other
access points. See Section 1.2.2 on page 20 for details.
•Use AP + Bridge operating mode if you want to use the NWA as an access point (see above)
while also communicating with other access points. See Section 1.2.3 on page 22 for details.
•Use Wireless Client operating mode if you want to use the NWA to access a wireles s network.
See Section 1.2.4 on page 23 for details.
The NWA is a bridge when other APs access your wired Ethernet network through the NWA.
•Use MBSSID (Multiple Basic Service Set Identifier) operating mode if you want to use the NWA
as an access point with some groups of users having different security or QoS settings from other
groups of users. See Section 1.2.5 on page 24 for details.
Tutorial
4.1.2 Wireless LAN Configuration Overview
The following figure shows the steps you should take to configure the wireless settings according to
the operating mode you select. Use the Web Configurator to set up your NWA’s wireless network
NWA1100-N User’s Guide37
Page 38
Chapter 4 Tutorial
(see your Quick Start Guide for information on setting up your NWA and accessing the Web
Configurator).
Select the WLAN Adaptor you want to configure.
Select Operation Mode.
Access Point
Select Wireless Mode,
SSID Profile, and
Channel.
Configure RADIUS
authentication (optional).
Configure MAC Filter
(optional).
Bridge / Repeater
Select Wireless Mode,
SSID Profile, and
Channel.
Configure RADIUS
authentication (optional).
AP + Bridge
Select Wireless Mode,
SSID Profile, and
Channel.
Configure RADIUS
authentication (optional).
Configure MAC Filter
(optional).
Check your settings and test.
Wireless Client
Select the AP you
want to connect to.
Configure Security
Settings.
MBSSID
Select Wireless Mode
and SSID Profile.
Configure the selected
SSID Profiles.
Configure SecuritySettings.
Configure RADIUS
authentication (optional).
Configure MAC Filter
(optional).
4.1.3 Further Reading
Use these links to find more information on the steps:
•Selecting a WLAN Adaptor: see Section 6.4.1 on page 63.
• Choosing 802.11 Mode: see Section 6.4.1 on page 63.
• Choosing a wireless Channel ID: see Section 6.4.1 on page 63.
• Choosing a Security mode: see Section 8.4.1 on page 89.
• Configuring an external RADIUS server: see Section 9.4 on page 100.
•Configuring MAC Filtering: see Section 10.1 on page 102.
38
NWA1100-N User’s Guide
Page 39
4.2 How to Configure Multiple Wireless Networks
In this example, you have been using your NWA as an access point for your office network (See
your Quick Start Guide for information on how to set up your NWA in Access P oint mode). Now your
network is expanding and you want to make use of the MBSSID feature (see Section 8.2.4 on page
139) to provide multiple wireless networks. Each wireless network will cater to a different type of
user.
You want to make three wireless networks: one standard office wireless network with all the same
settings you already have, another wireless network with high priority QoS settings for Voice over
IP (VoIP) users, and a guest network that allows visitors to access only the Internet and the
network printer.
To do this, you will take the following steps:
1Edit the SSID profiles.
2Change the operating mode from Access Point to MBSSID and reactivate the standard network.
3Configure different security modes for the networks.
Chapter 4 Tutorial
4Configure a wireless network for standard office use.
5Configure a wireless network for VoIP users.
6Configure a wireless network for guests to your office.
The following figure shows the multiple networks you want to set up. Your NWA is marked Z, the
main network router is marked A, and your network printer is marked B.
B
A
Z
NWA1100-N User’s Guide
39
Page 40
Chapter 4 Tutorial
The standard network (SSID01) has access to all resources. The VoIP network (VoIP_SSID) has
access to all resources and a high QoS priority . The guest network (Guest_SSID) has access to the
Internet and the network printer only, and a low QoS priority.
To configure these settings, you need to know the Media Access Control (MAC) addresses of the
devices you want to allow users of the guest network to access. The following table shows the
addresses used in this example.
Ta ble 5 Tutorial: Example Information
Network router (A) MAC address00:AA:00:AA:00:AA
Network printer (B) MAC addressAA:00:AA:00:AA:00
4.2.1 Configure the SSID Profiles
1Log in to the NWA (see Section 2.2 on page 35). Click Wireless > SSID. The SSID screen
appears.
2Select the Profile1 check-box and click Edit.
3Rename the Profile Name as SSID01. Click Save.
4Repeat Step 2 and 3 to change Profile2 and Profile3 to VoIP_SSID and Guest_SSID.
40
NWA1100-N User’s Guide
Page 41
4.2.1.1 MBSSID
1Go to Wireless > Wireless Settings. Select MBSSID from the Operating Mode drop-down list
box.
2SSID01 is the standard network, so select SSID01 as the first profile. It is always active.
3Select VoIP_SSID as the second profile, and Guest_SSID as the third profile. Select the
corresponding Active check-boxes.
4Click Apply to save your settings. Now the three SSIDs are activated.
Chapter 4 Tutorial
NWA1100-N User’s Guide
41
Page 42
Chapter 4 Tutorial
4.2.2 Configure the Standard Network
1Click Wireless > SSID. Select SSID01 and click Edit.
2Select SecProfile1 as SSID01’s security profile. Select the Hidden SSID checkbox as you want
only authorized company employees to use this netw ork, so there is no need to broadcast the S SID
to wireless clients scanning the area.
Also, the clients on SSID01 might need to access other clients on the same wireless network. Do
not select the Enable Intra-BSS Traffic blocking check-box.
Click Save.
42
NWA1100-N User’s Guide
Page 43
Chapter 4 Tutorial
3Next, click Wireless > Security. Select SecProfile1 and click Edit.
4Since SSID01 is the standard network that has access to all resources, assign a more secure
security mode. Select WPA2-PSK-MIX as the Security Mode, and enter the Pre-Shared Key. In
this example, use ThisisSSID01PreSharedKey. Click Apply.
5You have finished configuring the standard network, SSID01.
4.2.3 Configure the VoIP Network
1Go to Wireless > SSID. Select VoIP_SSID and click Edit.
NWA1100-N User’s Guide
43
Page 44
Chapter 4 Tutorial
2Select SecProfile2 as the Security Profile for the VoIP network. Select the Hidden SSID check-
box.
3Select WMM-Voice in the QoS field to give VoIP the highest priority in the wireless network. Click
Save.
4Next, click Wireless > Security. Select SecProfile2 and click Edit.
5Select WPA2-PSK as the Security Mode, and enter the Pre-Shared Key. In this example, use
ThisisVoIPPreSharedKey. Click Apply.
6Your VoIP wireless network is now ready to use. Any traffic using the VoIP_SSID profile will be
given the highest priority across the wireless network.
44
NWA1100-N User’s Guide
Page 45
4.2.4 Configure the Guest Network
When you are setting up the wireless network for guests to your office, your primary concern is to
keep your network secure while allowing access to certain resources (such as a network printer, or
the Internet). For this reason, the pre-configured Guest_SSID profile has intra-BSS tr affic blocking
enabled by default. “Intra-BSS traffic blocking” means that the client cannot access other clients on
the same wireless network.
1Click Wireless > SSID. Select Guest_SSID and click Edit.
Chapter 4 Tutorial
2Select SecProfile3 in the Security field. Do not select the Hidden SSID check-box so the guests
can easily find the wireless network.
3Select WMM-best effort in the QoS field to give the guest a lower QoS priority.
4Select the check-box of Enable Intra-BSS Traffic blocking. Click Save.
NWA1100-N User’s Guide
45
Page 46
Chapter 4 Tutorial
5Next, click Wireless > Security. Select SecProfile3 and click Edit.
6Select WPA-PSK in the Security Mode field. WPA-PSK provide s strong security that is supported
by most wireless clients. Even though your Guest_SSID clients do not have access to sensitive
information on the network, you should not leave the network without security. An attacker could
still cause damage to the network or intercept unsecured communications or use your Internet
access for illegal activities.
7Enter the PSK you want to use in your network in the Pre Shared Key field. In this example, the
PSK is ThisismyGuestWPApre-sharedkey. Click Apply.
8Your guest wireless network is now ready to use.
4.2.5 Testing the Wireless Networks
To make sure that the three networks are correctly configured, do the following.
• On a computer with a wireless client, scan for access points. You should see the Guest_SSID
network, but not the SSID01 and VoIP_SSID networks. If you can see the SSID01 and
VoIP_SSID networks, go to its SSID Edit screen and make sure to select the Hidden SSID
check-box and click Save.
• Try to access each network using the correct security settings, and then using incorrect security
settings, such as the WPA-PSK for another active network. If the behavior is different from
expected (for example, if you can access the SSID01 or VoIP_SSID wireless network using the
security settings for the Guest_SSID wireless network) check that the SSID profile is set to use
the correct security profile, and that the settings of the security profile are correct.
46
NWA1100-N User’s Guide
Page 47
4.3 NWA Setup in AP and Wireless Client Modes
This example shows you how to restrict wireless access to your NWA.
4.3.1 Scenario
In the figure below, there are two NWAs (A and B) in the network. A is in Access Point (AP) mode
while station B is in Wireless Client mode. Station B is connected to a File Transfer Protocol (FTP)
server. You want only specified wireless clients to be able to access station B. Y ou also w ant to allow
wireless traffic between B and wireless clients connected to A (W, Y and Z). Other wireless devices
(X) must not be able to connect to the FTP server.
Figure 17 FTP Server Connected to a Wireless Client
Chapter 4 Tutorial
4.3.2 Configuring the NWA in Access Point Mode
Before setting up the NWA as a wireless client (B), you need to make sure there is an access point
to connect to. Use the Ethernet port on NWA (A) to configure it via a wired connection.
NWA1100-N User’s Guide
47
Page 48
Chapter 4 Tutorial
Log into the Web Configurator on NWA (A) and go to the Wireless > Wireless Settings screen.
1Set the Operation Mode to Access Point.
2Select the Wireless Mode. In this example, select 802.11b/g.
3Select Profile1 as the SSID Profile.
4Choose the Channel you want NWA (A) to use.
5Click Apply.
48
NWA1100-N User’s Guide
Page 49
Chapter 4 Tutorial
6Go to Wireless > SSID. Select Profile1 and click Edit.
7Change the SSID to AP-A.
8Select SecProfile1 in the Security field.
9Select the check-box for Enable Intra-BSS Traffic blocking so the client cannot access other
clients on the same wireless network.
10 Click Save.
11 Go to Wireless > Security. Select SecProfile1. Click Edit.
NWA1100-N User’s Guide
49
Page 50
Chapter 4 Tutorial
12 Configure WPA-PSK as the Security Mode and enter ThisisMyPreSharedKey in the Pre-
Shared Key field.
13 Click Apply to finish configuration for NWA (A).
4.3.3 Configuring the NWA in Wireless Client Mode
The NWA (B) should have a wired connection before it ca n be set to wireless client oper ating mode.
Connect your NWA to the FTP server. Login to NWA (B)’ s Web Configurator and go to the Wireless > Wireless Settings screen. Follow these steps to configure station B.
1Select Wireless Client as Operation Mode. Click Apply.
2Click on the Site Survey tab. A window should pop up which contains a list of all available wireless
devices within your NWA’s range.
50
NWA1100-N User’s Guide
Page 51
Chapter 4 Tutorial
3Find and select NWA1100-N-A’s SSID: NWA-1100-A. Click Selected.
4Go to Wireless > Security to configure the NWA to use the same security mode and Pre-Shared
Key as NWA1100-N-A: WPA-PSK/ThisisMyPreSharedKey. Click Apply.
Figure 18
4.3.4 MAC Filter Setup
One way to ensure that only specified wireless clients can access the FTP server is by enabling MAC
filtering on NWA (B) (See Chapter 10 on page 102 for more information on MAC Filter ).
1Go to Wireless > MAC Filter. Select MacProfile1 and click Edit.
NWA1100-N User’s Guide
51
Page 52
Chapter 4 Tutorial
2Select Allow Listed in the Access Control Mode field. Enter the MAC addresses of the wireless
clients (W, Y and Z) you want to associate with the NWA. Click Apply.
Now, only the authorized wireless clients (W, Y and Z) can access the FTP server.
4.3.5 Testing the Connection and Troubleshooting
This section discusses how you can check if you have correctly configured your network setup as
described in this tutorial.
• Try accessing the FTP server from wireless clients W, Y or Z. Test if you can send or retrieve a
file. If you cannot establish a connection with the FTP server, do the following steps.
1Make sure W, Y and Z use the same wireless security settings as A and can access A.
2Make sure B uses the same wireless and wireless security settings as A and can access A.
3Make sure intra-BSS traffic is enabled on A.
• Try accessing the FTP server from X. If you are able to access the FTP server, do the following.
1Make sure MAC filtering is enabled.
2Make sure X’s MAC address is not entered in the list of allowed devices.
52
NWA1100-N User’s Guide
Page 53
PART II
Technical Reference
The appendices provide general information. Some details may not apply to your NWA.
53
Page 54
54
Page 55
5.1 Overview
This chapter provides information and instructions on how to identify and manage your NWA over
the network.
Figure 19 NWA Setup
CHAPTER 5
System Screens
In the figure above, the NWA connects to a Domain Name Server (DNS) server to avail of a domain
name. It also connects to an Network Time Protocol (NTP) server to set the time on the device.
5.2 What You Can Do in this Chapter
•Use the System > General screen to specify the System Name and Ethernet Data Rate value
(see Section 5.4 on page 57) .
•Use the System > Password screen to manage the password for your NWA (see Section 5.4.1
on page 57).
•Use the System > Time Setting screen to change your NWA’s time and date. This screen allows
you to configure the NWA’s time based on your local time zone (see Section 5.5 on page 58).
5.3 What You Need To Know
IP Address Assignment
Every computer on the Internet must have a unique IP address. If your networks are isolated from
the Internet, for instance, only between your two branch offices, you can assign any IP addresses
NWA1100-N User’s Guide55
Page 56
Chapter 5 System Screens
to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has
reserved the following three blocks of IP addresses specifically for private networks.
Ta ble 6 Private IP Address Ranges
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private
network. If you belong to a small organization and your Internet access is through an ISP, the ISP
can provide you with the Internet addresses for your local networks. On the other hand, if you are
part of a much larger organization, you should consult your network administrator for the
appropriate IP addresses.
Note: Regardless of your particular situation, do not create an arbitrary IP address;
always follow the guidelines above. For more information on address assignment,
please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466,
Guidelines for Management of IP Address Space.
IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, computers on a LAN share one
common network number.
Where you obtain your network number depends on your particular situation. If the ISP or your
network administrator assigns you a block of registered IP addresses, follow their instructions in
selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single user
account and the ISP will assign you a dynamic IP address when the connection is established. The
Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private
use; please do not use any other number unless you are told otherwise. Let's say you select
192.168.1.0 as the network number; which covers 254 individual addresses, from 192.168.1.1 to
192.168.1.254 (zero and 255 are reserved). In other words, the first three numbers specify the
network number while the last number identifies an individual computer on that network.
Once you have decided on the network number, pick an IP address that is easy to remember, for
instance, 192.168.1.2, for your device, but make sure that no other device on your network is
using that IP address.
The subnet mask specifies the network number portion of an IP address. Your device will compute
the subnet mask automatically based on the IP address that you entered. Y ou don't need to change
the subnet mask computed by the device unless you are instructed to do otherwise.
56
NWA1100-N User’s Guide
Page 57
5.4 General Screen
Use the General screen to identify your NWA over the network. Click System > General. The
following screen displays.
Figure 20 System > General
The following table describes the labels in this screen.
Chapter 5 System Screens
Ta ble 7 System > General
LABELDESCRIPTION
System Settings
System NameType a descriptive name to identify the NWA in the Ethernet network.
Ethernet Data Rate
Ethernet Data RateSelect an Ethernet port speed and duplex mode from the drop-down list.
ApplyClick Apply to save your changes.
CancelClick Cancel to reload the previous configuration for this screen.
5.4.1 Password Screen
Use this screen to control access to your NWA by assigning a password to it. Click System >
Password. The following screen displays.
Figure 21 System > Password
This name can be up to 15 alphanumeric characters long. Spaces are not
allowed, but dashes "-" are accepted.
Select Auto if you would like to hav e th e system configure this automatically.
NWA1100-N User’s Guide
57
Page 58
Chapter 5 System Screens
The following table describes the labels in this screen.
Ta ble 8 System > Pass word
LABELDESCRIPTIONS
Current PasswordType in your existing system password.
New PasswordType yo ur new s ystem pas sword (max 19 char acters). Note that as you type
Retype to ConfirmRetype your new system password for confirmation.
ApplyClick Apply to save your changes.
ResetClick Reset to reload the previous configuration for this screen.
5.5 Time Screen
Use this screen to change your NWA’s time and date, click System > Time. The following screen
displays.
Figure 22 System > Time
a password, the screen displays an asterisk (*) for each character you type.
58
The following table describes the labels in this screen.
Ta ble 9 System > Time
LABELDESCRIPTION
Current Time and Date
Current DateThis field displays the last updated date from the time server.
Current TimeThis field displays the time of your NWA.
Each time you reload this page, the NWA synchronizes the time with the
time server (if configured).
Time and Date Setup
Enable NTP client
update
NTP serverSelect an NTP server from the drop-list box.
Select this to have the NWA use the predefined list of Network Time
Protocol (NTP) servers.
NWA1100-N User’s Guide
Page 59
Ta ble 9 System > Time (continued)
LABELDESCRIPTION
Manual IPEnter the IP address or URL of your time server. Check with your ISP/
network administrator if you are unsure of this information.
Time Zone Setup
Time ZoneChoose the time zone of your location. This will set the time difference
between your time zone and Greenwich Mean Time (GMT).
ApplyClick Apply to save your changes.
RefreshClick Refresh to reload the previous configuration for this screen.
5.6 Technical Reference
This section provides some technical information about the topics covered in this chapter.
5.6.1 Pre-defined NTP Time Servers List
When you turn on the NWA for the first time, the date and time start at 2000-01-01 00:00:00.
When you select Auto in the System > Time Setting screen, the NWA then attempts to
synchronize with one of the following pre-defined list of NTP time servers.
Chapter 5 System Screens
The NWA continues to use the following pre-defined list of NTP time servers if you do not specify a
time server or it cannot synchronize with the time server you specified.
When the NWA uses the pre-defined list of NTP time servers, it randomly selects one server and
tries to synchronize with it. If the synchronization fails, then the NWA goes through the rest of the
list in order from the first one tried until either it is successful or all the pre-defined NTP time
servers have been tried.
NWA1100-N User’s Guide
59
Page 60
6.1 Overview
This chapter discusses the steps to configure the Wireless Settings screen on the NWA. It also
introduces the wireless LAN (WLAN) and some basic scenarios.
Figure 23 Wireless Mode
CHAPTER 6
Wireless Settings Screen
In the figure above, the NWA allows access to another bridge device (A) and a notebook computer
(B) upon verifying their settings and credentials. It denies access to other devices (C and D) with
configurations that do not match those specified in your NWA.
6.2 What You Can Do in this Chapter
Use the Wireless >Wireless Settings screen to configure the NWA’s operation mode (see
Section 6.4 on page 62).
NWA1100-N User’s Guide60
Page 61
6.3 What You Need To Know
BSS
A Basic Service Set (BSS) exists when all communications between wireless clients or between a
wireless client and a wired network client go through one access point (AP). Intra-BSS traffic is
traffic between wireless clients in the BSS.
ESS
An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access
point, with each access point connected together by a wired network. This wired connection
between APs is called a Distribution System (DS).
Operating Mode
The NWA can run in four operating modes as follows:
• AP (Access Point). The NWA is wireless access point that allows wireless communication
to other devices in the network.
• Bridge/Repeater. The NWA acts as a wireless network bridge and establishes wireless
links with other APs. You need to know the MAC address of the peer device, which also
must be in bridge mode. The NWA can establish up to five wireless links with other APs.
• AP+Bridge. The NWA functions as a bridge and access point simultaneously.
• Wireless Client. The NWA acts as a wireless client to access a wireless network.
• MBSSID Mode. The Multiple Basic Service Set Identifier (MBSSID) mode allows you to use
one access point to provide several BSSs simultaneously.
Chapter 6 Wireless Settings Screen
Refer to Chapter 1 on page 19 for illustrations of these wireless applications.
SSID
The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is
associated. Wireless stations associating to the access point (AP) must have the same SSID.
Normally, the NWA acts like a beacon and regularly broadcasts the SSID in the area. You can hide
the SSID instead, in which case the NWA does not broadcast the SSID. In addition, you should
change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized wireless
devices to get the SSID. In addition, unauthorized wireless devices can still see the information that
is sent in the wireless network.
Channel
A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels
available depend on your geog raphical area. You may have a choice of channels (for your region) so
you should use a different channel than an adjacent AP (access point) to reduce interference.
NWA1100-N User’s Guide
61
Page 62
Chapter 6 Wireless Settings Screen
Wireless Mode
The IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended
authentication as well as providing additional accounting and control features. Your NWA can
support 802.11b/g and 802.11b/g/n.
MBSSID
Traditionally, you needed to use differe nt APs to configure different Basic Service Sets (BSSs). As
well as the cost of buying extra APs, there was also the possibility of channel interference. The
NWA’s MBS SID (Multiple Basic Service Set IDentifier) function allows you to use one access point to
provide several BSSs simultaneously. You can then assign varying levels of privilege to different
SSIDs.
Wireless stations can use different BSSIDs to associate with the same AP.
The following are some notes on multiple BSS.
• A maximum of four BSSs are allowed on one AP simultaneously.
• You must use different WEP keys for different BSSs. If two stations have different BSSIDs (they
are in different BSSs), but have the same WEP keys, they ma y hear each other’s communications
(but not communicate with each other).
• MBSSID should not replace but rather be used in conjunction with 802.1x security.
6.4 Wireless Settings Screen
Use this screen to choose the operating mode for your NWA. Click Wireless > Wireless Settings.
The screen varies depending upon the operating mode you select.
62
NWA1100-N User’s Guide
Page 63
6.4.1 Access Point Mode
Use this screen to use your NWA as an access point. Select Access Point as the Operation Mode.
The following screen displays.
Figure 24 Wireless > Wireless Settings: Access Point
Chapter 6 Wireless Settings Screen
The following table describes the general wireless LAN labels in this screen.
Table 11 Wireless > Wireless Settings: Access Point
LABELDESCRIPTION
Basic Settings
Operation Mode Select Access Point from the drop-down list.
Wireless ModeSelect 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant WLAN
NWA1100-N User’s Guide
devices to associate with the NWA. The transmission rate of your NWA might be
reduced.
Select 802.11b/g/n to allow IEEE802.11b, IEEE802.11g and IEEE802.11n
compliant WLAN devices to associate wit h the Device. The tr ansmission r ate of the
NWA might be reduced.
63
Page 64
Chapter 6 Wireless Settings Screen
Table 11 Wireless > Wireless Settings: Access Point (continued)
LABELDESCRIPTION
SSID ProfileThe SSID (Service Set IDentifier) identifies the Service Set with which a wireless
station is associated. Wireless stations associating to the access point (AP) must
have the same SSID. Select an SSID Profile from the drop-down list box.
Note: If you are configuring the NWA from a computer connected to the wireless
ChannelSelect the operating frequency/channel depending on your particular region from
the drop-down list box.
Channel Width This field displays only when you select 802.11 b/g/n in the 802.11 Wireless
Mode field.
A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a
40MHz channel uses two standard channels and offers speeds of up to 300Mbps.
However, not all devices support 40MHz channels.
Select the channel bandwidth you want to use for your wireless network.
It is recommended that you select 20/40 (20/40 MHz). This allows the NWA to
adjust the channel bandwidth depending on network conditions.
LAN and you change the NWA’s SSID or security settings, you will lose your
wireless connection when you press Apply to confirm. You must then
change the wireless settings of your computer to match the NWA’s new
settings.
Select 20 MHz if you want to lessen radio interference with other wirel ess devices
in your neighborhood.
Advanced Settings
Beacon Interval When a wirelessly network device sends a beacon, it includes with it a beacon
interval. This specifies the time period before the device sends the beacon again.
The interval tells receiving devices on the network how long they can wait in
lowpower mode before waking up to handle the beacon. A high value helps save
current consumption of the access point.
DTIM IntervalDelivery Traffic Indication Message (DTIM) is the time period after which
broadcast and multicast packets are transmitted to mobile clients in the Active
Power Management mode. A high DTIM value can cause clients to lose
connectivity with the network.
Output Power Set the output power of the NWA in this field. If there is a high density of APs in
an area, decrease the output power of the NWA to reduce interference with other
APs. Select one of the following Full (Full Power), 50%, 25%, 12.5% or Min
(Minimum). See the product speci fications for more information on your NWA’s
output power.
Preamble TypeSelect Dynamic to have the AP automatically use short preamble when wireless
RTS/CTS
Threshold
FragmentationThe threshold (number of bytes) for the fragmentation boundary for directed
adapters support it, otherwise the AP uses long preamble.
Select Long if you are unsure what preamble mode the wireless adapters support,
and to provide more reliable communications in busy wireless networks.
(Request To Send) The threshold (number of bytes) for enabling RTS/CTS
handshake. Data with its frame size larger than this value will perform the RTS/
CTS handshake. Setting this attribute to be larger than the maximum MSDU (MAC
service data unit) size turns off the RTS/CTS handshake. Setting this attribute to
its smallest value (1) turns on the RTS/CTS handshake.
messages. It is the maximum data fragment size that can be sent.
64
NWA1100-N User’s Guide
Page 65
Chapter 6 Wireless Settings Screen
Table 11 Wireless > Wireless Settings: Access Point (continued)
LABELDESCRIPTION
Rates
Configuration
MCS TableThe MCS Rate table is available only when 802.11 b/g/n is selected in the
ApplyClick Apply to save your changes.
CancelClick Cancel to begin configuring this screen afresh.
This section controls the data rates permitted for clients.
For each Rate, select an option from the Configuration list. The o ptions are:
• Basic (1~11 Mbps only): Clients can always connect to the access point at
this speed.
• Optional: Clients can connect to the access point at this speed, when
permitted to do so by the AP.
• Disable: Clients cannot connect to the access point at this speed.
802.11 Wireless Mode field.
IEEE 802.11n supports many different data rates which are called MCS rates. MCS
stands for Modulation and Coding Scheme. This is an 802.11n feature that
increases the wireless network performance in terms of throughput.
For each MCS Rate (0 -15), select either Enable (default) to have the NWA use the
data rate. Select Disable if you do not want the NWA to use the data rate.
6.4.2 Bridge / Repeater Mode
Use this screen to have the NWA act as a wireless network bridge and establish wireless links with
other APs. You need to know the MAC address of the peer device, which also must be in bridge
mode.
NWA1100-N User’s Guide
65
Page 66
Chapter 6 Wireless Settings Screen
Use this screen to use the NWA as a wireless bridge. Select Bridge/Repeater as the Operation
Mode.
The following table describes the bridge labels in this screen.
Table 12 Wireless > Wirele ss Settings: Bridge/Repeater
LABELDESCRIPTIONS
Basic Settings
Operation ModeSelect Bridge/Repeater in this field.
Wireless ModeSelect 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant
WLAN devices to associate with the NWA. The transmission rate of your NWA
might be reduced.
Select 802.11b/g/n to allow IEEE802.11b, IEEE802.11g and IEEE802.11n
compliant WLAN devices to associate with the NWA. The transmission rate of
the NWA might be reduced.
NWA1100-N User’s Guide
Page 67
Chapter 6 Wireless Settings Screen
Table 12 Wireless > Wirele ss Settings: Bridge/Repeater (continued)
LABELDESCRIPTIONS
SSID ProfileThe SSID (Service Set IDentifier) identifies the Service Set with which a
wireless station is associated. Wireless stations associating to the access
point (AP) must have the same SSID. Select an SSID Profile from the dropdown list box.
Note: If you are configuring the NWA from a computer connected to the
wireless LAN and you change the NWA’s SSID or security settings, you
will lose your wireless connection when you press Apply to confirm.
You must then change the wireless settings of your computer to ma tch
the NWA’s new settings.
ChannelSelect the operating frequency/channel depending on your particular region
from the drop-down list box.
Channel Width This field displays only when you select 802.11 b/g/n in the 802.11
Wireless Mode field.
A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas
a 40MHz channel uses two standard channels and offers speeds of up to
300Mbps. However, not all devices support 40MHz channels.
Select the channel bandwidth you want to use for your wireless network.
It is recommended that you select 20/40 (20/40 MHz). This allows the NWA
to adjust the channel bandwidth depending on network conditions.
Select 20 MHz if you want to lessen radio interference with other wireless
devices in your neighborhood.
WDS Settings
Local Mac Address
Remote MAC
Address 1 - 4
A Wireless Distribution System is a wireless connection between two or more
APs.
Note: WDS security is independent of the security settings between the NWA
and any wireless clients.
Local MAC Address is the MAC address of your NWA. You can specify up to
4 remote devices’ MAC addresses in this section.
Advanced Settings
Output Power Set the output power of the NWA in this field. If there is a high density of APs
in an area, decrease the output power of the NWA to reduce interference with
other APs. Select one of the following Full (Full Power), 50%, 25%, 12.5%
or Min (Minimum). See the product specifications for more information on
your NWA’s output power.
Preamble TypeSelect Dynamic to have the AP automatically use short preamble when
wireless adapters support it, otherwise the AP uses long preamble.
Select Long if you are unsure what preamble mode the wireless adapters
support, and to provide more reliable communications in busy wireless
networks.
RTS/CTS Threshold(Request To Send) The threshold (number of bytes) for enabling RTS/CTS
handshake. Data with its frame size larger than this value will perform the
RTS/CTS handshake. Setting this attribute to be larger than the maximum
MSDU (MAC service data unit) size turns off the RT S/CTS handshake. Setting
this attribute to its smallest value (1 ) turns on the RTS/CTS handshake.
FragmentationThe threshold (number of bytes) for the fragmentation boundary for directed
messages. It is the maximum data fragment size that can be sent.
NWA1100-N User’s Guide
67
Page 68
Chapter 6 Wireless Settings Screen
Table 12 Wireless > Wirele ss Settings: Bridge/Repeater (continued)
LABELDESCRIPTIONS
Rates ConfigurationThis section controls the data rates permitted for clients.
MCS TableThe MCS Rate table is available only when 802.11 b/g/n is selected in the
ApplyClick Apply to save your changes.
CancelClick Cancel to begin configuring this screen afresh.
For each Rate, select an option from the Configuration list. The options
are:
• Basic (1~11 Mbps only): Clients can always connect to the access point
at this speed.
• Optional: Clients can connect to the access point at this speed, when
permitted to do so by the AP.
• Disable: Clients cannot connect to the access point at this speed.
802.11 Wireless Mode field.
IEEE 802.11n supports many different data rates which are c alled MCS rat es.
MCS stands for Modulation and Coding Scheme. This is an 802.11n feature
that increases the wireless network performance in terms of throughput.
For each MCS Rate (0-15), select either Enable (default) to have the NWA
use the data rate. Select Disable if you do not want the NWA to use the data
rate.
68
NWA1100-N User’s Guide
Page 69
6.4.3 AP + Bridge Mode
Use this screen to have the NWA function as a bridge and access point simultaneously. Select
AP+Bridge as the Operation Mode. The following screen displays.
Figure 26 Wireless > Wireless Settings: AP+Bridge
Chapter 6 Wireless Settings Screen
See the tables describing the fields in the Access Point and Bridge / Repeater operating modes
for descriptions of the fields in this screen.
NWA1100-N User’s Guide
69
Page 70
Chapter 6 Wireless Settings Screen
6.4.4 Wireless Client Mode
Use this screen to turn your NWA into a wireless client. Select Wireless Client as the Operation
Mode. The following screen displays.
The following table describes the general wireless LAN labels in this screen.
Table 13 Wireless > Wirele ss Settings: Wi reless Client
LABELDESCRIPTION
Basic Settings
Operation Mode Select Wireless Client in this field.
Site SurveyClick this to view a list of available wireless access points wi thin t he range. Select
the AP you want to use and click Selected.
Note: After selecting Wireless Client as the Operation Mode in the Basic
Settings section, you must click Apply to be able to select from the AP list.
Wireless ModeSelect 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant WLAN
devices to associate with the NWA. The transmission rate of your NWA might be
reduced.
Select 802.11b/g/n to allow IEEE802.11b, IEEE802.11g and IEEE802.11n
compliant WLAN devices to associate with the NWA. The transmission rate of the
NWA might be reduced.
70
NWA1100-N User’s Guide
Page 71
Chapter 6 Wireless Settings Screen
Table 13 Wireless > Wirele ss Settings: Wi reless Client (continued)
LABELDESCRIPTION
SSID ProfileThe SSID (Service Set IDentifier) identifies the Service Set with which a wireless
station is associated. Wireless stations associating to the access point (AP) must
have the same SSID.
In this field, select the SSID of the AP you want to use (click Site Survey button
for a list of available APs). Click Apply. Set the security configuration for this
operating mode in the Wireless > Security screen. Check the Status screen to
check if the settings you set show in the WLAN information.
Note: If you are configuring the NWA from a computer connected to the wireless
LAN and you change the NWA’s SSID or security settings, you will lose your
wireless connection when you press Apply to confirm. You must then
change the wireless settings of your computer to match the NWA’s new
settings.
ChannelThis shows the operating frequency/channel in use. This field is read-only when
you select Wireless Client as your operation mode.
Channel Width This field displays only when you select 802.11 b/g/n in the 802.11 Wireless
Mode field.
A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a
40MHz channel uses two standard channels and offers speeds of up to 300Mbps.
However, not all devices support 40MHz channels.
Select the channel bandwidth you want to use for your wireless network.
It is recommended that you select 20/40 (20/40 MHz). This allows the NWA to
adjust the channel bandwidth depending on network conditions.
Select 20 MHz if you want to lessen radio interference with other wirel ess devices
in your neighborhood.
Advanced Settings
MAC CloneChoose Manual to configure the NWA’s MAC address by cloning the MAC address
Output Power Set th e output power of the NWA in this field. If there is a high density of APs in
Preamble TypeSelect Dynamic to have the NWA automatically use short preamble when the
RTS/CTS
Threshold
Extension
channel
protection mode
from a computer on your LAN. Choose Auto to use the factory default MAC
address of your NWA.
an area, decrease the output power of the NWA to reduce interference with other
APs. Select one of the following Full (Full Power), 50%, 25%, 12.5% or Min
(Minimum). See the product speci fications for more information on your NWA’s
output power.
wireless network your NWA is connected to supports it, otherwise the NWA uses
long preamble.
Select Long preamble if you are unsure what preamble mode the wireless device
your NWA is connected to supports, and to provide more reli able communi cations
in busy wireless networks.
(Request To Send) The threshold (number of bytes) for enabling RTS/CTS
handshake. Data with its frame size larger than this value will perform the RTS/
CTS handshake. Setting this attribute to be larger than the maximum MSDU (MAC
service data unit) size turns off the RTS/CTS handshake. Setting this attribute to
its smallest value (1) turns on the RTS/CTS handshake.
You can use CTS to self or RTS-CTS protection mechanism to reduce conflicts
with other wireless networks or hidden wireless clients. The throughput of RTS-
CTS is much lower than CTS to self. Using this mode may decrease your wireless
performance.
NWA1100-N User’s Guide
71
Page 72
Chapter 6 Wireless Settings Screen
Table 13 Wireless > Wirele ss Settings: Wi reless Client (continued)
LABELDESCRIPTION
A-MPDU
aggregation
Short GI This field is available only when 802.11 b/g/n is selected as the Wireless
ApplyClick Apply to save your changes.
CancelClick Cancel to begin configuring this screen afresh.
This field is available only when 802.11 b/g/n is selected as the Wireless
Mode. Select Enable to allow the grouping of several A-MSDUs (Aggregate MAC
Service Data Units) into one large A-MPDU (Aggregate MAC Protocol Data Unit).
This function allows faster data transfer rates.
Mode. Select Enable to use Short GI (Guard Interval). The guard interval is the
gap introduced between data transmission from users in order to reduce
interference. Reducing the GI increases data transfer rates but also increases
interference. Increasing the GI reduces data transfer rates but also reduces
interference.
72
NWA1100-N User’s Guide
Page 73
6.4.5 MBSSID Mode
Use this screen to have the NWA function in MBSSID mode. Select MBSSID as the Operating
Mode. The following screen diplays.
Figure 28 Wireless > Wireless Settings: MBSSID
Chapter 6 Wireless Settings Screen
The following table describes the labels in this screen.
Table 14 Wireless > Wirele ss Settings: MBSSID
LABELDESCRIPTION
Operating ModeSelect MBSSID in this field.
802.11 ModeSelect 802.11b/g to allow both IEEE802.11b and IEEE802.11g compliant
ChannelSelect the operating frequency/channel depending on your particular region
NWA1100-N User’s Guide
WLAN devices to associate with the NWA. The transmission rate of your
NWA might be reduced.
Select 802.11b/g/n to allow IEEE802.11b, IEEE802.11g and IEEE802.11n
compliant WLAN devices to associate with the NW A. The transmi ssion rate of
the NWA might be reduced.
from the drop-down list box.
73
Page 74
Chapter 6 Wireless Settings Screen
Table 14 Wireless > Wirele ss Settings: MBSSID (continued)
LABELDESCRIPTION
Channel Width This field displays only when you sele ct 802.11 b/g/n in the 802.11
Select SSID ProfileAn SSID profile is the set of parameters relating to one of the NWA’s BSSs.
IndexSelect the check box to activate an SSID profile.
ActiveSelect the check box to enable the bridge connection. Otherwise, clear the
ProfileSelect the profile(s) of the SSIDs you want to use in your wireless network.
Advanced Settings
Beacon IntervalWhen a wirelessly networked device sends a beacon, it includes with it a
DTIM IntervalDelivery Traffic Indication Message (DTIM) is the time period after which
Output Power Set the output power of the NWA in this field. If there is a high density of
Preamble TypeSelect Dynamic to have the AP automatically use short preamble when
Wireless Mode field.
A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas
a 40MHz channel uses two standard channels and offers speeds of up to
300Mbps. However, not all devices support 40MHz channels.
Select the channel bandwidth you want to use for your wireless network.
It is recommended that you select 20/40 (20/40 MHz). This allows the NWA
to adjust the channel bandwidth depending on network conditions.
Select 20 MHz if you want to lessen radio interference with other wireless
devices in your neighborhood.
The SSID (Service Set IDentifier) identifies the Service Set with which a
wireless station is associated. Wireless stations associating with the access
point (AP) must have the same SSID.
If you are configuring the NWA from a computer connected to the wireless
LAN and you change the NWA’s SSID or security settings, you will lose your
wireless connection when you press Apply to confirm. You must then change
the wireless settings of your computer to match the NWA’s new settings.
check box to disable it. The first profile is always active.
You can have up to four BSSs running on the NWA simultaneously.
Configure SSID profiles in the SSID screen.
beacon interval. This specifies the time period before the device sends the
beacon again. The interval tells receiving devices on the network how long
they can wait in lowpower mode before waking up to handle the beacon. A
high value helps save current consumption of the access point.
broadcast and multicast packets are transmitted to mobile clients in the
Active Power Management mode. A high DTIM value can cause clients to
lose connectivity with the network.
APs in an area, decrease the output power of the NWA to reduce
interference with other APs. Select one of the following Full (Full Power),
50%, 25%, 12.5% or Min (Minimum). See the product specifications for
more information on your NWA’s output power.
wireless adapters support it, otherwise the AP uses long preamble.
74
Select Long if you are unsure what preamble mode the wireless adapters
support, and to provide more reliable communications in busy wireless
networks.
RTS/CTS Threshold(Request To Send) The threshold (number of bytes) for enabling RTS/CTS
handshake. Data with its frame size larger than this value will perform the
RTS/CTS handshake. Setting this attribute to be larger than the maximum
MSDU (MAC service data unit) size turns off the RTS/CTS handshake.
Setting this attribute to its smallest value (1) turns on the RTS/CTS
handshake.
NWA1100-N User’s Guide
Page 75
Chapter 6 Wireless Settings Screen
Table 14 Wireless > Wirele ss Settings: MBSSID (continued)
LABELDESCRIPTION
Extension channel
protection mode
A-MPDU aggregation This field is available only when 802.11 b/g/n is selected as the Wireless
Short GI This field is available only when 802.11 b/g/n is selected as the Wireless
Rates ConfigurationThis section controls the data rates permitted for clients.
MCS TableThe MCS Rate table is av ailable only when 802.11 b/g/n is selected in the
You can use CTS to self or RTS-CTS protection mechanism to reduce
conflicts with other wireless networks or hidden wireless clients. The
throughput of RTS-CTS is much lower than CTS to self. Using this mode
may decrease your wireless performance.
Mode. Select Enable to allow the grouping of several A-MSDUs (Aggregate
MAC Service Data Units) into one large A-MPDU (Aggregate MAC Protocol
Data Unit). This function allows faster data transfer rates.
Mode. Select Enable to use Short GI (Guard Interval). The guard interval
is the gap introduced between data transmission from users in order to
reduce interference. Reducing the GI increases data transfer rates but also
increases interference. Increasing the GI reduces data transfer rates but
also reduces interference.
For each Rate, select an option from the Configuration list. The options
are:
• Basic (1~11 Mbps only): Clients can always connect to the access point
at this speed.
• Optional: Clients can connect to the access point at this speed, when
permitted to do so by the AP.
• Disable: Clients cannot connect to the access point at this speed.
802.11 Wireless Mode field.
IEEE 802.11n supports many different data rates which are called MCS
rates. MCS stands for Modulation and Coding Scheme. This is an 802.11n
feature that increases the wireless network performance in terms of
throughput.
For each MCS Rate (0-15), select either Enable (default) to have the NWA
use the data rate. Select Disable if you do not want the NWA to use the
data rate.
ApplyClick Apply to save your changes.
CancelClick Cancel to begin configuring this screen afresh.
6.5 Technical Reference
This section provides technical background information about the topics covered in this chapter.
Refer to Appendix E on page 191 for further readings on Wireless LAN.
6.5.1 WMM QoS
WMM (Wi-Fi MultiMedia) QoS (Quality of Service) ensures quality of service in wireless networks. It
controls WLAN transmission priority on packets to be transmitted over the wireless network.
WMM QoS prioritizes wireless traffic according to the delivery requirements of the individual and
applications. WMM QoS is a part of the IEEE 802.11e QoS enhancement to certified Wi-Fi wireless
networks.
NWA1100-N User’s Guide
75
Page 76
Chapter 6 Wireless Settings Screen
On APs without WMM QoS, all traffic streams are given the same access priority to the wireless
network. If the introduction of another traffic stream creates a data transmission demand that
exceeds the current network capacity, then the new traffic stream reduces the throughput of the
other traffic streams.
The NWA uses WMM QoS to prioritize traffic streams according to the IEEE 802.1q or DSCP
information in each packet’s header. The NWA automatically determines the priority to use for an
individual traffic stream. This prevents reductions in data transmission for applications that are
sensitive to latency and jitter (variations in delay).
6.5.2 Spanning Tree Protocol (STP)
STP detects and breaks network loops and provides backup links between switches, bridges or
routers. It allows a bridge to interact with other STP-compliant bridges in your network to ensure
that only one route exists between any two stations on the network.
6.5.2.1 Rapid STP
The NWA uses IEEE 802.1w RSTP (Rapid Spanning Tree Protocol) that allow faster convergence of
the spanning tree (while also being backwards compatible with STP-only aware bridges). Using
RSTP topology change information does not have to propagate to the root bridge and unwanted
learned addresses are flushed from the filtering database. In RSTP, the port states are Discarding,
Learning, and Forwarding.
6.5.2.2 STP Terminology
The root bridge is the base of the spanning tree; it is the bridge with the lowest identifier value
(MAC address).
Path cost is the cost of transmitting a frame onto a LAN through that port. It is assigned according
to the speed of the link to which a port is attached. The slower the media, the higher the cost - see
the following table.
Table 15 STP Path Costs
Path Cost4Mbps250100 to 10001 to 65535
Path Cost10Mbps10050 to 6001 to 65535
Path Cost16Mbps6240 to 4001 to 65535
Path Cost100Mbps1910 to 601 to 65535
Path Cost1Gbps43 to 101 to 65535
Path Cost10Gbps21 to 51 to 65535
On each bridge, the root port is the port through which this bridge communicates with the root. It is
the port on this switch with the lowest path cost to the root (the root path cost). If there is no root
port, then this bridge has been accepted as the root bridge of the spanning tree network.
For each LAN segment, a designated bridge is selected. This bridge has the lowest cost to the root
among the bridges connected to the LAN.
LINK SPEED
RECOMMENDED
VALUE
RECOMMENDED
RANGE
ALLOWED
RANGE
76
NWA1100-N User’s Guide
Page 77
6.5.2.3 How STP Works
After a bridge determines the lowest cost-spanning tree with STP, it enables the root port and the
ports that are the designated ports for connected LANs, and disables all other ports that participate
in STP. Network packets are therefore only forwarded between enabled ports, eliminating any
possible network loops.
STP-aware bridges exchange Bridge Protocol Data Units (BPDUs) periodically. When the bridged
LAN topology changes, a new spanning tree is constructed.
Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge
Protocol Data Units) transmitted from the root bridge. If a bridge does not get a Hello BPDU after a
predefined interval (Max Age), the bridge assumes that the link to the root bridge is down. This
bridge then initiates negotiations with other bridges to reconfigure the network to re-establish a
valid network topology.
6.5.2.4 STP Port States
STP assigns five port states (see next table) to eliminate packet looping. A bridge port is not
allowed to go directly from blocking state to forwarding state so as to eliminate transient loops.
Table 16 STP Port States
PORT STATESDESCRIPTIONS
DisabledSTP is disabled (default).
BlockingOnly configuration and management BPDUs are received and processed.
ListeningAll BPDUs are received and processed.
LearningAll BPDUs are received and processed. Information frames are submitted to the
ForwardingAll BPDUs are received and processed. All information frames are received and
Chapter 6 Wireless Settings Screen
learning process but not forwarded.
forwarded.
6.5.3 Additional Wireless Terms
Table 17 Additional Wireless Terms
TERMDESCRIPTION
Intra-BSS TrafficThis describes direct communication (not through the NWA) between two
wireless devices within a wireless network. You might disable this kind of
communication to enhance security within your wireless network.
RTS/CTS ThresholdIn a wireless network which covers a large area, wireless devices are
sometimes not aware of each other’s presence. This may cause th em to
send information to the AP at the same time and result in information
colliding and not getting through.
By setting this value lower than th e default v alue, the wireless devices must
sometimes get permission to send information to the NWA. The lower the
value, the more often the devices must get permission.
If this value is greater than the fragmentation threshold value (see below),
then wireless devices never have to get permission to send information to
the NWA.
PreambleA preamble affects the timing in your wireless netw ork. There are two
preamble modes: long and short.If a device uses a different preamble
mode than the NWA does, it cannot communicate with the NWA.
NWA1100-N User’s Guide
77
Page 78
Chapter 6 Wireless Settings Screen
TERMDESCRIPTION
Fragmentation
Threshold
RoamingIf you have two or more NWAs (or other wireless access points) on your
AntennaAn antenna couples Radio Frequency (RF) signals onto air. A transmitter
A small fragmentation threshold is recommended for busy networks, while a
larger threshold provides faster performance if the network is not very busy .
wireless network, you can enable this option so that wireless devices can
change locations without having to log in again. This is useful for devices,
such as notebooks, that move around a lot.
within a wireless device sends an RF signal to the antenna, which
propagates the signal through the air. The antenna also operates in reverse
by capturing RF signals from the air.
Positioning the antennas properly increases the range and coverage area of
a wireless LAN.
78
NWA1100-N User’s Guide
Page 79
7.1 Overview
This chapter describes how you can configure Service Set Identifier (SSID) profiles in your NWA.
Figure 29 Sample SSID Profiles
CHAPTER 7
SSID Screen
In the figure above, the NWA has three SSID profiles configured: a standard profile (SSID01), a
profile with high QoS settings for Voice over IP (VoIP) users (VoIP_SSID), and a guest profile that
allows visitors access only the Internet and the network printer (Guest_SSID).
7.1.1 What You Can Do in this Chapter
Use the Wireless > SSID screen to configure up to 16 SSID profiles for your NWA (see Section 7.2
on page 80).
7.1.2 What You Need To Know
The following terms and concepts may help as you read through this chapter.
When the NWA is set to Access Point, AP + Bridge or MBSSID mode, you need to choose the SSID
profile(s) you want to use in your wireless network (see Section 6.4 on page 62 for more
information on operating modes).
NWA1100-N User’s Guide79
Page 80
Chapter 7 SSID Screen
To configure the settings of your SSID profile, you need to know the Media Access Control (MAC)
addresses of the devices you want to allow access to it.
Each SSID profile references the settings configured in the following screens:
• Wireless > Security (one of the security profiles)
• Wireless > RADIUS (one of the RADIUS profiles)
• Wireless > MAC Filter (the MAC filter list, if activated in the SSID profile)
• Also, use the VLAN screen to set up wireless VLANs based on SSID
Configure the fields in the above screens to use the settings in an SSID profile.
7.2 The SSID Screen
Use this screen to select the SSID profile you want to configure. Click Wireless > SSID to display
the screen as shown.
Figure 30 Wireless > SSID
80
The following table describes the labels in this screen.
Figure 31 Wireless > SSID
LABELDESCRIPTION
Profile Settings
IndexThis field displays the index number of each SSID profile.
NWA1100-N User’s Guide
Page 81
Chapter 7 SSID Screen
Figure 31 Wireless > SSID (continued)
LABELDESCRIPTION
Profile NameThis field displays the identification name of each SSID profile on the NWA.
SSIDThis field displays the name of the wireless profile on the netw ork. When a
wireless client scans for an AP to associate with, this is the name that is
broadcast and seen in the wireless client utility.
SecurityThis field indicates which security profile is currently associated with each
RADIUSThis field displays which RADIUS profile is currently associated with each
QoSThis field displays the Quality of Service setting for this profile or NONE if
MAC FilterThis field displays which MAC filter profile is currently associated with each
EditClick the radio button next to the profile you want to configure and click Edit
VLAN (802.1Q)
Enable 802.1Q VLAN Select this to enable VLAN tagging.
Management VLAN ID Enter a number from 1 to 4094 to define this VLAN group. At least one
BSSID1~4 VLAN IDEnter a VLAN ID number from 1 to 4094. Packets coming from the WLAN
SaveClick Save to save your changes.
ResetClick Reset to begin configuring this screen afresh.
SSID profile. See Section 8.4.1 on page 89 for more information.
SSID profile, if you have a RADIUS server configured.
QoS is not configured on a profile.
SSID profile, or Disable if MAC filtering is not configured on an SSID profile.
to go to the SSID configuration screen.
device in your network must belong to this VLAN group in order to manage
the NWA.
using this BSSID profile are tagged with the VLAN ID number by the NWA.
Different BSSID profiles can use the same or different VLAN IDs. This allows
you to split wireless stations into groups using similar VLAN IDs.
7.2.1 Configuring SSID
Use this screen to configure an SSID profile. In the Wireless > SSID screen, select an SSID profile
and click Edit to display the following screen.
Figure 32 SSID: Edit
NWA1100-N User’s Guide
81
Page 82
Chapter 7 SSID Screen
The following table describes the labels in this screen.
Table 18 SSID: Edit
LABELDESCRIPTION
Profile NameThis is the name that identifying this profile.
SSIDWhen a wireless client scans for an AP to associate with, this is the name
SecuritySelect a security profile to use with this SSID profile. See Section 8.4.1 on
RADIUSSelect a RADIUS profile from the drop-down list box, if you have a RADIUS
MAC Filtering
QoSSelect the Quality of Service priority for this BSS’s traffic.
that is broadcast and seen in the wireless client utility.
page 89 for more information.
server configured. If you do not need to use RADIUS authentication, ignore
this field. See Section 9.4 on page 100 for more information.
Select a MAC filter profile from the drop-down list box. If you do not want to
use MAC filtering on this profile, select Disable.
•If you select WMM from the QoS list, the priority of a data packet
depends on the packet’s IEEE 802.1q or DSCP header. If a packet has no
WMM value assigned to it, it is assigned the default priority.
•If you select WMM_VOICE, WMM_VIDEO, WMM_BEST_EFFORT or
WMM_BACKGROUND, the NWA applies that QoS setting to all of that
SSID’s traffic.
•If you select NONE, the NWA applies no priority to traffic on this SSID.
Note: When you configure an SSID profile’s QoS settings, the NWA applies
the same QoS setting to all of the profile’s traffic.
Number of Wireless
Stations Allowed to
Associate
Hidden SSIDIf you do not select the checkbox, the NWA to broadcast this SSID (a
Enable Intra-BSS
Traffic blocking
SaveClick Save to save your changes.
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
Use this field to set a maximum number of wireless stations that may
connect to the device.
wireless client scanning for an AP will find this SSID). Alternatively, if you
select the checkbox, the NWA hide this SSID (a wireless client scanning for
an AP will not find this SSID).
Select the checkbox to prevent wireless clients in this profile’s BSS from
communicating with one another.
7.3 Technical Reference
This section provides technical background information about the topics covered in this chapter.
7.3.1 WMM QoS
82
WMM (Wi-Fi MultiMedia) QoS (Quality of Service) ensures quality of service in wireless networks. It
controls WLAN transmission priority on packets to be transmitted over the wireless network.
WMM QoS prioritizes wireless traffic according to the delivery requirements of the individual and
applications. WMM QoS is a part of the IEEE 802.11e QoS enhancement to certified Wi-Fi wireless
networks.
NWA1100-N User’s Guide
Page 83
On APs without WMM QoS, all traffic streams are given the same access priority to the wireless
network. If the introduction of another traffic stream creates a data transmission demand that
exceeds the current network capacity, then the new traffic stream reduces the throughput of the
other traffic streams.
The NWA uses WMM QoS to prioritize traffic streams according to the IEEE 802.1q or DSCP
information in each packet’s header. The NWA automatically determines the priority to use for an
individual traffic stream. This prevents reductions in data transmission for applications that are
sensitive to latency and jitter (variations in delay).
7.3.1.1 WMM QoS Priorities
The following table describes the WMM QoS priority levels that the NWA uses.
Table 19 WMM QoS Priorities
Priority Leveldescription
voice
(WMM_VOICE)
video
(WMM_VIDEO)
best effort
(WMM_BEST_EFFORT)
background
(WMM_BACKGROUND)
Chapter 7 SSID Screen
Typically used for traffic that is especially sensitive to jitter. Use this
priority to reduce latency for improved voice quality.
Typically used for traffic which has some tolerance for jitter but needs to
be prioritized over other data traffic.
Typically used for traffic from applications or devices that lack QoS
capabilities. Use best effort priority for traffic that is less sensitive to
latency, but is affected by long delays, such as Internet surfing.
This is typically used for non-critical traffic such as bulk transfers and
print jobs that are allowed but that should not affect other applications
and users. Use background priority for applications that do not have strict
latency and throughput requirements.
7.3.2 Type Of Service (ToS)
Network traffic can be classified by setting the ToS (Type Of Service) v alues at the data source (for
example, at the NWA) so a server can decide the best method of delivery, that is the least cost,
fastest route and so on.
7.3.2.1 ToS (Type of Service) and WMM QoS
The DSCP value of outgoing packets is between 0 and 255. 0 is the default priority. WM M QoS
checks the DSCP value in the header of data packets. It gives the traffic a priority according to this
number.
In order to control which priority level is given to traffic, the device sending the traffic must set the
DSCP value in the header. If the DSCP value is not specified, then the traffic is treated as besteffort. This means the wireless clients and the devices with which they are communicating must
both set the DSCP value in order to make the best use of WMM QoS. A Voice over IP (VoIP) device
for example may allow you to define the DSCP value.
The following table lists which WMM QoS priority level the NWA uses for specific DSCP values.
Table 20 ToS and IEEE 802.1d to WMM QoS Priority Level Mapping
Table 20 ToS and IEEE 802.1d to WMM QoS Priority Level Mapping
Dscp ValueWMM qos Priority Level
A
96, 0
64, 32background
A. The NWA also uses best effort for any DSCP value for which another WMM
QoS priority is not specified (255, 158 or 37 for example).
besteffort
84
NWA1100-N User’s Guide
Page 85
8.1 Overview
This chapter describes how to use the Wireless Security screen. This screen allows you to
configure the security mode for your NWA.
Wireless security is vital to your network. It protects communications between wireless stations,
access points and the wired network.
Figure 33 Securing the Wireless Network
CHAPTER 8
Wireless Security Screen
In the figure above, the NWA checks the identity of devices before giving them access to the
network. In this scenario, Computer A is denied access to the network, while Computer B is
granted connectivity.
The NWA secure communications via data encryption, wireless client authentication and MAC
address filtering. It can also hide its identity in the network.
8.2 What You Can Do in this Chapter
Use the Wireless > Security screen to choose the security mode for your NWA (see Section 8.4
on page 87).
NWA1100-N User’s Guide85
Page 86
Chapter 8 Wireless Security Screen
8.3 What You Need To Know
User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before they can use it. However,
every device in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS
server. This is a server used in businesses more than in homes. If you do not have a RADIUS server,
you cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network,
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized
wireless users to get a valid user name and password. Then, they can use that user name and
password to use the wireless network.
The following table shows the relative effectiveness of wireless security methods:.
Table 21 Wireless Security Levels
SECURITY
LEVEL
Least
Secure
Most Secure
SECURITY TYPE
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
WPA2
86
The available security modes in your NWA are as follows:
• None. No data encryption.
• WEP. Wired Equivalent Privacy (WEP) encryption scr am bles the data transmitted between the
wireless stations and the access points to keep network communications private.
• 802.1x-Only. This is a standard that extends the features of IEEE 802.11 to support extended
authentication. It provides additional accounting and control features. This option does not
support data encryption.
• 802.1x-Static64. This provides 802.1x-Only authentication with a static 64bit WEP key and
an authentication server.
• 802.1x-Static128. This provides 802.1x-Only authentication with a static 128bit WEP key
and an authentication server.
• 802.1x-Static152. This provides 802.1x-Only authentication with a static 152bit WEP key
and an authentication server.
• WPA. Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard.
• WPA2. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption,
authentication and key management than WPA.
• WPA2-MIX. This commands the NWA to use either WP A2 or WPA depending on which security
mode the wireless client uses.
NWA1100-N User’s Guide
Page 87
Chapter 8 Wireless Security Screen
• WPA2-PSK. This adds a pre-shared key on top of WPA2 standard.
• WPA2-PSK-MIX. This commands the NWA to use either WPA-PSK or WPA2-PSK depending on
which security mode the wireless client uses.
Note: In Bridge/Repeater and AP+Bridge operating modes, the only available security
modes are WEP, WPA-PSK, and WPA2-PSK.
Note: To guarantee 802.11n wireless speed, please only use WPA2 or WP A2-PSK security
mode. Other security modes may degrate th e wireless speed performance to
802.11g.
Passphrase
A passphrase functions like a password. In WEP security mode, it is further converted by the NWA
into a complicated string that is referred to as the “key”. This key is requested from all devices
wishing to connect to a wireless network.
PSK
The Pre-Shared Key (PSK) is a password shared by a wireless access point and a client during a
previous secure connection. The key can then be used to establish a connection between the two
parties.
Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message. Encryption is the process of converting data into unreadable text. This
secures information in network communications. The intended recipient of the data can “unlock” it
with a pre-assigned key, making the information readable only to him. The NWA when used as a
wireless client employs Temporal Key Integrity Protocol (TKIP) data encryption.
EAP
Extensible Authentication Protocol (EAP) is a protocol used by a wireless client, an access point and
an authentication server to negotiate a connection.
The EAP methods employed by the NWA when in Wireless Client operating mode are Transport
Layer Security (TLS), Protected Extensible Authentication Protocol (PEAP), Lightweight Extensible
Authentication Protocol (LEAP) and Tunneled Transport Layer Security (TTLS). The authentication
protocol may either be Microsoft Challenge Handshake Authentication Protocol Version 2
(MSCHAPv2) or Generic Token Card (GTC).
Further information on these terms can be found in Appendix E on page 191.
8.4 The Security Screen
Use this screen to choose the security mode for your NWA.
NWA1100-N User’s Guide
87
Page 88
Chapter 8 Wireless Security Screen
Click Wireless > Security. Select the profile that you want to configure and click Edit.
Figure 34 Wireless > Security
The Security Settings screen varies depending upon the security mode you select.
Figure 35 Security: None
Note that some screens display differently depending on the operating mode selected in the
Wireless > Wireless Settings screen.
Note: Y ou must enable the same wireless security settings on the NWA and on all wirel ess
clients that you want to associate with it.
88
NWA1100-N User’s Guide
Page 89
8.4.1 Security: WEP
Use this screen to use WEP as the security mode for your NWA. Select WEP in the Security Mode
field to display the following screen.
Figure 36 Security: WEP
Chapter 8 Wireless Security Screen
The following table describes the labels in this screen.
Table 22 Security: WEP
LABELDESCRIPTION
Profile NameThis is the name that identifying this profile.
Security ModeChoose WEP in this field.
Authentication
Type
Data EncryptionSelect 64-bit WEP, 128-bit WEP or 152-bit WEP to enable data encryption.
PassphraseEnter the passphrase or string of text used for automatic WEP key generation on
GenerateClick this to get the keys from the Passphrase you entered.
Key 1 to
Key 4
ApplyClick Apply to save your changes.
Select Open or Shared Key from the drop-down list box.
wireless client adapters.
The WEP keys are used to encrypt data. Both the NWA and the wireless stations
must use the same WEP key for data transmission.
If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal
characters ("0-9", "A-F").
If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal
characters ("0-9", "A-F").
If you chose 152-bit WEP, then enter 16 ASCII characters or 32 hexadecimal
characters ("0-9", "A-F").
You must configure all four keys, but only one key can be activated at any one
time.
NWA1100-N User’s Guide
89
Page 90
Chapter 8 Wireless Security Screen
Table 22 Security: WEP (continued)
LABELDESCRIPTION
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
8.4.2 Security: 802.1x Only
This screen varies depending on whether you select Access Point or Wireless Client in the
Wireless > Wireless Settings screen.
8.4.2.1 Access Point
Use this screen to use 802.1x-Only security mode for your NWA that is in Access Point operating
mode. Select 802.1x-Only in the Security Mode field to display the following screen.
Figure 37 Security: 802.1x Only for Access Point
The following table describes the labels in this screen.
Table 23 Security: 802.1x Only for Access Point
LABELDESCRIPTION
Security Settings
Profile NameThis is the name that identifying this profile.
Security ModeChoose 802.1x Only in this field.
Rekey Options
ReAuthentication
Time
Specify how often wireless stations have to resend user names and passwords in
order to stay connected.
Enter a time interval between 10 and 9999 seconds. Alternatively, enter “0 ” to
turn reauthentication off.
Note: If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Group-Key
Update
ApplyClick Apply to save your changes.
The NWA automatically disconnects a wireless station from the wired network
after a period of inactivity. The wireless station needs to enter the user name and
password again before access to the wired network is allowed.
90
NWA1100-N User’s Guide
Page 91
Table 23 Security: 802.1x Only for Access Point (continued)
LABELDESCRIPTION
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
8.4.2.2 Wireless Client
Use this screen to use 802.1x-Only security mode for your NWA that is in Wireless Client operating
mode. Select 802.1x-Only in the Security Mode field to display the following screen.
Figure 38 Security: 802.1x Only for Wireless Client
Chapter 8 Wireless Security Screen
The following table describes the labels in this screen.
Table 24 Security: 802.1x Only for Wireless Client
LABELDESCRIPTION
Security Settings
Profile NameThis is the name that identifying this profile.
Security ModeChoose the same security mode used by the AP.
Data EncryptionSelect between None and Dynamic WEP. Refer to Appendix E on page 198 for
IEEE802.1x Authentication
EAP TypeThe options on the left refer to EAP methods. You can choose either TLS, LEAP,
User Information
UsernameSupply the username of the account created in the RADIUS server.
PasswordSupply the password of the account created in the RADIUS server.
ApplyClick Apply to save your changes.
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
information on using Dynamic WEP.
PEAP or TTLS.
The options on the right refer to authentication protocols. You can choose
Use this screen to use 802.1x Static 64, 802.1x Static 128, or 802.1x Static 152 security mode for
your NWA. Select 802.1x Static 64, 802.1x Static 128, or 802.1x Static 152 in the Security Mode field to display the following screen.
Security Settings
Profile NameThis is the name that identifying this profile.
Security ModeChoose 802.1x Static 64, 802.1x Static 128, or 802.1x Static 152 in this
field.
Passphrase
Generate
Enter the passphrase or string of text used for automatic WEP key gener ation on
wireless client adapters (AP mode).
Click this to get the keys from the Passphrase you entered (AP mode).
Key 1 to Key 4If you chose 802.1x Static 64, then enter any 5 characters (ASCII string) or 10
hexadecimal characters ("0-9", "A-F ") preceded by 0x for each key.
If you chose 802.1x Static 128-bit, then enter 13 characters (ASCII string) or
26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each key.
There are four data encryption keys to secure your data from eavesdropping by
unauthorized wireless users. The values for the keys must be set up exactly the
same on the access points as they are on the wireless stations.
The preceding “0x” is entered automatically. You must configur e all four keys,
but only one key can be activated at any one time.
Rekey Options
ReAuthentication
Timer
Specify how often wireless stations have to resend user names and passwords in
order to stay connected.
Enter a time interval between 10 and 9999 seconds. Alternatively, enter “0 ” to
turn reauthentication off.
Note: If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Group-Key
Update
ApplyClick Apply to save your changes.
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
The NWA automatically disconnects a wireless station from the wired network
after a period of inactivity. The wireless station needs to enter the user name and
password again before access to the wired network is allowed.
8.4.4 Security: WPA
This screen varies depending on whether you select Access Point or Wireless Client in the
Wireless > Wireless Settings screen.
8.4.4.1 Access Point
Use this screen to employ WPA as the security mode for your NW A that is in Access P oint oper ating
mode. Select WPA in the Security Mode field to display the following screen.
Figure 40 Security: WPA for Access Point
NWA1100-N User’s Guide
93
Page 94
Chapter 8 Wireless Security Screen
The following table describes the labels in this screen.
Table 26 Security: WPA for Access Point
LABELDESCRIPTION
Security Settings
Profile NameThis is the name that identifying this profile.
Security ModeChoose WPA in this field.
Rekey Options
ReAuthentication
Timer
Group Key
Update
ApplyClick Apply to save your changes.
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
Specify how often wireless stations have to resend user names and passwords in
order to stay connected.
Enter a time interval between 10 and 9999 seconds. Alternatively, enter “0 ” to
turn reauthentication off.
Note: If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
The Group Key Update Timer is the rate at which the AP sends a new group
key out to all clients. The re-keying process is the WPA equivalent of
automatically changing the group key for an AP and all stations in a WLAN on a
periodic basis. Setting of the Group Key Update Timer is also supported in
WPA-PSK mode.
8.4.4.2 Wireless Client
Use this screen to employ WPA as the security mode for your NWA that is in Wireless Client
operating mode. Select WPA in the Security Mode field to display the following screen.
Figure 41 Security: WPA for Wireless Client
94
NWA1100-N User’s Guide
Page 95
Chapter 8 Wireless Security Screen
The following table describes the labels in this screen.
Table 27 Security: WPA for Wireless Client
LABELDESCRIPTION
Security Settings
Profile NameThis is the name that identifying this profile.
Security ModeChoose the same security mode used by the AP.
Data EncryptionSelect between None and TKIP.
IEEE802.1x Authentication
EAP TypeThe options on the left refer to EAP methods. You can choose either TLS, LEAP,
User Information
UsernameSupply the username of the account created in the RADIUS server.
PasswordSupply the password of the account created in the RADIUS server.
ApplyClick Apply to save your changes.
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
PEAP or TTLS.
The options on the right refer to authentication protocols. You can choose
between MSCHAPv2 and GTC.
8.4.5 Security: WPA2 or WPA2-MIX
This screen varies depending on whether you select Access Point or Wireless Client in the
Wireless > Wireless Settings screen.
8.4.5.1 Access Point
Use this screen to use WAP2 or WPA2-MIX as the security mode for your NWA that is in Access P oint
operating mode. Select WPA2 or WPA2-MIX in the Security Mode field to display the following
screen.
Figure 42 Security:WPA2 or WPA2-MIX for Access Point
NWA1100-N User’s Guide
95
Page 96
Chapter 8 Wireless Security Screen
The following table describes the labels not previously discussed
Table 28 Security: WPA2 or WPA2-MIX for Access Point
LABELDESCRIPTIONS
Security Settings
Profile NameThis is the name that identifying this profile.
Security ModeChoose WPA2 or WPA2-MIX in this field.
Rekey Options
ReAuthentication
Timer
Group Key
Update Timer
ApplyClick Apply to save your changes.
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
Specify how often wireless stations have to resend usernames and p as sw ords in
order to stay connected.
Enter a time interval between 10 and 9999 seconds. Alternatively, enter “0” to
turn reauthentication off.
Note: If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
The Group Key Update Timer is the rate at which the AP sends a new group
key out to all clients. The re-keying process is the WPA equivalent of
automatically changing the group key for an AP and all stations in a WLAN on a
periodic basis. Setting of the Group Key Update Timer is also supported in
WPA-PSK mode.
8.4.5.2 Wireless Client
Use this screen to employ WPA2 or WPA2-MIX as the security mode of your NWA that is in Wireless
Client operating mode. Select WPA2 or WPA2-MIX in the Security Mode field to display the
following screen.
Figure 43 Security: WPA2 or WPA2-MIX for Wireless Client
96
NWA1100-N User’s Guide
Page 97
Chapter 8 Wireless Security Screen
The following table describes the labels in this screen.
Table 29 Security: WPA2 or WPA2-MIX for Wireless Client
LABELDESCRIPTION
Security Settings
Profile NameThis is the name that identifying this profile.
Security ModeChoose the same security mode used by the AP.
IEEE802.1x Authentication
EAP TypeThe options on the left refer to EAP methods. You can choose either TLS, LEAP,
User Information
UsernameSupply the username of the account created in the RADIUS server.
PasswordSupply the password of the account created in the RADIUS server.
ApplyClick Apply to save your changes.
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
PEAP or TTLS.
The options on the right refer to authentication protocols. You can choose
between MSCHAPv2 and GTC.
8.4.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX
Use this screen to employ WPA-PSK, WPA2-PSK or WPA2-PSK-MIX as the security mode of your
NWA. Select WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in the Security Mode field to display the
following screen.
Figure 44 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX
The following table describes the labels not previously discussed
Table 30 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX
LABELDESCRIPTION
Profile NameThis is the name that identifying this profile.
Security ModeChoose WPA-PSK, WPA2-PSK or WPA2-PSK-MIX in this field.
Pre-Shared KeyThe encryption mechanisms used for WPA and WPA-PSK are the same. The
ApplyClick Apply to save your changes.
only difference between the two is that WPA-PSK uses a simple common
password, instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including
spaces and symbols).
NWA1100-N User’s Guide
97
Page 98
Chapter 8 Wireless Security Screen
Table 30 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX (continued)
LABELDESCRIPTION
ResetClick Reset to begin configuring this screen afresh.
BackClick Back to return to the previous screen.
8.5 Technical Reference
This section provides technical background information on the topics discussed in this chapter.
The following is a general guideline in choosing the security mode for your NWA.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.Use WPA(2)
security if you have WPA(2)-aware wirele ss clients and a RADIUS server. WPA has user
authentication and improved data encryption over WEP.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher bit key
offers better security. You can manually enter 64-bit, 128-bit or 152-bit WEP keys.
More information on Wireless Security can be found in Appendix E on page 191.
98
NWA1100-N User’s Guide
Page 99
9.1 Overview
This chapter describes how you can use the Wireless > RADIUS screen.
Remote Authentication Dial In User Service (RADIUS) is a protocol that can be used to manage user
access to large networks. It is based on a client-server model that supports authentication,
authorization and accounting. The access point is the client and the server is the RADIUS server.
Figure 45 RADIUS Server Setup
CHAPTER 9
RADIUS Screen
In the figure above, wireless clients A and B are trying to access the Internet via the NWA. The
NWA in turn queries the RADIUS server if the identity of clients A and U are allowed access to the
Internet. In this scenario, only client U’s identity is verified by the RADIUS server and allowed
access to the Internet.
9.2 What You Can Do in this Chapter
Use the Security > RADIUS screen if you want to authenticate wireless users usinga RADIUS
Server and/or Accounting Server (see Section 8.4.1 on page 89).
9.3 What You Need to Know
The RADIUS server handles the following tasks:
• Authentication which determines the identity of the users.
• Authorization which determines the network services available to authenticated users once
they are connected to the network.
NWA1100-N User’s Guide99
Page 100
Chapter 9 RADIUS Screen
• Accounting which keeps track of the client’s network activity.
RADIUS is a simple package exchange in which your AP acts as a message relay between the
wireless client and the network RADIUS server.
You should know the IP addresses, ports and share secrets of the external RADIUS server and/or
the external RADIUS accounting server you want to use with your NWA. You can configure a
primary and backup RADIUS and RADIUS accounting server for your NWA.
9.4 The RADIUS Screen
Use this screen to set up your NWA’s RADIUS server settings. Click Wireless > RADIUS. The
screen appears as shown.
Figure 46 Wireless > RADIUS
100
The following table describes the labels in this screen.
Table 31 Wireless > RADIUS
LABELDESCRIPTION
IndexSelect an index number.
ProfileNameThis is the name that identifying this RA DIUS.
PrimaryConfigure the fields below to set up user authentication and accounting.
BackupIf the NWA cannot communicate with the Primary accounting server, you
can have the NWA use a Backup RADIUS server. Make sure the Active
check boxes are selected if you want to use backup servers.
The NWA will attempt to communicate thre e times be fore usi ng the Backup
servers. Requests can be issued from the client interface to use the backup
server. The length of time for each authentication is decided by the wireless
client or based on the configuration of t he Re Authentication Ti mer field i n
the Security Settings screen.
RADIUS Option
NWA1100-N User’s Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.