This manual is intended for people who want to configure the NWA using the web
configurator.
Tips for Reading User’s Guides On-Screen
When reading a ZyXEL User’s Guide On-Screen, keep the following in mind:
• If you don’t already have the latest version of Adobe Reader, you can download
it from http://www.adobe.com.
• Use the PDF’s bookmarks to quickly navigate to the areas that interest you.
Adobe Reader’s bookmarks pane opens by default in all ZyXEL User’s Guide
PDFs.
• If you know the page number or know vaguely which page-range you want to
view, you can enter a number in the toolbar in Reader, then press [ENTER] to
jump directly to that page.
• Type [CTRL]+[F] to open the Adobe Reader search utility and enter a word or
phrase. This can help you quickly pinpoint the information you require. You can
also enter text directly into the toolbar in Reader.
• To quickly move around within a page, press the [SPACE] bar. This turns your
cursor into a “hand” with which you can grab the page and move it around
freely on your screen.
• Embedded hyperlinks are actually cross-references to related text. Click them to
jump to the corresponding section of the User’s Guide PDF.
Related Documentation
•Quick Start Guide
The Quick Start Guide is designed to help you get your NWA up and running
right away. It contains information on setting up your network and configuring
for Internet access.
• Web Configurator Online Help
The embedded Web Help contains descriptions of individual screens and
supplementary information.
• Command Reference Guide
The Command Reference Guide explains how to use the Command-Line
Interface (CLI) and CLI commands to configure the NWA.
Note: It is recommended you use the web configurator to configure the NWA.
NWA-3160 Series User’s Guide
3
About This User's Guide
• Support Disc
Refer to the included CD for support documents.
Documentation Feedback
Send your comments, questions or suggestions to: techwriters@zyxel.com.tw
Thank you!
The Technical Writing Team, ZyXEL Communications Corp.,
6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan.
Need More Help?
More help is available at www.zyxel.com.
• Download Library
Search for the latest product updates and documentation from this link. Read
the Tech Doc Overview to find out how to efficiently use the User Guide, Quick
Start Guide and Command Line Interface Reference Guide in order to better
understand how to use your product.
• Knowledge Base
If you have a specific question about your product, the answer may be here.
This is a collection of answers to previously asked questions about ZyXEL
products.
•Forum
This contains discussions on ZyXEL products. Learn from others who use ZyXEL
products and share your experiences as well.
4
NWA-3160 Series User’s Guide
About This User's Guide
Customer Support
Should problems arise that cannot be solved by the methods listed above, you
should contact your vendor. If you cannot contact your vendor, then contact a
ZyXEL office for the region in which you bought the device.
See http://www.zyxel.com/web/contact_us.php for contact information. Please
have the following information ready when you contact an office.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
NWA-3160 Series User’s Guide
5
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
Warnings tell you about things that could harm you or your NWA.
Note: Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The ZyWALL 1050 may be referred to as the “NWA”, the “device”, the “system”
or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
Document Conventions
• A key stroke is denoted by square brackets and uppercase text, for example,
[ENTER] means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the
[ENTER] key. “Select” or “choose” means for you to use one of the predefined
choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For
example, Maintenance > Log > Log Setting means you first click
Maintenance in the navigation panel, then the Log sub menu and finally the
Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value.
For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may
denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other
words”.
6
NWA-3160 Series User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide use the following generic icons. The NWA icon is not
an exact representation of your NWA.
Graphics in this book may differ slightly from the product due to differences in
operating systems, operating system versions, or if you installed updated
firmware/software for your device. Every effort has been made to ensure that the
information in this manual is accurate
NWAComputerNotebook computer
ServerPrinterFirewall
.
TelephoneSwitchRouter
NWA-3160 Series User’s Guide
7
Safety Warnings
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• ONLY qualified service personnel should service or disassemble this device.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device.
• Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in
North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order
a new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• Antenna Warning! This device meets ETSI and FCC certification requirements when using
the included antenna(s). Only use the included antenna(s).
• If you wall mount your device, make sure that no electrical lines, gas or water pipes will
be damaged.
• The PoE (Power over Ethernet) devices that supply or receive power and their connected
Ethernet cables must all be completely indoors.
Safety Warnings
8
Your product is marked with this symbol, which is known as the WEEE mark. WEEE
stands for Waste Electronics and Electrical Equipment. It means that used electrical
and electronic products should not be mixed with general waste. Used electrical and
electronic equipment should be treated separately.
Note: This User’s Guide includes the NWA-3160, NWA-3163 and the NWA-3166.
Illustrations used throughout this book are based on the NWA-3160 (unless
otherwise stated). The Web Configuration screens are based on the NWA-3166
(unless otherwise stated).
1.1 Overview
Your NWA extends the range of your existing wired network without additional
wiring, providing easy network access to mobile users.
It is highly versatile as it supports up to eight Basic Service Set Identifiers
(BSSID) simultaneously. The Quality of Service (QoS) features allow you to
prioritize time-sensitive or highly important applications such as Voice over
Internet Protocol (VoIP).
Multiple security profiles allow you to easily assign different types of security to
groups of users. The NWA controls network access with Media Access Control
(MAC) address filtering, rogue Access Point (AP) detection, layer 2 isolation and an
internal authentication server. It also provides a high level of network traffic
security, supporting Institute of Electronic Engineers (IEEE) 802.1x, Wi-Fi
Protected Access (WPA), WPA2 and Wired Equivalent Privacy (WEP) data
encryption.
Your NWA is easy to install, configure and use. The embedded Web-based
configurator enables simple, straightforward management and maintenance.
See the Quick Start Guide for instructions on how to make hardware connections.
NWA-3160 Series User’s Guide
23
Chapter 1 Introduction
1.2 Applications for the NWA
The NWA can be configured to use the following WLAN operating modes
• Access Point
•Bridge / Repeater
•AP + Bridge
•MBSSID
Applications for each operating mode are shown below.
1.2.1 Access Point
The NWA is an ideal access solution for wireless Internet connection. A typical
Internet access application for your NWA is shown as follows. Stations A, B and C
can access the wired network through the NWAs.
Figure 1 Access Point Application
AP1
A
BSS1
AP2
B
C
BSS2
24
NWA-3160 Series User’s Guide
1.2.2 Bridge / Repeater
The NWA can act as a wireless network bridge and establish wireless links with
other APs. In the figure below, the two NWAs (A and B) are connected to
independent wired networks and have a bridge connection (A can communicate
with B) at the same time. A NWA in repeater mode (C in Figure 3) has no Ethernet
connection. When the NWA is in bridge mode, you should enable Spanning Tree
Protocol (STP) to prevent bridge loops.
When the NWA is in Bridge / Repeater mode, security between APs (the Wireless
Distribution System or WDS) is independent of the security between the wireless
stations and the AP. If you do not enable WDS security, traffic between APs is not
encrypted. When WDS security is enabled, both APs must use the same preshared key. See Section 8.2.2 on page 127 for more details.
Once the security settings of peer sides match one another, the connection
between devices is made.
At the time of writing, WDS security is compatible with other ZyXEL access points
only. Refer to your other access point’s documentation for details.
Chapter 1 Introduction
Figure 2 Bridge Application
A
B
NWA-3160 Series User’s Guide
25
Chapter 1 Introduction
Figure 3 Repeater Application
1.2.2.1 Bridge / Repeater Mode Example
In the example below, when both NWAs are in Bridge / Repeater mode, they form
a WDS (Wireless Distribution System) allowing the computers in LAN 1 to connect
to the computers in LAN 2.
Figure 4 Bridging Example
26
Be careful to avoid bridge loops when you enable bridging in the NWA. Bridge
loops cause broadcast traffic to circle the network endlessly, resulting in possible
throughput degradation and disruption of communications. The following
examples show two network topologies that can lead to this problem:
NWA-3160 Series User’s Guide
Chapter 1 Introduction
• If two or more NWAs (in bridge mode) are connected to the same hub.
Figure 5 Bridge Loop: Two Bridges Connected to Hub
• If your NWA (in bridge mode) is connected to a wired LAN while communicating
with another wireless bridge that is also connected to the same wired LAN.
Figure 6 Bridge Loop: Bridge Connected to Wired LAN
To prevent bridge loops, ensure that you enable Spanning Tree Protocol (STP) in
the Wireless screen or your NWA is not set to bridge mode while connected to
both wired and wireless segments of the same LAN.
NWA-3160 Series User’s Guide
27
Chapter 1 Introduction
1.2.3 AP + Bridge
In AP + Bridge mode, the NWA supports both AP and bridge connection at the
same time.
In the figure below, A and B use X as an AP to access the wired network, while X
and Y communicate in bridge mode.
When the NWA is in AP + Bridge mode, security between APs (WDS) is
independent of the security between the wireless stations and the AP. If you do
not enable WDS security, traffic between APs is not encrypted. When WDS
security is enabled, both APs must use the same pre-shared key.
Unless specified, the term “security settings” refers to the traffic between the
wireless stations and the NWA.
Figure 7 AP + Bridge Application
A
1.2.4 MBSSID
A Basic Service Set (BSS) is the set of devices forming a single wireless network
(usually an access point and one or more wireless clients). The Service Set
IDentifier (SSID) is the name of a BSS. In Multiple BSS (MBSSID) mode, the NWA
28
B
X
Y
NWA-3160 Series User’s Guide
Chapter 1 Introduction
provides multiple virtual APs, each forming its own BSS and using its own
individual SSID profile.
You can configure up to sixteen SSID profiles, and have up to eight active at any
one time.
You can assign different wireless and security settings to each SSID profile. This
allows you to compartmentalize groups of users, set varying access privileges,
and prioritize network traffic to and from certain BSSs.
To the wireless clients in the network, each SSID appears to be a different access
point. As in any wireless network, clients can associate only with the SSIDs for
which they have the correct security settings.
For example, you might want to set up a wireless network in your office where
Internet telephony (VoIP) users have priority. You also want a regular wireless
network for standard users, as well as a ‘guest’ wireless network for visitors. In
the following figure, VoIP_SSID users have QoS priority, SSID03 is the wireless
network for standard users, and Guest_SSID is the wireless network for guest
users. In this example, the guest user is forbidden access to the wired Land Area
Network (LAN) behind the AP and can access only the Internet.
Figure 8 Multiple BSSs
NWA-3160 Series User’s Guide
29
Chapter 1 Introduction
1.2.5 Pre-Configured SSID Profiles
The NWA has two pre-configured SSID profiles.
• VoIP_SSID. This profile is intended for use by wireless clients requiring the
highest QoS level for VoIP telephony and other applications requiring low
latency. The QoS level of this profile is not user-configurable.
• Guest_SSID. This profile is intended for use by visitors and others who require
access to certain resources on the network (an Internet gateway or a network
printer, for example) but must not have access to the rest of the network. Layer
2 isolation is enabled (see Section on page 178), and QoS is set to NONE.
Intra-BSS traffic blocking is also enabled (see Section 8.1.2 on page 120).
These fields are all user-configurable.
1.3 CAPWAP
The NWA supports Control And Provisioning of Wireless Access Points (CAPWAP).
This is ZyXEL’s implementation of the Internet Engineering Task Force’s (IETF)
CAPWAP protocol.
ZyXEL’s CAPWAP allows a single access point to manage up to eight other access
points. The managed APs receive all their configuration information from the
controller AP. The CAPWAP dataflow is protected by Datagram Transport Layer
Security (DTLS).
The following ZyXEL AP models can be CAPWAP managed APs:
• NWA-3160
• NWA-3163
• NWA-3500
• NWA-3550
• NWA-3166
30
NWA-3160 Series User’s Guide
Loading...
+ 342 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.