NWA3550
IEEE 802.11a/b/g Outdoor WLAN Access Point
User’s Guide
Version 3.60
6/2008
Edition 2
DEFAULT LOGIN
IP Address http://192.168.1.2
Password 1234
www.zyxel.com
About This User's Guide
About This User's Guide
Intended Audience
This manual is intended for people who want to configure the ZyXEL Device using the web
configurator. You should have at least a basic knowledge of TCP/IP networking concepts and
topology.
Related Documentation
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Supporting Disk
Refer to the included CD for support documents.
• ZyXEL Web Site
Please refer to www.zyxel.com
certifications.
for additional support documentation and product
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for
improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
NWA3550 User’s Guide
3
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The NWA3550 may be referred to as the “ZyXEL Device”, the “device” or the “system”
in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key.
“Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation
panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
NWA3550 User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The ZyXEL Device icon is
not an exact representation of your device.
ZyXEL Device Computer Notebook computer
Server DSLAM Firewall
Telephone Switch Router
NWA3550 User’s Guide
5
Safety Warnings
Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• ONLY qualified service personnel should service or disassemble this device.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device.
• Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in
North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a
new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• Antenna Warning! This device meets ETSI and FCC certification requirements when
using the included antenna(s). Only use the included antenna(s).
• If you wall mount your device, make sure that no electrical lines, gas or water pipes will
be damaged.
• The PoE (Power over Ethernet) devices that supply or receive power and their connected
Ethernet cables must all be completely indoors.
• Please select an antenna that conforms with your local radio regulations. ZyXEL bears no
responsibility whatsoever for cases of illegal installation.
6
This product is recyclable. Dispose of it properly.
NWA3550 User’s Guide
Safety Warnings
NWA3550 User’s Guide
7
Safety Warnings
8
NWA3550 User’s Guide
Contents Overview
Contents Overview
Introduction ............................................................................................................................ 31
Introducing the ZyXEL Device ...................................................................................................33
Introducing the Web Configurator .............................................................................................. 43
Status Screens .......................................................................................................................... 47
Management Mode .................................................................................................................... 51
Tutorial ....................................................................................................................................... 55
The Web Configurator ...........................................................................................................83
System Screens ........................................................................................................................ 85
Wireless Configuration .............................................................................................................. 91
Wireless Security Configuration .............................................................................................. 109
MBSSID and SSID .................................................................................................................. 121
Other Wireless Configuration .................................................................................................. 129
IP Screen ................................................................................................................................. 141
Rogue AP ................................................................................................................................ 145
Remote Management Screens ................................................................................................ 151
Internal RADIUS Server .......................................................................................................... 169
Certificates ............................................................................................................................... 177
Log Screens ............................................................................................................................ 195
VLAN ....................................................................................................................................... 203
Maintenance ............................................................................................................................ 221
Troubleshooting and Specifications ..................................................................................231
Troubleshooting ....................................................................................................................... 233
Product Specifications ............................................................................................................. 237
Appendices and Index ......................................................................................................... 243
NWA3550 User’s Guide
9
Contents Overview
10
NWA3550 User’s Guide
Table of Contents
Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents.................................................................................................................... 11
List of Figures ......................................................................................................................... 19
List of Tables...........................................................................................................................27
Part I: Introduction................................................................................. 31
Chapter 1
Introducing the ZyXEL Device...............................................................................................33
1.1 Introducing the ZyXEL Device ............................................................................................ 33
1.2 Applications for the ZyXEL Device ...................................................................................... 33
1.2.1 Access Point .............................................................................................................. 34
1.2.2 Bridge / Repeater ....................................................................................................... 34
1.2.3 AP + Bridge ................................................................................................................ 35
1.2.4 MBSSID ..................................................................................................................... 36
1.2.5 Pre-Configured SSID Profiles .................................................................................... 37
1.2.6 Configuring Dual WLAN Adaptors .............................................................................. 37
1.3 CAPWAP ............................................................................................................................. 38
1.4 Ways to Manage the ZyXEL Device .................................................................................... 39
1.5 Configuring Your ZyXEL Device’s Security Features .......................................................... 39
1.5.1 Control Access to Your Device ................................................................................... 39
1.5.2 Wireless Security ....................................................................................................... 40
1.6 Maintaining Your ZyXEL Device .......................................................................................... 40
1.7 Hardware Connections ........................................................................................................ 40
Chapter 2
Introducing the Web Configurator ........................................................................................ 43
2.1 Accessing the Web Configurator ......................................................................................... 43
2.2 Resetting the ZyXEL Device ................................................................................................ 44
2.2.1 Methods of Restoring Factory-Defaults ...................................................................... 45
NWA3550 User’s Guide
11
Table of Contents
2.3 Navigating the Web Configurator ......................................................................................... 45
Chapter 3
Status Screens........................................................................................................................ 47
3.1 The Status Screen ............................................................................................................... 47
Chapter 4
Management Mode.................................................................................................................. 51
4.1 About CAPWAP ................................................................................................................... 51
4.1.1 CAPWAP Discovery and Management ...................................................................... 52
4.1.2 CAPWAP and DHCP .................................................................................................. 52
4.1.3 CAPWAP and IP Subnets .......................................................................................... 52
4.1.4 Notes on CAPWAP .................................................................................................... 53
4.2 The Management Mode Screen .......................................................................................... 53
Chapter 5
Tutorial ..................................................................................................................................... 55
5.1 How to Configure the Wireless LAN .................................................................................... 55
5.1.1 Choosing the Wireless Mode ..................................................................................... 55
5.1.1.1 Configuring Dual WLAN Adaptors .................................................................... 56
5.1.2 Wireless LAN Configuration Overview ....................................................................... 56
5.1.3 Further Reading ......................................................................................................... 58
5.2 How to Configure Multiple Wireless Networks ..................................................................... 58
5.2.1 Change the Operating Mode ...................................................................................... 59
5.2.2 Configure the VoIP Network ....................................................................................... 61
5.2.2.1 Set Up Security for the VoIP Profile .................................................................. 62
5.2.2.2 Activate the VoIP Profile ................................................................................... 64
5.2.3 Configure the Guest Network ..................................................................................... 64
5.2.3.1 Set Up Security for the Guest Profile ................................................................ 65
5.2.3.2 Set up Layer 2 Isolation .................................................................................... 66
5.2.3.3 Activate the Guest Profile ................................................................................. 67
5.2.4 Testing the Wireless Networks ................................................................................... 68
5.3 How to Set Up and Use Rogue AP Detection ..................................................................... 68
5.3.1 Set Up and Save a Friendly AP list ............................................................................ 70
5.3.2 Activate Periodic Rogue AP Detection ....................................................................... 73
5.3.3 Set Up E-mail Logs .................................................................................................... 73
5.3.4 Configure Your Other Access Points .......................................................................... 74
5.3.5 Test the Setup ............................................................................................................ 75
5.4 Using Multiple MAC Filters and L-2 Isolation Profiles .......................................................... 75
5.4.1 Scenario ..................................................................................................................... 76
5.4.2 Your Requirements ..................................................................................................... 76
5.4.3 Setup .......................................................................................................................... 76
5.4.4 Configure the SERVER_1 Network ............................................................................ 77
12
NWA3550 User’s Guide
Table of Contents
5.4.5 Configure the SERVER_2 Network ............................................................................ 79
5.4.6 Checking your Settings and Testing the Configuration .............................................. 80
5.4.6.1 Checking Settings ............................................................................................. 80
5.4.6.2 Testing the Configuration .................................................................................. 81
Part II: The Web Configurator ............................................................... 83
Chapter 6
System Screens ...................................................................................................................... 85
6.1 System Overview ................................................................................................................. 85
6.2 Configuring General Setup ..................................................................................................85
6.3 Administrator Authentication on RADIUS ............................................................................ 86
6.3.1 Configuring the Password .......................................................................................... 86
6.4 Configuring Time Setting .................................................................................................... 88
6.5 Pre-defined NTP Time Servers List ..................................................................................... 90
Chapter 7
Wireless Configuration........................................................................................................... 91
7.1 Wireless Network Overview ................................................................................................. 91
7.2 Wireless LAN Basics ........................................................................................................... 92
7.3 Quality of Service ................................................................................................................ 92
7.3.1 WMM QoS ..................................................................................................................92
7.3.1.1 WMM QoS Priorities ......................................................................................... 93
7.3.2 ATC ............................................................................................................................ 93
7.3.3 ATC+WMM ................................................................................................................. 94
7.3.3.1 ATC+WMM from LAN to WLAN ........................................................................ 94
7.3.3.2 ATC+WMM from WLAN to LAN ........................................................................ 94
7.3.4 Type Of Service (ToS) ................................................................................................ 95
7.3.4.1 DiffServ ............................................................................................................. 95
7.3.4.2 DSCP and Per-Hop Behavior ........................................................................... 95
7.3.5 ToS (Type of Service) and WMM QoS ....................................................................... 95
7.4 Spanning Tree Protocol (STP) ............................................................................................. 96
7.4.1 Rapid STP .................................................................................................................. 96
7.4.2 STP Terminology ........................................................................................................ 96
7.4.3 How STP Works ......................................................................................................... 97
7.4.4 STP Port States ..........................................................................................................97
7.5 DFS ..................................................................................................................................... 97
7.6 Wireless Screen Overview .................................................................................................. 98
7.7 Configuring Wireless Settings ............................................................................................. 98
7.7.1 Access Point Mode .................................................................................................... 98
7.7.2 Bridge/Repeater Mode ............................................................................................. 101
NWA3550 User’s Guide
13
Table of Contents
7.7.3 AP+Bridge Mode ...................................................................................................... 106
7.7.4 MBSSID Mode ......................................................................................................... 108
Chapter 8
Wireless Security Configuration ......................................................................................... 109
8.1 Wireless Security Overview ............................................................................................... 109
8.1.1 SSID ......................................................................................................................... 109
8.1.2 MAC Address Filter .................................................................................................. 109
8.1.3 User Authentication ...................................................................................................110
8.1.4 Encryption .................................................................................................................110
8.2 Security Modes ...................................................................................................................111
8.3 Configuring Security ...........................................................................................................111
8.3.1 Security: WEP ...........................................................................................................112
8.3.2 Security: 802.1x Only ................................................................................................113
8.3.3 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ..................................................114
8.3.4 Security: WPA ...........................................................................................................116
8.3.5 Security: WPA2 or WPA2-MIX ...................................................................................116
8.3.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ...................................................118
8.4 Introduction to RADIUS ......................................................................................................119
8.5 Configuring RADIUS ...........................................................................................................119
Chapter 9
MBSSID and SSID .................................................................................................................121
9.1 Wireless LAN Infrastructures ............................................................................................. 121
9.1.1 MBSSID ...................................................................................................................121
9.1.2 Notes on Multiple BSS ............................................................................................. 121
9.1.3 Multiple BSS Example .............................................................................................. 121
9.1.4 Multiple BSS with VLAN Example ............................................................................ 121
9.1.5 Configuring Multiple BSSs ....................................................................................... 122
9.2 SSID .................................................................................................................................. 125
9.2.1 The SSID Screen ..................................................................................................... 125
9.2.2 Configuring SSID ..................................................................................................... 127
Chapter 10
Other Wireless Configuration..............................................................................................129
10.1 Layer-2 Isolation Introduction .......................................................................................... 129
10.2 The Layer-2 Isolation Screen .......................................................................................... 130
10.3 Configuring Layer-2 Isolation ........................................................................................... 131
10.3.1 Layer-2 Isolation Examples .................................................................................... 133
10.3.1.1 Layer-2 Isolation Example 1 ......................................................................... 133
10.3.1.2 Layer-2 Isolation Example 2 ......................................................................... 134
10.4 The MAC Filter Screen .................................................................................................... 134
10.4.1 Configuring MAC Filtering ...................................................................................... 135
14
NWA3550 User’s Guide
Table of Contents
10.5 Configuring Roaming .......................................................................................................137
10.5.1 Requirements for Roaming .................................................................................... 138
Chapter 11
IP Screen................................................................................................................................ 141
11.1 Factory Ethernet Defaults ................................................................................................ 141
11.2 TCP/IP Parameters .......................................................................................................... 141
11.2.1 WAN IP Address Assignment ................................................................................. 141
11.3 Configuring IP Settings .................................................................................................... 142
Chapter 12
Rogue AP...............................................................................................................................145
12.1 Rogue AP Introduction .................................................................................................... 145
12.2 Rogue AP Examples ....................................................................................................... 145
12.2.1 “Honeypot” Attack .................................................................................................. 146
12.3 Configuring Rogue AP Detection ..................................................................................... 147
12.3.1 Rogue AP: Configuration ....................................................................................... 147
12.3.2 Rogue AP: Friendly AP .......................................................................................... 148
12.3.3 Rogue AP List ........................................................................................................ 149
Chapter 13
Remote Management Screens............................................................................................. 151
13.1 Remote Management Overview ...................................................................................... 151
13.1.1 Remote Management Limitations .......................................................................... 151
13.1.2 System Timeout .................................................................................................... 152
13.2 SSH ............................................................................................................................... 152
13.3 How SSH Works .............................................................................................................. 152
13.4 SSH Implementation on the ZyXEL Device ..................................................................... 153
13.4.1 Requirements for Using SSH ................................................................................. 153
13.5 Configuring Telnet ............................................................................................................ 153
13.6 Configuring FTP .............................................................................................................. 155
13.7 WWW (HTTP and HTTPS) ............................................................................................. 156
13.8 Configuring WWW ...........................................................................................................157
13.9 HTTPS Example .............................................................................................................. 158
13.9.1 Internet Explorer Warning Messages ..................................................................... 158
13.9.2 Netscape Navigator Warning Messages ................................................................ 159
13.9.3 Avoiding the Browser Warning Messages .............................................................. 159
13.9.4 Login Screen .......................................................................................................... 160
13.10 SNMP ............................................................................................................................ 162
13.10.1 Supported MIBs ................................................................................................... 164
13.10.2 SNMP Traps ......................................................................................................... 164
13.11 SNMP Trap Interface Index ........................................................................................... 165
13.11.1 SNMP v3 and Security ......................................................................................... 165
NWA3550 User’s Guide
15
Table of Contents
13.11.2 Configuring SNMP ................................................................................................ 165
13.11.2.1 The SNMPv3 User Profile Screen .............................................................. 167
Chapter 14
Internal RADIUS Server........................................................................................................169
14.1 Internal RADIUS Overview .............................................................................................. 169
14.2 Internal RADIUS Server Setting ...................................................................................... 169
14.3 Trusted AP Overview .......................................................................................................171
14.4 Configuring Trusted AP ................................................................................................... 172
14.5 Configuring Trusted Users ............................................................................................... 174
Chapter 15
Certificates ............................................................................................................................177
15.1 Certificates Overview ....................................................................................................... 177
15.1.1 Advantages of Certificates ..................................................................................... 178
15.2 Self-signed Certificates .................................................................................................... 178
15.3 Verifying a Certificate ....................................................................................................... 178
15.3.1 Checking the Fingerprint of a Certificate on Your Computer .................................. 178
15.4 Configuration Summary ................................................................................................... 179
15.5 My Certificates ................................................................................................................. 179
15.6 Certificate File Formats .................................................................................................... 181
15.7 Importing a Certificate ..................................................................................................... 182
15.8 Creating a Certificate ....................................................................................................... 183
15.9 My Certificate Details ....................................................................................................... 185
15.10 Trusted CAs ................................................................................................................... 188
15.11 Importing a Trusted CA’s Certificate .............................................................................. 189
15.12 Trusted CA Certificate Details ....................................................................................... 190
Chapter 16
Log Screens ..........................................................................................................................195
16.1 Configuring View Log ....................................................................................................... 195
16.2 Configuring Log Settings ................................................................................................. 196
16.3 Example Log Messages .................................................................................................. 198
16.4 Log Commands ............................................................................................................... 200
16.4.1 Configuring What You Want the ZyXEL Device to Log .......................................... 200
16.4.2 Displaying Logs ...................................................................................................... 200
16.5 Log Command Example .................................................................................................. 201
Chapter 17
VLAN ...................................................................................................................................... 203
17.1 VLAN ............................................................................................................................... 203
17.1.1 Management VLAN ID ........................................................................................... 203
17.1.2 VLAN Tagging ........................................................................................................ 203
16
NWA3550 User’s Guide
Table of Contents
17.2 Configuring VLAN ............................................................................................................ 204
17.2.1 Wireless VLAN ....................................................................................................... 204
17.2.2 RADIUS VLAN ....................................................................................................... 206
17.2.3 Configuring Management VLAN Example ............................................................. 207
17.2.4 Configuring Microsoft’s IAS Server Example ......................................................... 210
17.2.4.1 Configuring VLAN Groups ............................................................................ 210
17.2.4.2 Configuring Remote Access Policies .............................................................211
17.2.5 Second Rx VLAN ID Example ................................................................................ 218
17.2.5.1 Second Rx VLAN Setup Example ................................................................ 218
Chapter 18
Maintenance .......................................................................................................................... 221
18.1 Maintenance Overview .................................................................................................... 221
18.2 System Status Screen ..................................................................................................... 221
18.2.1 System Statistics .................................................................................................... 222
18.3 Association List ................................................................................................................ 223
18.4 Channel Usage ................................................................................................................ 224
18.5 F/W Upload Screen .........................................................................................................225
18.6 Configuration Screen ....................................................................................................... 227
18.6.1 Backup Configuration ............................................................................................. 228
18.6.2 Restore Configuration ........................................................................................... 228
18.6.3 Back to Factory Defaults ........................................................................................ 230
18.7 Restart Screen ................................................................................................................. 230
Part III: Troubleshooting and Specifications ..................................... 231
Chapter 19
Troubleshooting.................................................................................................................... 233
19.1 Power and Hardware Connections .................................................................................. 233
19.2 ZyXEL Device Access and Login .................................................................................... 233
19.3 Internet Access ................................................................................................................ 235
19.4 Wireless Router/AP Troubleshooting ............................................................................... 236
Chapter 20
Product Specifications.........................................................................................................237
Part IV: Appendices and Index ........................................................... 243
Appendix A Setting Up Your Computer’s IP Address...........................................................245
Appendix B Wireless LANs ..................................................................................................269
NWA3550 User’s Guide
17
Table of Contents
Appendix C Pop-up Windows, JavaScripts and Java Permissions ...................................... 283
Appendix D Importing Certificates ........................................................................................ 289
Appendix E IP Addresses and Subnetting ...........................................................................313
Appendix F Text File Based Auto Configuration ...................................................................321
Appendix G Legal Information ..............................................................................................329
Appendix H Customer Support............................................................................................. 333
Index....................................................................................................................................... 339
18
NWA3550 User’s Guide
List of Figures
List of Figures
Figure 1 Access Point Application .......................................................................................................... 34
Figure 2 Bridge Application .................................................................................................................... 35
Figure 3 Repeater Application ................................................................................................................ 35
Figure 4 AP+Bridge Application ............................................................................................................. 36
Figure 5 Multiple BSSs ........................................................................................................................... 37
Figure 6 Dual WLAN Adaptors Example ................................................................................................ 38
Figure 7 CAPWAP Network Example ..................................................................................................... 39
Figure 8 Change Password Screen ........................................................................................................ 44
Figure 9 Replace Certificate Screen ....................................................................................................... 44
Figure 10 The Status Screen of the Web Configurator ........................................................................... 45
Figure 11 The Status Screen .................................................................................................................. 47
Figure 12 CAPWAP Network Example ................................................................................................... 51
Figure 13 CAPWAP and DHCP Option 43 ............................................................................................. 53
Figure 14 The Management Mode Screen ............................................................................................. 53
Figure 15 Configuring Wireless LAN ...................................................................................................... 57
Figure 16 Tutorial: Example MBSSID Setup .......................................................................................... 59
Figure 17 Tutorial: Wireless LAN: Before ............................................................................................... 60
Figure 18 Tutorial: Wireless LAN: Change Mode ................................................................................... 60
Figure 19 Tutorial: WIRELESS > SSID .................................................................................................. 61
Figure 20 Tutorial: VoIP SSID Profile Edit .............................................................................................. 62
Figure 21 Tutorial: VoIP Security ............................................................................................................ 63
Figure 22 Tutorial: VoIP Security Profile Edit .......................................................................................... 63
Figure 23 Tutorial: VoIP Security: Updated ............................................................................................ 64
Figure 24 Tutorial: Activate VoIP Profile ................................................................................................. 64
Figure 25 Tutorial: Guest Edit ................................................................................................................. 65
Figure 26 Tutorial: Guest Security Profile Edit ........................................................................................ 65
Figure 27 Tutorial: Guest Security: Updated .......................................................................................... 66
Figure 28 Tutorial: Layer 2 Isolation ....................................................................................................... 66
Figure 29 Tutorial: Layer 2 Isolation Profile ............................................................................................ 67
Figure 30 Tutorial: Activate Guest Profile ............................................................................................... 68
Figure 31 Tutorial: Wireless Network Example ....................................................................................... 69
Figure 32 Tutorial: Friendly AP (Before Data Entry) ............................................................................... 70
Figure 33 Tutorial: Friendly AP (After Data Entry) ................................................................................. 71
Figure 34 Tutorial: Configuration ............................................................................................................ 72
Figure 35 Tutorial: Warning .................................................................................................................... 72
Figure 36 Tutorial: Save Friendly AP list ................................................................................................ 72
Figure 37 Tutorial: Periodic Rogue AP Detection .................................................................................. 73
Figure 38 Tutorial: Log Settings .............................................................................................................. 74
NWA3550 User’s Guide
19
List of Figures
Figure 39 Tutorial: Example Network ..................................................................................................... 76
Figure 40 Tutorial: SSID Profile .............................................................................................................. 78
Figure 41 Tutorial: SSID Edit .................................................................................................................. 78
Figure 42 Tutorial: Layer-2 Isolation Edit ................................................................................................ 79
Figure 43 Tutorial: MAC Filter Edit (SERVER_1) ................................................................................... 79
Figure 44 Tutorial: SSID Profiles Activated ............................................................................................ 81
Figure 45 Tutorial: SSID Tab Correct Settings ........................................................................................ 81
Figure 46 System > General .................................................................................................................. 85
Figure 47 SYSTEM > Password. ............................................................................................................ 87
Figure 48 SYSTEM > Time Setting ........................................................................................................ 88
Figure 49 Example of a Wireless Network ............................................................................................. 91
Figure 50 DiffServ: Differentiated Service Field ...................................................................................... 95
Figure 51 Wireless: Access Point ........................................................................................................... 99
Figure 52 Bridging Example ................................................................................................................. 102
Figure 53 Bridge Loop: Two Bridges Connected to Hub ...................................................................... 102
Figure 54 Bridge Loop: Bridge Connected to Wired LAN ..................................................................... 103
Figure 55 Wireless: Bridge/Repeater ................................................................................................... 104
Figure 56 Wireless: AP+Bridge ............................................................................................................ 107
Figure 57 Wireless > Security ................................................................................................................112
Figure 58 WIRELESS > Security: WEP .................................................................................................113
Figure 59 Security: 802.1x Only ...........................................................................................................114
Figure 60 Security: 802.1x Static 64-bit, 802.1x Static 128-bit .............................................................115
Figure 61 Security: WPA ......................................................................................................................116
Figure 62 Security:WPA2 or WPA2-MIX ................................................................................................117
Figure 63 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................118
Figure 64 RADIUS .................................................................................................................................119
Figure 65 Multiple BSS with VLAN Example ........................................................................................ 122
Figure 66 Wireless: Multiple BSS ......................................................................................................... 123
Figure 67 SSID ..................................................................................................................................... 126
Figure 68 Configuring SSID .................................................................................................................. 127
Figure 69 Layer-2 Isolation Application ................................................................................................ 130
Figure 70 WIRELESS > Layer 2 Isolation ............................................................................................ 131
Figure 71 WIRELESS > Layer-2 Isolation Configuration Screen ......................................................... 132
Figure 72 Layer-2 Isolation Example Configuration ............................................................................. 133
Figure 73 Layer-2 Isolation Example 1 ................................................................................................. 133
Figure 74 Layer-2 Isolation Example 2 ................................................................................................. 134
Figure 75 WIRELESS > MAC Filter ...................................................................................................... 135
Figure 76 MAC Address Filter .............................................................................................................. 136
Figure 77 Roaming Example ................................................................................................................ 138
Figure 78 Roaming ............................................................................................................................... 139
Figure 79 IP Setup ................................................................................................................................ 142
Figure 80 Rogue AP: Example ............................................................................................................ 146
Figure 81 “Honeypot” Attack ................................................................................................................. 147
20
NWA3550 User’s Guide
List of Figures
Figure 82 ROGUE AP > Configuration ................................................................................................. 148
Figure 83 ROGUE AP > Friendly AP .................................................................................................... 149
Figure 84 ROGUE AP > Rogue AP ...................................................................................................... 150
Figure 85 How SSH Works ................................................................................................................... 152
Figure 86 Remote Management: Telnet ............................................................................................... 154
Figure 87 Remote Management: FTP .................................................................................................. 155
Figure 88 HTTPS Implementation ........................................................................................................ 156
Figure 89 Remote Management: WWW ...............................................................................................157
Figure 90 Security Alert Dialog Box (Internet Explorer) ........................................................................158
Figure 91 Security Certificate 1 (Netscape) .......................................................................................... 159
Figure 92 Security Certificate 2 (Netscape) .......................................................................................... 159
Figure 93 Example: Lock Denoting a Secure Connection .................................................................... 161
Figure 94 Replace Certificate ............................................................................................................... 161
Figure 95 Device-specific Certificate .................................................................................................... 162
Figure 96 Common ZyXEL Device Certificate ......................................................................................162
Figure 97 SNMP Management Model .................................................................................................. 163
Figure 98 Remote Management: SNMP ..............................................................................................166
Figure 99 Remote Management: SNMPv3 User Profile ....................................................................... 167
Figure 100 Internal RADIUS Server Setting Screen ............................................................................. 170
Figure 101 Trusted AP Overview .......................................................................................................... 172
Figure 102 Trusted AP Screen ............................................................................................................. 173
Figure 103 Trusted Users Screen ......................................................................................................... 174
Figure 104 Certificates on Your Computer ........................................................................................... 178
Figure 105 Certificate Details .............................................................................................................. 179
Figure 106 My Certificates .................................................................................................................... 180
Figure 107 My Certificate Import .......................................................................................................... 182
Figure 108 My Certificate Create .......................................................................................................... 183
Figure 109 My Certificate Details ......................................................................................................... 186
Figure 110 Trusted CAs ........................................................................................................................ 188
Figure 111 Trusted CA Import ............................................................................................................... 190
Figure 112 Trusted CA Details .............................................................................................................. 191
Figure 113 View Log ............................................................................................................................. 195
Figure 114 Log Settings ........................................................................................................................ 197
Figure 115 Wireless VLAN ................................................................................................................... 205
Figure 116 RADIUS VLAN .................................................................................................................... 206
Figure 117 Management VLAN Configuration Example ....................................................................... 208
Figure 118 VLAN-Aware Switch - Static VLAN .....................................................................................208
Figure 119 VLAN-Aware Switch ........................................................................................................... 208
Figure 120 VLAN-Aware Switch - VLAN Status .................................................................................... 209
Figure 121 VLAN Setup ........................................................................................................................ 209
Figure 122 New Global Security Group ................................................................................................211
Figure 123 Add Group Members ..........................................................................................................211
Figure 124 New Remote Access Policy for VLAN Group .................................................................... 212
NWA3550 User’s Guide
21
List of Figures
Figure 125 Specifying Windows-Group Condition ................................................................................ 212
Figure 126 Adding VLAN Group .......................................................................................................... 213
Figure 127 Granting Permissions and User Profile Screens ............................................................... 213
Figure 128 Authentication Tab Settings ................................................................................................ 214
Figure 129 Encryption Tab Settings ..................................................................................................... 214
Figure 130 Connection Attributes Screen ............................................................................................ 215
Figure 131 RADIUS Attribute Screen .................................................................................................. 215
Figure 132 802 Attribute Setting for Tunnel-Medium-Type .................................................................. 216
Figure 133 VLAN ID Attribute Setting for Tunnel-Pvt-Group-ID .......................................................... 216
Figure 134 VLAN Attribute Setting for Tunnel-Type ............................................................................ 217
Figure 135 Completed Advanced Tab .................................................................................................. 217
Figure 136 Second Rx VLAN ID Example ............................................................................................ 218
Figure 137 Configuring SSID: Second Rx VLAN ID Example .............................................................. 219
Figure 138 System Status .................................................................................................................... 221
Figure 139 System Status: Show Statistics .......................................................................................... 222
Figure 140 Association List .................................................................................................................. 224
Figure 141 Channel Usage ................................................................................................................... 225
Figure 142 Firmware Upload ................................................................................................................ 226
Figure 143 Firmware Upload In Process .............................................................................................. 226
Figure 144 Network Temporarily Disconnected ....................................................................................227
Figure 145 Firmware Upload Error ....................................................................................................... 227
Figure 146 Configuration ...................................................................................................................... 228
Figure 147 Configuration Upload Successful ....................................................................................... 229
Figure 148 Network Temporarily Disconnected ....................................................................................229
Figure 149 Configuration Upload Error ................................................................................................. 229
Figure 150 Reset Warning Message .................................................................................................... 230
Figure 151 Restart Screen ................................................................................................................... 230
Figure 152 Windows XP: Start Menu .................................................................................................... 246
Figure 153 Windows XP: Control Panel ............................................................................................... 246
Figure 154 Windows XP: Control Panel > Network Connections > Properties .................................... 246
Figure 155 Windows XP: Local Area Connection Properties ............................................................... 247
Figure 156 Windows XP: Internet Protocol (TCP/IP) Properties .......................................................... 248
Figure 157 Windows Vista: Start Menu ................................................................................................. 249
Figure 158 Windows Vista: Control Panel ............................................................................................ 249
Figure 159 Windows Vista: Network And Internet ................................................................................ 249
Figure 160 Windows Vista: Network and Sharing Center ..................................................................... 250
Figure 161 Windows Vista: Network and Sharing Center ..................................................................... 250
Figure 162 Windows Vista: Local Area Connection Properties ............................................................ 251
Figure 163 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties ................................... 252
Figure 164 Mac OS X 10.4: Apple Menu .............................................................................................. 253
Figure 165 Mac OS X 10.4: System Preferences ................................................................................. 253
Figure 166 Mac OS X 10.4: Network Preferences ............................................................................... 254
Figure 167 Mac OS X 10.4: Network Preferences > TCP/IP Tab. ........................................................ 254
22
NWA3550 User’s Guide
List of Figures
Figure 168 Mac OS X 10.4: Network Preferences > Ethernet .............................................................. 255
Figure 169 Mac OS X 10.4: Network Utility .......................................................................................... 255
Figure 170 Mac OS X 10.5: Apple Menu .............................................................................................. 256
Figure 171 Mac OS X 10.5: Systems Preferences ............................................................................... 256
Figure 172 Mac OS X 10.5: Network Preferences > Ethernet .............................................................. 257
Figure 173 Mac OS X 10.5: Network Preferences > Ethernet .............................................................. 258
Figure 174 Mac OS X 10.5: Network Utility .......................................................................................... 258
Figure 175 Ubuntu 8: System > Administration Menu .......................................................................... 259
Figure 176 Ubuntu 8: Network Settings > Connections ........................................................................ 259
Figure 177 Ubuntu 8: Administrator Account Authentication ................................................................ 260
Figure 178 Ubuntu 8: Network Settings > Connections ........................................................................ 260
Figure 179 Ubuntu 8: Network Settings > Properties ........................................................................... 261
Figure 180 Ubuntu 8: Network Settings > DNS ...................................................................................261
Figure 181 Ubuntu 8: Network Tools .................................................................................................... 262
Figure 182 openSUSE 10.3: K Menu > Computer Menu ..................................................................... 263
Figure 183 openSUSE 10.3: K Menu > Computer Menu ..................................................................... 263
Figure 184 openSUSE 10.3: YaST Control Center .............................................................................. 264
Figure 185 openSUSE 10.3: Network Settings .................................................................................... 264
Figure 186 openSUSE 10.3: Network Card Setup ............................................................................... 265
Figure 187 openSUSE 10.3: Network Settings .................................................................................... 266
Figure 188 openSUSE 10.3: KNetwork Manager ................................................................................. 266
Figure 189 openSUSE: Connection Status - KNetwork Manager ........................................................ 267
Figure 190 Peer-to-Peer Communication in an Ad-hoc Network ......................................................... 269
Figure 191 Basic Service Set ............................................................................................................... 270
Figure 192 Infrastructure WLAN ........................................................................................................... 271
Figure 193 RTS/CTS ............................................................................................................................ 272
Figure 194 WPA(2) with RADIUS Application Example ....................................................................... 279
Figure 195 WPA(2)-PSK Authentication ............................................................................................... 280
Figure 196 Pop-up Blocker ................................................................................................................... 283
Figure 197 Internet Options: Privacy .................................................................................................... 284
Figure 198 Internet Options: Privacy .................................................................................................... 285
Figure 199 Pop-up Blocker Settings ..................................................................................................... 285
Figure 200 Internet Options: Security ................................................................................................... 286
Figure 201 Security Settings - Java Scripting ....................................................................................... 287
Figure 202 Security Settings - Java ...................................................................................................... 287
Figure 203 Java (Sun) .......................................................................................................................... 288
Figure 204 Internet Explorer 7: Certification Error ................................................................................ 290
Figure 205 Internet Explorer 7: Certification Error ................................................................................ 290
Figure 206 Internet Explorer 7: Certificate Error ................................................................................... 290
Figure 207 Internet Explorer 7: Certificate ............................................................................................ 291
Figure 208 Internet Explorer 7: Certificate Import Wizard .................................................................... 291
Figure 209 Internet Explorer 7: Certificate Import Wizard .................................................................... 292
Figure 210 Internet Explorer 7: Certificate Import Wizard .................................................................... 292
NWA3550 User’s Guide
23
List of Figures
Figure 211 Internet Explorer 7: Select Certificate Store .......................................................................292
Figure 212 Internet Explorer 7: Certificate Import Wizard .................................................................... 293
Figure 213 Internet Explorer 7: Security Warning ................................................................................. 293
Figure 214 Internet Explorer 7: Certificate Import Wizard .................................................................... 293
Figure 215 Internet Explorer 7: Website Identification .......................................................................... 294
Figure 216 Internet Explorer 7: Public Key Certificate File ................................................................... 294
Figure 217 Internet Explorer 7: Open File - Security Warning .............................................................. 295
Figure 218 Internet Explorer 7: Tools Menu ......................................................................................... 295
Figure 219 Internet Explorer 7: Internet Options .................................................................................. 296
Figure 220 Internet Explorer 7: Certificates .......................................................................................... 296
Figure 221 Internet Explorer 7: Certificates .......................................................................................... 297
Figure 222 Internet Explorer 7: Root Certificate Store .......................................................................... 297
Figure 223 Firefox 2: Website Certified by an Unknown Authority ....................................................... 297
Figure 224 Firefox 2: Page Info ............................................................................................................ 298
Figure 225 Firefox 2: Tools Menu ......................................................................................................... 298
Figure 226 Firefox 2: Options ............................................................................................................... 299
Figure 227 Firefox 2: Certificate Manager ........................................................................................... 299
Figure 228 Firefox 2: Select File .......................................................................................................... 300
Figure 229 Firefox 2: Tools Menu ......................................................................................................... 300
Figure 230 Firefox 2: Options ............................................................................................................... 301
Figure 231 Firefox 2: Certificate Manager ........................................................................................... 301
Figure 232 Firefox 2: Delete Web Site Certificates .............................................................................. 302
Figure 233 Opera 9: Certificate signer not found ................................................................................. 302
Figure 234 Opera 9: Security information ............................................................................................. 303
Figure 235 Opera 9: Tools Menu .......................................................................................................... 303
Figure 236 Opera 9: Preferences ......................................................................................................... 304
Figure 237 Opera 9: Certificate manager ............................................................................................ 304
Figure 238 Opera 9: Import certificate ................................................................................................. 305
Figure 239 Opera 9: Install authority certificate ................................................................................... 305
Figure 240 Opera 9: Install authority certificate ................................................................................... 306
Figure 241 Opera 9: Tools Menu .......................................................................................................... 306
Figure 242 Opera 9: Preferences ......................................................................................................... 307
Figure 243 Opera 9: Certificate manager ............................................................................................ 308
Figure 244 Konqueror 3.5: Server Authentication ................................................................................309
Figure 245 Konqueror 3.5: Server Authentication ................................................................................309
Figure 246 Konqueror 3.5: KDE SSL Information ................................................................................ 309
Figure 247 Konqueror 3.5: Public Key Certificate File ..........................................................................310
Figure 248 Konqueror 3.5: Certificate Import Result ............................................................................310
Figure 249 Konqueror 3.5: Kleopatra ................................................................................................... 310
Figure 250 Konqueror 3.5: Settings Menu .............................................................................................311
Figure 251 Konqueror 3.5: Configure ....................................................................................................311
Figure 252 Network Number and Host ID ............................................................................................ 314
Figure 253 Subnetting Example: Before Subnetting ............................................................................ 316
24
NWA3550 User’s Guide
List of Figures
Figure 254 Subnetting Example: After Subnetting ............................................................................... 317
Figure 255 Text File Based Auto Configuration .................................................................................... 321
Figure 256 Configuration File Format ................................................................................................... 323
Figure 257 WEP Configuration File Example ....................................................................................... 324
Figure 258 802.1X Configuration File Example .................................................................................... 325
Figure 259 WPA-PSK Configuration File Example ............................................................................... 325
Figure 260 WPA Configuration File Example ....................................................................................... 326
Figure 261 Wlan Configuration File Example ....................................................................................... 327
NWA3550 User’s Guide
25
List of Figures
26
NWA3550 User’s Guide
List of Tables
List of Tables
Table 1 The Status Screen .................................................................................................................... 47
Table 2 The Management Mode Screen ............................................................................................... 54
Table 3 Tutorial: Example Information ................................................................................................... 59
Table 4 Tutorial: Rogue AP Example Information .................................................................................. 69
Table 5 Tutorial: Friendly AP Information ............................................................................................... 71
Table 6 Tutorial: SSID Profile Security Settings ..................................................................................... 76
Table 7 Tutorial: Example Network MAC Addresses ............................................................................. 77
Table 8 Tutorial: Example User MAC Addresses ................................................................................... 77
Table 9 Tutorial: SERVER_2 Network Information ................................................................................80
Table 10 System > General ................................................................................................................... 85
Table 11 Password ................................................................................................................................ 87
Table 12 SYSTEM > Time Setting ......................................................................................................... 89
Table 13 Default Time Servers .............................................................................................................. 90
Table 14 WMM QoS Priorities ............................................................................................................... 93
Table 15 Typical Packet Sizes ............................................................................................................... 93
Table 16 Automatic Traffic Classifier Priorities ...................................................................................... 93
Table 17 ATC + WMM Priority Assignment (LAN to WLAN) .................................................................. 94
Table 18 ATC + WMM Priority Assignment (WLAN to LAN) .................................................................. 94
Table 19 ToS and IEEE 802.1d to WMM QoS Priority Level Mapping .................................................. 96
Table 20 STP Path Costs ...................................................................................................................... 96
Table 21 STP Port States ...................................................................................................................... 97
Table 22 Wireless: Access Point ........................................................................................................... 99
Table 23 Wireless: Bridge/Repeater .................................................................................................... 104
Table 24 Types of Encryption for Each Type of Authentication ............................................................110
Table 25 Security Modes ......................................................................................................................111
Table 26 WIRELESS > Security ...........................................................................................................112
Table 27 Security: WEP ........................................................................................................................113
Table 28 Security: 802.1x Only .............................................................................................................114
Table 29 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ...............................................................11 5
Table 30 Security: WPA ........................................................................................................................116
Table 31 Security: WPA2 or WPA2-MIX ...............................................................................................117
Table 32 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................118
Table 33 RADIUS ................................................................................................................................ 120
Table 34 Wireless: Multiple BSS .......................................................................................................... 123
Table 35 SSID ...................................................................................................................................... 126
Table 36 Configuring SSID .................................................................................................................. 127
Table 37 WIRELESS > Layer-2 Isolation ............................................................................................. 131
Table 38 WIRELESS > Layer-2 Isolation Configuration ...................................................................... 132
NWA3550 User’s Guide
27
List of Tables
Table 39 WIRELESS > MAC Filter ...................................................................................................... 135
Table 40 MAC Address Filter ............................................................................................................... 136
Table 41 Private IP Address Ranges ................................................................................................... 141
Table 42 IP Setup ................................................................................................................................ 142
Table 43 ROGUE AP > Configuration .................................................................................................. 148
Table 44 ROGUE AP > Friendly AP .................................................................................................... 149
Table 45 ROGUE AP > Rogue AP ....................................................................................................... 150
Table 46 Remote Management Overview ...........................................................................................151
Table 47 Remote Management: Telnet ................................................................................................ 154
Table 48 Remote Management: FTP ................................................................................................... 155
Table 49 Remote Management: WWW ...............................................................................................157
Table 50 SNMP Traps .......................................................................................................................... 164
Table 51 SNMP Interface Index to Physical and Virtual Port Mapping ................................................ 165
Table 52 Remote Management: SNMP ............................................................................................... 166
Table 53 Remote Management: SNMP User Profile ........................................................................... 167
Table 54 Internal RADIUS Server Setting Screen Setting ................................................................... 170
Table 55 Trusted AP ............................................................................................................................ 173
Table 56 Trusted Users ........................................................................................................................ 174
Table 57 My Certificates ...................................................................................................................... 180
Table 58 My Certificate Import ............................................................................................................. 183
Table 59 My Certificate Create ............................................................................................................ 184
Table 60 My Certificate Details ............................................................................................................ 186
Table 61 Trusted CAs .......................................................................................................................... 189
Table 62 Trusted CA Import ................................................................................................................. 190
Table 63 Trusted CA Details ................................................................................................................ 191
Table 64 View Log ............................................................................................................................... 195
Table 65 Log Settings .......................................................................................................................... 197
Table 66 System Maintenance Logs .................................................................................................... 198
Table 67 ICMP Notes ........................................................................................................................... 199
Table 68 Sys log .................................................................................................................................. 200
Table 69 Log Categories and Available Settings Example .................................................................. 200
Table 70 Wireless VLAN ...................................................................................................................... 205
Table 71 RADIUS VLAN ...................................................................................................................... 207
Table 72 Standard RADIUS Attributes ................................................................................................. 210
Table 73 System Status ....................................................................................................................... 221
Table 74 System Status: Show Statistics ............................................................................................. 223
Table 75 Association List ..................................................................................................................... 224
Table 76 Channel Usage ..................................................................................................................... 225
Table 77 Firmware Upload ................................................................................................................... 226
Table 78 Restore Configuration ........................................................................................................... 228
Table 79 Hardware Specifications ....................................................................................................... 237
Table 80 Firmware Specifications ........................................................................................................ 238
Table 81 ZyXEL Device Compatible Antennas .................................................................................... 240
28
NWA3550 User’s Guide
List of Tables
Table 82 ZyXEL Device Compatible Antenna Cables ......................................................................... 240
Table 83 Power over Ethernet Injector Specifications ........................................................................ 241
Table 84 Power over Ethernet Injector RJ-45 Port Pin Assignments .................................................. 241
Table 85 IEEE 802.11g ........................................................................................................................ 273
Table 86 Wireless Security Levels ....................................................................................................... 274
Table 87 Comparison of EAP Authentication Types ............................................................................ 277
Table 88 Wireless Security Relational Matrix ...................................................................................... 280
Table 89 Subnet Masks ....................................................................................................................... 314
Table 90 Subnet Masks ....................................................................................................................... 315
Table 91 Maximum Host Numbers ...................................................................................................... 315
Table 92 Alternative Subnet Mask Notation ......................................................................................... 315
Table 93 Subnet 1 ................................................................................................................................ 317
Table 94 Subnet 2 ................................................................................................................................ 318
Table 95 Subnet 3 ................................................................................................................................ 318
Table 96 Subnet 4 ................................................................................................................................ 318
Table 97 Eight Subnets ........................................................................................................................ 318
Table 98 24-bit Network Number Subnet Planning .............................................................................. 319
Table 99 16-bit Network Number Subnet Planning .............................................................................. 319
Table 100 Auto Configuration by DHCP .............................................................................................. 322
Table 101 Manual Configuration .......................................................................................................... 322
Table 102 Configuration via SNMP ...................................................................................................... 323
Table 103 Displaying the File Version .................................................................................................. 323
Table 104 Displaying the File Version .................................................................................................. 323
Table 105 Displaying the Auto Configuration Status ............................................................................324
NWA3550 User’s Guide
29
List of Tables
30
NWA3550 User’s Guide