Nwa1121-Ni 1.0
Nwa1121-Ni 1.0
Nwa1121-Ni 1.0
www.zyxel.com
Copyright © 2012
ZyXEL Communications Corporation
IMPORTANT!
Graphics in this book may differ slightly from the product due to differences in operating systems,
operating system versions, or if you installed updated firmware/software for your device. Every
effort has been made to ensure that the information in this manual is accurate.
Related Documentation
• Quick Start Guide
The Quick Start Guid is designed to help you get up and running right away.
Contents Overview
Monitor ....................................................................................................................................................49
Wireless LAN ..........................................................................................................................................55
LAN .........................................................................................................................................................94
VLAN .......................................................................................................................................................98
System ..................................................................................................................................................101
Log Settings .......................................................................................................................................... 115
Maintenance .......................................................................................................................................... 119
Troubleshooting ....................................................................................................................................127
Table of Contents
Chapter 1
Introducing the NWA1121-NI.............................................................................................................. 11
Chapter 2
Introducing the Web Configurator ....................................................................................................19
Chapter 3
Dashboard ...........................................................................................................................................25
Chapter 4
Tutorial .................................................................................................................................................29
Chapter 5
Monitor.................................................................................................................................................49
Chapter 6
Wireless LAN.......................................................................................................................................55
Chapter 7
LAN ......................................................................................................................................................94
Chapter 8
VLAN ....................................................................................................................................................98
Chapter 9
System ...............................................................................................................................................101
Chapter 10
Log Settings ...................................................................................................................................... 115
Chapter 11
Maintenance ...................................................................................................................................... 119
Chapter 12
Troubleshooting................................................................................................................................127
Index ..................................................................................................................................................201
9
10
C HAPT ER 1
Introducing the NWA1121-NI
This chapter introduces the main applications and features of the NWA1121-NI. It also discusses
the ways you can manage your NWA1121-NI.
The NWA1121-NI controls network access with MAC address filtering and RADIUS server
authentication. It also provides a high level of network traffic security, supporting IEEE 802.1x, Wi-
Fi Protected Access (WPA), WPA2 and WEP data encryption. Its Quality of Service (QoS) features
allow you to prioritize time-sensitive or highly important applications such as VoIP.
Your NWA1121-NI is easy to install, configure and use. The embedded Web-based configurator
enables simple, straightforward management and maintenance.
See the Quick Start Guide for instructions on how to make hardware connections.
NUMBER OF UNIVERSAL
OPERATING MODE AP FUNCTION
SUPPORTED SSID REPEATER FUNCTION
MBSSID 8 No Yes
Client 1 No No
Root AP 5 Yes Yes
Repeater 1 Yes Yes
1.2.1 MBSSID
A Basic Service Set (BSS) is the set of devices forming a single wireless network (usually an access
point and one or more wireless clients). The Service Set IDentifier (SSID) is the name of a BSS. In
Multiple BSS (MBSSID) mode, the NWA1121-NI provides multiple virtual APs, each forming its own
BSS and using its own individual SSID profile.
You can configure multiple SSID profiles, and have all of them active at any one time.
You can assign different wireless and security settings to each SSID profile. This allows you to
compartmentalize groups of users, set varying access privileges, and prioritize network traffic to
and from certain BSSs.
To the wireless clients in the network, each SSID appears to be a different access point. As in any
wireless network, clients can associate only with the SSIDs for which they have the correct security
settings.
For example, you might want to set up a wireless network in your office where Internet telephony
(VoIP) users have priority. You also want a regular wireless network for standard users, as well as a
‘guest’ wireless network for visitors. In the following figure, VoIP_SSID users have QoS priority,
SSID01 is the wireless network for standard users, and Guest_SSID is the wireless network for
guest users. In this example, the guest user is forbidden access to the wired Land Area Network
(LAN) behind the AP and can access only the Internet.
1.2.3 Root AP
In Root AP mode, the NWA1121-NI (Z) can act as the root AP in a wireless network and also allow
repeaters (X and Y) to extend the range of its wireless network at the same time. In the figure
below, both clients A, B and C can access the wired network through the root AP.
On the NWA1121-NI in Root AP mode, you can have multiple SSIDs active for reqular wireless
connections and one SSID for the connection with a repeater (universal repeater SSID). Wireless
clients can use either SSID to associate with the NWA1121-NI in Root AP mode. A repeater must
use the universal repeater SSID to connect to the NWA1121-NI in Root AP mode.
When the NWA1121-NI is in Root AP mode, universal repeater security between the NWA1121-NI
and other repeater is independent of the security between the wireless clients and the AP or
repeater. If you do not enable universal repeater security, traffic between APs is not encrypted.
When universal repeater security is enabled, both APs and repeaters must use the same pre-shared
key. See Section 6.6 on page 74 for more details.
Unless specified, the term “security settings” refers to the traffic between the wireless clients and
the AP. At the time of writing, universal repeater security is compatible with the NWA1121-NI only.
1.2.4 Repeater
The NWA can act as a wireless network repeater to extend a root AP’s wireless network range, and
also establish wireless connections with wireless clients.
Using Repeater mode, your NWA1121-NI can extend the range of the WLAN. In the figure below,
the NWA1121-NI in Repeater mode (Z) has a wireless connection to the NWA1121-NI in Root AP
mode (X) which is connected to a wired network and also has a wireless connection to another
NWA1121-NI in Repeater mode (Y) at the same time. Z and Y act as repeaters that forward traffic
between associated wireless clients and the wired LAN. Clients A, B and C access the AP and the
wired network behind the AP throught repeaters Z and Y.
When the NWA1121-NI is in Repeater mode, universal repeater security between the NWA1121-NI
and other repeater is independent of the security between the wireless clients and the AP or
repeater. If you do not enable universal repeater security, traffic between APs is not encrypted.
When universal repeater security is enabled, both APs and repeaters must use the same pre-shared
key. See Section 6.6 on page 74 for more details.
Once the security settings of peer sides match one another, the connection between devices is
made.
At the time of writing, universal repeater security is compatible with the NWA1121-NI only.
• Web Configurator. This is recommended for everyday management of the NWA1121-NI using a
(supported) web browser.
• FTP (File Transfer Protocol) for firmware upgrades and configuration backup and restore.
• SNMP (Simple Network Management Protocol). The device can be monitored by an SNMP
manager.
• Control physical access by locating devices in secure areas, such as locked rooms. Most
NWA1121-NIs have a reset button. If an unauthorized person has access to the reset button,
they can then reset the device’s password to its default password, log in and reconfigure its
settings.
• Change any default passwords on the NWA1121-NI, such as the password used for accessing the
NWA1121-NI’s web configurator (if it has a web configurator). Use a password with a
combination of letters and numbers and change your password regularly. Write down the
password and put it in a safe place.
• See Section 11.5 on page 121 for instructions on changing your password.
• Configure remote management to control who can manage your NWA1121-NI. See Chapter 9 on
page 101 for more information. If you enable remote management, ensure you have enabled
remote management only on the IP addresses, services or interfaces you intended and that other
remote management settings are disabled.
• Enable wireless security on your NWA1121-NI. Choose the most secure encryption method that
all devices on your network support. See Section 6.6 on page 74 for directions on configuring
encryption. If you have a RADIUS server, enable IEEE 802.1x or WPA(2) user identification on
your network so users must log in. This method is more common in business environments.
• Hide your wireless network name (SSID). The SSID can be regularly broadcast and unauthorized
users may use this information to access your network. See Section 6.5 on page 72 for directions
on using the web configurator to hide the SSID.
• Enable the MAC filter to allow only trusted users to access your wireless network or deny
unwanted users access based on their MAC address. See Section 6.8 on page 89 for directions on
configuring the MAC filter.
• Change the password. Use a password that’s not easy to guess and that consists of different
types of characters, such as numbers and letters.
• Write down the password and put it in a safe place.
• Back up the configuration (and make sure you know how to restore it). Restoring an earlier
working configuration may be useful if the device becomes unstable or even crashes. If you
forget your password, you will have to reset the NWA1121-NI to its factory default settings. If
you backed up an earlier configuration file, you would not have to totally re-configure the
NWA1121-NI. You could simply restore your last configuration.
1.7 LED
Figure 5 LED
Table 1 LED
COLOR STATUS DESCRIPTION
Amber On There is system error and the NWA1121-NI cannot boot up, or the
NWA1121-NI doesn’t have an Ethernet connection with the LAN.
Flashing The NWA1121-NI is starting up.
Off The NWA1121-NI is receiving power and ready for use.
Green On The WLAN is active.
Blinking The WLAN is active, and transmitting or receiving data.
Off The WLAN is not active.
This chapter describes how to access the NWA1121-NI’s web configurator and provides an overview
of its screens.
4 Type “admin” as the (default) username and “1234” as the (default) password. Click Login.
5 You should see a screen asking you to change your password (highly recommended) as shown
next. Type a new password (and retype it to confirm) then click Apply. Alternatively, click Ignore.
Note: If you do not change the password, the following screen appears every time you
login.
You should now see the Dashboard screen. See Chapter 2 on page 19 for details about the
Dashboard screen.
factory-default configuration file. This means that you will lose all the settings you previously
configured. The password will be reset to “1234”.
Use the RESET button to upload the default configuration file. Hold this button in for about 3
seconds (the light will begin to blink). Use this method for cases when the password or IP address
of the NWA1121-NI is not known.
Use the web configurator to restore defaults (refer to Section 11.8 on page 124).
B C
As illustrated above, the Web Configurator screen is divided into these parts:
• A - title bar
• B - navigation panel
• C - main window
Click ZAbout to open the about window, which provides information of the boot module and driver
versions.
The Dashboard screens display when you log into the NWA1121-NI, or click Dashboard in the
navigation menu.
Use the Dashboard screen to look at the current status of the device, system resources, and
interfaces. The Dashboard screens also provide detailed information about system statistics,
associated wireless clients, and logs.
This chapter first provides an overview of how to configure the wireless LAN on your NWA1121-NI,
and then gives step-by-step guidelines showing how to configure your NWA1121-NI for some
example scenarios.
6.4.4 on page 69) to provide multiple wireless networks. Each wireless network will cater to a
different type of user.
You want to make three wireless networks: one standard office wireless network with all the same
settings you already have, another wireless network with high priority QoS settings for Voice over
IP (VoIP) users, and a guest network that allows visitors to access only the Internet and the
network printer.
2 Change the operating mode from Root AP to MBSSID and reactivate the standard network.
The following figure shows the multiple networks you want to set up. Your NWA1121-NI is marked
Z, the main network router is marked A, and your network printer is marked B.
B
A
The standard network (SSID01) has access to all resources. The VoIP network (VoIP_SSID) has
access to all resources and a high QoS priority. The guest network (Guest_SSID) has access to the
Internet and the network printer only, and a low QoS priority.
To configure these settings, you need to know the Media Access Control (MAC) addresses of the
devices you want to allow users of the guest network to access. The following table shows the
addresses used in this example.
1 Log in to the NWA1121-NI (see Section 2.1 on page 19). Click Wireless LAN > SSID. The SSID
screen appears.
4 Repeat Step 2 and 3 to change Profile2 and Profile3 to VoIP_SSID and Guest_SSID.
4.2.1.1 MBSSID
1 Go to Wireless LAN > Wireless Settings. Select MBSSID from the Operation Mode drop-down
list box.
2 SSID01 is the standard network, so select SSID01 as the first profile. It is always active.
3 Select VoIP_SSID as the second profile, and Guest_SSID as the third profile. Select the
corresponding Active check-boxes.
4 Click Apply to save your settings. Now the three SSIDs are activated.
1 Click Wireless LAN > SSID. Click the Edit icon next to SSID01.
2 Select SecProfile1 as SSID01’s security profile. Select the Hidden SSID checkbox as you want
only authorized company employees to use this network, so there is no need to broadcast the SSID
to wireless clients scanning the area.
Also, the clients on SSID01 might need to access other clients on the same wireless network. Do
not select the Intra-BSS Traffic blocking check-box.
Click Apply.
3 Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile1.
4 Since SSID01 is the standard network that has access to all resources, assign a more secure
security mode. Select WPA2-PSK-MIX as the Security Mode, and enter the Pre-Shared Key. In
this example, use ThisisSSID01PreSharedKey. Click Apply.
1 Go to Wireless LAN > SSID. Click the Edit icon next to VoIP_SSID.
2 Select SecProfile2 as the Security Profile for the VoIP network. Select the Hidden SSID check-
box.
3 Select WMM_VOICE in the QoS field to give VoIP the highest priority in the wireless network. Click
Apply.
4 Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile2.
5 Select WPA2-PSK as the Security Mode, and enter the Pre-Shared Key. In this example, use
ThisisVoIPPreSharedKey. Click Apply.
6 Your VoIP wireless network is now ready to use. Any traffic using the VoIP_SSID profile will be
given the highest priority across the wireless network.
1 Click Wireless LAN > SSID. Click the Edit icon next to Guest_SSID.
2 Select SecProfile3 in the Security field. Do not select the Hidden SSID check-box so the guests
can easily find the wireless network.
3 Select WMM_BESTEFFORT in the QoS field to give the guest a lower QoS priority.
5 Next, click Wireless LAN > Security. Click the Edit icon next to SecProfile3.
6 Select WPA-PSK in the Security Mode field. WPA-PSK provides strong security that is supported
by most wireless clients. Even though your Guest_SSID clients do not have access to sensitive
information on the network, you should not leave the network without security. An attacker could
still cause damage to the network or intercept unsecured communications or use your Internet
access for illegal activities.
7 Enter the PSK you want to use in your network in the Pre Shared Key field. In this example, the
PSK is ThisismyGuestWPApre-sharedkey. Click Apply.
• On a computer with a wireless client, scan for access points. You should see the Guest_SSID
network, but not the SSID01 and VoIP_SSID networks. If you can see the SSID01 and
VoIP_SSID networks, go to its SSID Edit screen and make sure to select the Hidden SSID
check-box and click Apply.
• Try to access each network using the correct security settings, and then using incorrect security
settings, such as the WPA-PSK for another active network. If the behavior is different from
expected (for example, if you can access the SSID01 or VoIP_SSID wireless network using the
security settings for the Guest_SSID wireless network) check that the SSID profile is set to use
the correct security profile, and that the settings of the security profile are correct.
4.3.1 Scenario
In the figure below, there are two NWA1121-NIs (A and B) in the network. A is in MBSSID or root
AP mode while station B is in wireless client mode. Station B is connected to a File Transfer Protocol
(FTP) server. You want only specified wireless clients to be able to access station B. You also want
to allow wireless traffic between B and wireless clients connected to A (W, Y and Z). Other wireless
devices (X) must not be able to connect to the FTP server.
Log into the Web Configurator on NWA1121-NI (A) and go to the Wireless LAN > Wireless
Settings screen.
5 Click Apply.
6 Go to Wireless LAN > SSID. Click the Edit icon next to Profile1.
9 Select the check-box for Intra-BSS Traffic blocking Enabled so the client cannot access other
clients on the same wireless network.
10 Click Apply.
11 Go to Wireless LAN > Security. Click the Edit icon next to SecProfile1.
12 Configure WPA-PSK as the Security Mode and enter ThisisMyPreSharedKey in the Pre-
Shared Key field.
2 Click on the Site Survey button. A window should pop up which contains a list of all available
wireless devices within your NWA1121-NI’s range.
4 Go to Wireless LAN > Security to configure the NWA1121-NI to use the same security mode and
Pre-Shared Key as NWA1121-NI (A): WPA-PSK/ThisisMyPreSharedKey. Click Apply.
Figure 12
1 Go to Wireless LAN > MAC Filter. Click the Edit icon next to MacProfile1.
2 Select Allow in the Access Control Mode field. Enter the MAC addresses of the wireless clients
(W, Y and Z) you want to associate with the NWA1121-NI. Click Apply.
Now, only the authorized wireless clients (W, Y and Z) can access the FTP server.
• Try accessing the FTP server from wireless clients W, Y or Z. Test if you can send or retrieve a
file. If you cannot establish a connection with the FTP server, do the following steps.
1 Make sure W, Y and Z use the same wireless security settings as A and can access A.
2 Make sure B uses the same wireless and wireless security settings as A and can access A.
2 Make sure X’s MAC address is not entered in the list of allowed devices.
47
48
C HAPT ER 5
Monitor
5.1 Overview
This chapter discusses read-only information related to the device state of the NWA1121-NI.
Note: To access the Monitor screens, you can also click the links in the Summary table of
the Dashboard screen to view the wireless packets sent/received as well as the
status of clients connected to the NWA1121-NI.
Log entries in red indicate system error logs. The log wraps around and deletes the old entries after
it fills.
Figure 13 Logs
Table 5 Logs
LABEL DESCRIPTION
Display Select a category of logs to view. Select All Log to view logs from all of the log
categories that you selected in the Configuration > Log Settings screen.
E-Mail Log Now Click E-Mail Log Now to send the log screen to the e-mail address specified in the Log
Settings page (make sure that you have first filled in the E-mail Log Settings fields in
Configuration > Log Settings).
Refresh Click Refresh to renew the log screen.
Clear Log Click Clear Log to delete all the logs.
# This field is a sequential value and is not associated with a specific entry.
Time This field displays the time the log was recorded.
Message This field states the reason for the log.
Source This field lists the source IP address and the port number of the incoming packet.
5.4 Statistics
Use this screen to view read-only information, including 802.11 Mode, Channel ID, Retry Count and
FCS Error Count. Also provided is the "poll interval". The Poll Interval field is configurable and is
used for refreshing the screen.
Figure 14 Statistics
Table 6 Statistics
LABEL DESCRIPTION
Description This is the wireless interface on the NWA1121-NI.
802.11 Mode This field shows which 802.11 mode the NWA1121-NI is using.
Channel ID This shows the channel number which the NWA1121-NI is currently using over the
wireless LAN.
RX Pkts This is the number of received packets on this port.
TX Pkts This is the number of transmitted packets on this port.
Retry Count This is the total number of retries for transmitted packets (TX).
FCS Error Count This is the total number of checksum error of received packets (RX).
Poll Interval Enter the time interval for refreshing statistics.
Set Interval Click this button to apply the new poll interval you entered above.
Stop Click this button to stop refreshing statistics.
Click Monitor > Association List to display the screen as shown next.
Click Monitor > Channel Usage to display the screen shown next.
6.1 Overview
This chapter discusses the steps to configure the Wireless Settings screen on the NWA1121-NI. It
also introduces the wireless LAN (WLAN) and some basic scenarios.
In the figure above, the NWA1121-NI allows access to another bridge device (A) and a notebook
computer (B) upon verifying their settings and credentials. It denies access to other devices (C and
D) with configurations that do not match those specified in your NWA1121-NI.
ESS
An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access
point, with each access point connected together by a wired network. This wired connection
between APs is called a Distribution System (DS).
Operating Mode
The NWA1121-NI can run in four operating modes as follows:
• Root AP. The NWA1121-NI is a wireless access point that allows wireless communication to
other devices in the network.
• Repeater. The NWA1121-NI acts as a wireless repeater and increase a root AP’s wireless
coverage area.
• Client. The NWA1121-NI acts as a wireless client to access a wireless network.
• MBSSID. The Multiple Basic Service Set Identifier (MBSSID) mode allows you to use one
access point to provide several BSSs simultaneously.
SSID
The SSID (Service Set IDentifier) is the name that identifies the Service Set with which a wireless
station is associated. Wireless stations associating to the access point (AP) must have the same
SSID. In other words, it is the name of the wireless network that clients use to connect to it.
Normally, the NWA1121-NI acts like a beacon and regularly broadcasts the SSID in the area. You
can hide the SSID instead, in which case the NWA1121-NI does not broadcast the SSID. In
addition, you should change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized wireless
devices to get the SSID. In addition, unauthorized wireless devices can still see the information that
is sent in the wireless network.
Channel
A channel is the radio frequency(ies) used by wireless devices. Channels available depend on your
geographical area. You may have a choice of channels (for your region) so you should use a
different channel than an adjacent AP (access point) to reduce interference.
Wireless Mode
The IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended
authentication as well as providing additional accounting and control features. Your NWA1121-NI
can support 802.11b/g, 802.11n and 802.11b/g/n.
MBSSID
Traditionally, you needed to use different APs to configure different Basic Service Sets (BSSs). As
well as the cost of buying extra APs, there was also the possibility of channel interference. The
NWA1121-NI’s MBSSID (Multiple Basic Service Set IDentifier) function allows you to use one access
point to provide several BSSs simultaneously. You can then assign varying levels of privilege to
different SSIDs.
Wireless stations can use different BSSIDs to associate with the same AP.
Wireless Security
Wireless security is vital to your network. It protects communications between wireless stations,
access points and the wired network.
In the figure above, the NWA1121-NI checks the identity of devices before giving them access to
the network. In this scenario, Computer A is denied access to the network, while Computer B is
granted connectivity.
The NWA1121-NI secure communications via data encryption, wireless client authentication and
MAC address filtering. It can also hide its identity in the network.
User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before they can use it. However,
every device in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS
server. This is a server used in businesses more than in homes. If you do not have a RADIUS server,
you cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network,
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized
wireless users to get a valid user name and password. Then, they can use that user name and
password to use the wireless network.
The following table shows the relative effectiveness of wireless security methods:.
Note: To guarantee 802.11n wireless speed, please only use WPA2 or WPA2-PSK security
mode. Other security modes may degrate the wireless speed performance to
802.11g.
Passphrase
A passphrase functions like a password. In WEP security mode, it is further converted by the
NWA1121-NI into a complicated string that is referred to as the “key”. This key is requested from all
devices wishing to connect to a wireless network.
PSK
The Pre-Shared Key (PSK) is a password shared by a wireless access point and a client during a
previous secure connection. The key can then be used to establish a connection between the two
parties.
Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message. Encryption is the process of converting data into unreadable text. This
secures information in network communications. The intended recipient of the data can “unlock” it
with a pre-assigned key, making the information readable only to him. The NWA1121-NI when used
as a wireless client employs Temporal Key Integrity Protocol (TKIP) data encryption.
EAP
Extensible Authentication Protocol (EAP) is a protocol used by a wireless client, an access point and
an authentication server to negotiate a connection.
The EAP methods employed by the NWA1121-NI when in Wireless Client operating mode are
Transport Layer Security (TLS), Protected Extensible Authentication Protocol (PEAP), Lightweight
Extensible Authentication Protocol (LEAP) and Tunneled Transport Layer Security (TTLS). The
authentication protocol may either be Microsoft Challenge Handshake Authentication Protocol
Version 2 (MSCHAPv2) or Generic Token Card (GTC).
RADIUS
Remote Authentication Dial In User Service (RADIUS) is a protocol that can be used to manage user
access to large networks. It is based on a client-server model that supports authentication,
authorization and accounting. The access point is the client and the server is the RADIUS server.
In the figure above, wireless clients A and B are trying to access the Internet via the NWA1121-NI.
The NWA1121-NI in turn queries the RADIUS server if the identity of clients A and U are allowed
access to the Internet. In this scenario, only client U’s identity is verified by the RADIUS server and
allowed access to the Internet.
RADIUS is a simple package exchange in which your AP acts as a message relay between the
wireless client and the network RADIUS server.
You should know the IP addresses, ports and share secrets of the external RADIUS server and/or
the external RADIUS accounting server you want to use with your NWA1121-NI. You can configure
a primary and backup RADIUS and RADIUS accounting server for your NWA1121-NI.
The following table describes the general wireless LAN labels in this screen.
Select 802.11n to allow only IEEE802.11n compliant WLAN devices to associate with the
NWA1121-NI.
Channel Select the operating frequency/channel depending on your particular region from the
drop-down list box.
Channel Width This field displays only when you select 802.11n or 802.11b/g/n in the Wireless Mode
field.
Select the channel bandwidth you want to use for your wireless network.
It is recommended that you select 20/40MHz. This allows the NWA1121-NI to adjust the
channel bandwidth depending on network conditions.
Select 20MHz if you want to lessen radio interference with other wireless devices in your
neighborhood or the wireless clients do not support channel bonding.
Select SSID The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is
Profile associated. Wireless stations associating to the access point (AP) must have the same
SSID. You can have up to four SSIDs active at the same time.
Note: If you are configuring the NWA1121-NI from a computer connected to the wireless
LAN and you change the NWA1121-NI’s SSID or security settings, you will lose your
wireless connection when you press Apply to confirm. You must then change the
wireless settings of your computer to match the NWA1121-NI’s new settings.
# This is the index number of each SSID profile.
Activve Select the check box to enable an SSID profile. Otherwise, clear the check box.
Profile Select an SSID Profile from the drop-down list box.
Universal Repeater Settings
The Universal repeater function allows the NWA1121-NI in root AP or repeater mode to set up a wireless
connection between it and another NWA1121-NI in root AP or repeater mode.
Note: Universal repeater security is independent of the security settings between the NWA1121-NI and any
wireless clients.
Local MAC Local MAC Address is the MAC address of your NWA1121-NI.
Address
Universal Select the SSID profile you want to use for universal repeater connections.
Repeater SSID
Profile Note: You can only configure None, WPA-PSK or WPA2-PSK security mode for the SSID
used by a universal repeater connection.
Select Long if you are unsure what preamble mode the wireless adapters support, and to
provide more reliable communications in busy wireless networks.
RTS/CTS (Request To Send) The threshold (number of bytes) for enabling RTS/CTS handshake.
Threshold Data with its frame size larger than this value will perform the RTS/CTS handshake.
Setting this attribute to be larger than the maximum MSDU (MAC service data unit) size
turns off the RTS/CTS handshake. Setting this attribute to its smallest value (1) turns on
the RTS/CTS handshake.
Fragmentation The threshold (number of bytes) for the fragmentation boundary for directed messages. It
is the maximum data fragment size that can be sent.
Extension You can use CTS to self or RTS-CTS protection mechanism to reduce conflicts with other
Channel wireless networks or hidden wireless clients. The throughput of RTS-CTS is much lower
Protection Mode than CTS to self. Using this mode may decrease your wireless performance.
A-MPDU This field is available only when 802.11 b/g/n is selected as the Wireless Mode.
Aggregation
Select to enable A-MPDU aggregation.
Message Protocol Data Unit (MPDU) aggregation collects Ethernet frames along with their
802.11n headers and wraps them in a 802.11n MAC header. This method is useful for
increasing bandwidth throughput in environments that are prone to high error rates.
Short GI This field is available only when 802.11 b/g/n is selected as the Wireless Mode. Select
Enabled to use Short GI (Guard Interval). The guard interval is the gap introduced
between data transmission from users in order to reduce interference. Reducing the GI
increases data transfer rates but also increases interference. Increasing the GI reduces
data transfer rates but also reduces interference.
MCS Rate The MCS Rate table is available only when 802.11 b/g/n is selected in the Wireless
Mode field.
IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands
for Modulation and Coding Scheme. This is an 802.11n feature that increases the wireless
network performance in terms of throughput.
For each MCS Rate (0-15), select either Enabled to have the NWA1121-NI use the data
rate.
Clear the Enabled check box if you do not want the NWA1121-NI to use the data rate.
Turn on the Auto option to have the NWA1121-NI set the data rates automatically to
optimize the throughput.
Note: You can set the NWA1121-NI to use up to four MCS rates at a time.
Apply Click Apply to save your changes.
Cancel Click Cancel to begin configuring this screen afresh.
Select 802.11n to allow only IEEE802.11n compliant WLAN devices to associate with the
NWA1121-NI.
Channel Select the operating frequency/channel depending on your particular region from the
drop-down list box.
Channel Width This field displays only when you select 802.11n or 802.11b/g/n in the Wireless Mode
field.
Select the channel bandwidth you want to use for your wireless network.
It is recommended that you select 20/40MHz. This allows the NWA1121-NI to adjust the
channel bandwidth depending on network conditions.
Select 20MHz if you want to lessen radio interference with other wireless devices in your
neighborhood or the wireless clients do not support channel bonding.
Universal Repeater Settings
The Universal repeater function allows the NWA1121-NI in root AP or repeater mode to set up a wireless
connection between it and another NWA1121-NI in root AP or repeater mode.
Note: Universal repeater security is independent of the security settings between the NWA1121-NI and any
wireless clients.
Local MAC Local MAC Address is the MAC address of your NWA1121-NI.
Address
Universal Select the SSID profile you want to use for universal repeater connections with an AP or
Repeater SSID repeater or regular wireless connections with wireless clients.
Profile
Note: You can only configure None, WPA-PSK or WPA2-PSK security mode for the SSID
used by a universal repeater connection.
Root MAC Specify the peer device’s MAC address. The peer device can be a NWA1121-NI in either
Address root AP mode or repeater mode.
Advanced Settings
Beacon Interval When a wirelessly network device sends a beacon, it includes with it a beacon interval.
This specifies the time period before the device sends the beacon again. The interval tells
receiving devices on the network how long they can wait in lowpower mode before waking
up to handle the beacon. A high value helps save current consumption of the access point.
DTIM Interval Delivery Traffic Indication Message (DTIM) is the time period after which broadcast and
multicast packets are transmitted to mobile clients in the Active Power Management
mode. A high DTIM value can cause clients to lose connectivity with the network.
Output Power Set the output power of the NWA1121-NI in this field. If there is a high density of APs in
an area, decrease the output power of the NWA1121-NI to reduce interference with other
APs. Select one of the following Full (Full Power), 50%, 25% or 12.5%. See the product
specifications for more information on your NWA1121-NI’s output power.
Select Long if you are unsure what preamble mode the wireless adapters support, and to
provide more reliable communications in busy wireless networks.
RTS/CTS (Request To Send) The threshold (number of bytes) for enabling RTS/CTS handshake.
Threshold Data with its frame size larger than this value will perform the RTS/CTS handshake.
Setting this attribute to be larger than the maximum MSDU (MAC service data unit) size
turns off the RTS/CTS handshake. Setting this attribute to its smallest value (1) turns on
the RTS/CTS handshake.
Fragmentation The threshold (number of bytes) for the fragmentation boundary for directed messages. It
is the maximum data fragment size that can be sent.
Extension You can use CTS to self or RTS-CTS protection mechanism to reduce conflicts with other
Channel wireless networks or hidden wireless clients. The throughput of RTS-CTS is much lower
Protection Mode than CTS to self. Using this mode may decrease your wireless performance.
A-MPDU This field is available only when 802.11 b/g/n is selected as the Wireless Mode.
Aggregation
Select to enable A-MPDU aggregation.
Message Protocol Data Unit (MPDU) aggregation collects Ethernet frames along with their
802.11n headers and wraps them in a 802.11n MAC header. This method is useful for
increasing bandwidth throughput in environments that are prone to high error rates.
Short GI This field is available only when 802.11 b/g/n is selected as the Wireless Mode. Select
Enabled to use Short GI (Guard Interval). The guard interval is the gap introduced
between data transmission from users in order to reduce interference. Reducing the GI
increases data transfer rates but also increases interference. Increasing the GI reduces
data transfer rates but also reduces interference.
MCS Rate The MCS Rate table is available only when 802.11 b/g/n is selected in the Wireless
Mode field.
IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands
for Modulation and Coding Scheme. This is an 802.11n feature that increases the wireless
network performance in terms of throughput.
For each MCS Rate (0-15), select either Enabled to have the NWA1121-NI use the data
rate.
Clear the Enabled check box if you do not want the NWA1121-NI to use the data rate.
Turn on the Auto option to have the NWA1121-NI set the data rates automatically to
optimize the throughput.
Note: You can set the NWA1121-NI to use up to four MCS rates at a time.
Apply Click Apply to save your changes.
Cancel Click Cancel to begin configuring this screen afresh.
The following table describes the general wireless LAN labels in this screen.
Note: After selecting Client as the Operation Mode in the Basic Settings section, you must
click Apply to be able to select from the AP list.
In this field, select the SSID profile of the AP you want to use. Click Apply.
The SSID used in the selected SSID profile automatically changes to be the one you select
in the Site Survey screen.
Set the security configuration for this operating mode in the Wireless LAN > Security
screen. Check the Dashboard screen to check if the settings you set show in the WLAN
information.
Note: If you are configuring the NWA1121-NI from a computer connected to the wireless LAN
and you change the NWA1121-NI’s SSID or security settings, you will lose your
wireless connection when you press Apply to confirm. You must then change the
wireless settings of your computer to match the NWA1121-NI’s new settings.
Channel This shows the operating frequency/channel in use. This field is read-only when you select
Client as your operation mode.
Channel Width A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a 40MHz
channel uses two standard channels and offers speeds of up to 300Mbps. However, not all
devices support 40MHz channels.
Select the channel bandwidth you want to use for your wireless network.
It is recommended that you select 20/40MHz. This allows the NWA1121-NI to adjust the
channel bandwidth depending on network conditions.
Select 20MHz if you want to lessen radio interference with other wireless devices in your
neighborhood or the AP do not support channel bonding.
Advanced Settings
Output Power Set the output power of the NWA1121-NI in this field. If there is a high density of APs in an
area, decrease the output power of the NWA1121-NI to reduce interference with other APs.
Select one of the following Full (Full Power), 50%, 25% or 12.5%. See the product
specifications for more information on your NWA1121-NI’s output power.
Preamble Type Select Dynamic to have the NWA1121-NI automatically use short preamble when the
wireless network your NWA1121-NI is connected to supports it, otherwise the NWA1121-NI
uses long preamble.
Select Long preamble if you are unsure what preamble mode the wireless device your
NWA1121-NI is connected to supports, and to provide more reliable communications in
busy wireless networks.
RTS/CTS (Request To Send) The threshold (number of bytes) for enabling RTS/CTS handshake. Data
Threshold with its frame size larger than this value will perform the RTS/CTS handshake. Setting this
attribute to be larger than the maximum MSDU (MAC service data unit) size turns off the
RTS/CTS handshake. Setting this attribute to its smallest value (1) turns on the RTS/CTS
handshake.
Fragmentation The threshold (number of bytes) for the fragmentation boundary for directed messages. It
is the maximum data fragment size that can be sent.
Extension You can use CTS to self or RTS-CTS protection mechanism to reduce conflicts with other
channel wireless networks or hidden wireless clients. The throughput of RTS-CTS is much lower
protection mode than CTS to self. Using this mode may decrease your wireless performance.
A-MPDU Select to enable A-MPDU aggregation.
Aggregation
Message Protocol Data Unit (MPDU) aggregation collects Ethernet frames along with their
802.11n headers and wraps them in a 802.11n MAC header. This method is useful for
increasing bandwidth throughput in environments that are prone to high error rates.
Select 802.11n to allow only IEEE802.11n compliant WLAN devices to associate with the
NWA1121-NI.
Channel Select the operating frequency/channel depending on your particular region from the
drop-down list box.
Channel Width This field displays only when you select 802.11n or 802.11b/g/n in the Wireless Mode
field.
Select the channel bandwidth you want to use for your wireless network.
Select 20MHz if you want to lessen radio interference with other wireless devices in your
neighborhood or the wireless clients do not support channel bonding.
Select SSID The SSID (Service Set IDentifier) identifies the Service Set with which a wireless station is
Profile associated. Wireless stations associating to the access point (AP) must have the same
SSID. You can have up to eight SSIDs active at the same time.
Note: If you are configuring the NWA1121-NI from a computer connected to the wireless
LAN and you change the NWA1121-NI’s SSID or security settings, you will lose your
wireless connection when you press Apply to confirm. You must then change the
wireless settings of your computer to match the NWA1121-NI’s new settings.
# This is the index number of each SSID profile.
Activve Select the check box to enable an SSID profile. Otherwise, clear the check box.
Profile Select an SSID Profile from the drop-down list box.
Advanced Settings
Beacon Interval When a wirelessly network device sends a beacon, it includes with it a beacon interval.
This specifies the time period before the device sends the beacon again. The interval tells
receiving devices on the network how long they can wait in lowpower mode before waking
up to handle the beacon. A high value helps save current consumption of the access point.
DTIM Interval Delivery Traffic Indication Message (DTIM) is the time period after which broadcast and
multicast packets are transmitted to mobile clients in the Active Power Management
mode. A high DTIM value can cause clients to lose connectivity with the network.
Output Power Set the output power of the NWA1121-NI in this field. If there is a high density of APs in
an area, decrease the output power of the NWA1121-NI to reduce interference with other
APs. Select one of the following Full (Full Power), 50%, 25% or 12.5%. See the product
specifications for more information on your NWA1121-NI’s output power.
Select Long if you are unsure what preamble mode the wireless adapters support, and to
provide more reliable communications in busy wireless networks.
RTS/CTS (Request To Send) The threshold (number of bytes) for enabling RTS/CTS handshake.
Threshold Data with its frame size larger than this value will perform the RTS/CTS handshake.
Setting this attribute to be larger than the maximum MSDU (MAC service data unit) size
turns off the RTS/CTS handshake. Setting this attribute to its smallest value (1) turns on
the RTS/CTS handshake.
Extension You can use CTS to self or RTS-CTS protection mechanism to reduce conflicts with other
Channel wireless networks or hidden wireless clients. The throughput of RTS-CTS is much lower
Protection Mode than CTS to self. Using this mode may decrease your wireless performance.
A-MPDU This field is available only when 802.11 b/g/n is selected as the Wireless Mode.
Aggregation
Select to enable A-MPDU aggregation.
Message Protocol Data Unit (MPDU) aggregation collects Ethernet frames along with their
802.11n headers and wraps them in a 802.11n MAC header. This method is useful for
increasing bandwidth throughput in environments that are prone to high error rates.
Short GI This field is available only when 802.11 b/g/n is selected as the Wireless Mode. Select
Enabled to use Short GI (Guard Interval). The guard interval is the gap introduced
between data transmission from users in order to reduce interference. Reducing the GI
increases data transfer rates but also increases interference. Increasing the GI reduces
data transfer rates but also reduces interference.
MCS Rate The MCS Rate table is available only when 802.11 b/g/n is selected in the Wireless
Mode field.
IEEE 802.11n supports many different data rates which are called MCS rates. MCS stands
for Modulation and Coding Scheme. This is an 802.11n feature that increases the wireless
network performance in terms of throughput.
For each MCS Rate (0-15), select either Enabled to have the NWA1121-NI use the data
rate.
Clear the Enabled check box if you do not want the NWA1121-NI to use the data rate.
Turn on the Auto option to have the NWA1121-NI set the data rates automatically to
optimize the throughput.
Note: You can set the NWA1121-NI to use up to four MCS rates at a time.
Apply Click Apply to save your changes.
Cancel Click Cancel to begin configuring this screen afresh.
• If you select WMM from the QoS list, the priority of a data packet depends on the
packet’s IEEE 802.1q or DSCP header. If a packet has no WMM value assigned to
it, it is assigned the default priority.
• If you select WMM_VOICE, WMM_VIDEO, WMM_BESTEFFORT or
WMM_BACKGROUND, the NWA1121-NI applies that QoS setting to all of that
SSID’s traffic.
• If you select None, the NWA1121-NI applies no priority to traffic on this SSID.
Note: When you configure an SSID profile’s QoS settings, the NWA1121-NI applies the
same QoS setting to all of the profile’s traffic.
Packets coming from the WLAN using this SSID profile are tagged with the VLAN ID
number by the NWA1121-NI.
Number of Wireless Use this field to set a maximum number of wireless stations that may connect to the
Stations Allowed to device.
Associate
Hidden SSID If you do not select the checkbox, the NWA1121-NI broadcasts this SSID (a wireless
client scanning for an AP will find this SSID). Alternatively, if you select the checkbox,
the NWA1121-NI hides this SSID (a wireless client scanning for an AP will not find
this SSID).
Intra-BSS Traffic Select the check box to prevent wireless clients in this profile’s BSS from
Blocking communicating with one another.
Back Click Back to return to the previous screen.
Apply Click Apply to save your changes.
Cancel Click Cancel to begin configuring this screen afresh.
Click Wireless LAN > Security. Select the profile that you want to configure and click Edit.
The Security Settings screen varies depending upon the security mode you select.
Note that some screens display differently depending on the operating mode selected in the
Wireless LAN > Wireless Settings screen.
Note: You must enable the same wireless security settings on the NWA1121-NI and on all
wireless clients that you want to associate with it.
If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters
("0-9", "A-F").
You can configure up to four keys, but only one key can be activated at any one time.
Back Click Back to return to the previous screen.
Apply Click Apply to save your changes.
Cancel Click Cancel to begin configuring this screen afresh.
Enter a time interval between 100 and 3600 seconds. Alternatively, enter “0” to turn
reauthentication off.
If you select TTLS or PEAP, the options on the right refer to authentication protocols.
You can choose between PAP, CHAP, MSCHAP, MSCHAPv2 and/or GTC.
User Information
Username Supply the user name of the account created in the RADIUS server.
Login Name
Password Supply the password of the account created in the RADIUS server.
Certificate
User Certificate If you select TLS, enter the name of the certificate used to to verify the identity of
clients.
Back Click Back to return to the previous screen.
Apply Click Apply to save your changes.
Cancel Click Cancel to begin configuring this screen afresh.
If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters
("0-9", "A-F").
You can configure up to four keys, but only one key can be activated at any one time.
Rekey Options
Reauthentication Specify how often wireless stations have to resend user names and passwords in order to
Time stay connected.
Enter a time interval between 100 and 3600 seconds. Alternatively, enter “0” to turn
reauthentication off.
Note: If wireless station authentication is done using a RADIUS server, the reauthentication
timer on the RADIUS server has priority.
Enable Group-Key Select this option to have the NWA1121-NI automatically disconnect a wireless station
Update from the wired network after a period of inactivity. The wireless station needs to enter the
user name and password again before access to the wired network is allowed.
You can configure up to four keys, but only one key can be activated at any one time.
IEEE802.1x Authentication
Eap Type The options on the left refer to EAP methods. You can choose either TLS, LEAP, PEAP
or TTLS.
If you select TTLS or PEAP, the options on the right refer to authentication protocols.
You can choose between PAP, CHAP, MSCHAP, MSCHAPv2 and/or GTC.
User Information
Username Supply the user name of the account created in the RADIUS server.
Login Name
Password Supply the password of the account created in the RADIUS server.
Certificate
User Certificate If you select TLS, enter the name of the certificate used to to verify the identity of
clients.
Back Click Back to return to the previous screen.
Apply Click Apply to save your changes.
Cancel Click Cancel to begin configuring this screen afresh.
Enter a time interval between 100 and 3600 seconds. Alternatively, enter “0” to turn
reauthentication off.
Note: If wireless station authentication is done using a RADIUS server, the reauthentication
timer on the RADIUS server has priority.
Enable Group-Key Select this option to have the NWA1121-NI automatically disconnect a wireless station
Update from the wired network after a period of inactivity. The wireless station needs to enter the
user name and password again before access to the wired network is allowed.
If you select TTLS or PEAP, the options on the right refer to authentication protocols. You
can choose between PAP, CHAP, MSCHAP, MSCHAPv2 and/or GTC.
User Information
Username Supply the user name of the account created in the RADIUS server.
Login Name
Password Supply the password of the account created in the RADIUS server.
Certificate
User Certificate If you select TLS, enter the name of the certificate used to to verify the identity of clients.
The NWA1121-NI will attempt to communicate three times before using the backup
server. Requests can be issued from the client interface to use the backup server. The
length of time for each authentication is decided by the wireless client or based on
the configuration of the Reauthentication Time field in the Wireless LAN >
Security screen.
Backup Server IP Enter the IP address of the RADIUS server to be used for authentication.
Address
Backup Server Enter the port number of the RADIUS server to be used for authentication.
Port
Backup Share Enter a password (up to 64 alphanumeric characters) as the key to be shared
Secret between the external authentication server and the NWA1121-NI. The key must be
the same on the external authentication server and your NWA1121-NI. The key is not
sent over the network.
Primary Accounting Select the check box to enable user accounting through an external authentication
Server server.
Primary Server IP Enter the IP address of the external accounting server in dotted decimal notation.
Address
Primary Server Enter the port number of the external accounting server.
Port
Primary Share Enter a password (up to 64 alphanumeric characters) as the key to be shared
Secret between the external accounting server and the NWA1121-NI. The key must be the
same on the external accounting server and your NWA1121-NI. The key is not sent
over the network.
Backup Accounting If the NWA1121-NI cannot communicate with the primary accounting server, you can
Server have the NWA1121-NI use a backup accounting server. Make sure the check boxe is
selected if you want to use the backup server.
The NWA1121-NI will attempt to communicate three times before using the backup
server.
Backup Server IP Enter the IP address of the external accounting server in dotted decimal notation.
Address
Backup Server Enter the port number of the external accounting server.
Port
Backup Share Enter a password (up to 64 alphanumeric characters) as the key to be shared
Secret between the external accounting server and the NWA1121-NI. The key must be the
same on the external accounting and your NWA1121-NI. The key is not sent over the
network.
Back Click Back to return to the previous screen.
The MAC filter function allows you to configure the NWA1121-NI to grant access to the NWA1121-
NI from other wireless devices (Allow Association) or exclude devices from accessing the NWA1121-
NI (Deny Association).
In the figure above, wireless client U is able to connect to the Internet because its MAC address is
in the allowed association list specified in the NWA1121-NI. The MAC address of client A is either
denied association or is not in the list of allowed wireless clients specified in the NWA1121-NI.
Use this screen to enable MAC address filtering in your NWA1121-NI. You can specify MAC
addresses to either allow or deny association with your NWA1121-NI. Click Wireless LAN > MAC
Filter. The screen displays as shown.
Select Allow to permit access to the NWA1121-NI. MAC addresses not listed will be
denied access to the NWA1121-NI.
Select Deny to block access to theNWA1121-NI. MAC addresses not listed will be
allowed to access the NWA1121-NI.
# This is the index number of the MAC address listed.
MAC Address Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless station to be
allowed or denied access to the NWA1121-NI.
Back Click Back to return to the previous screen.
Apply Click Apply to save your changes.
Cancel Click Cancel to begin configuring this screen afresh.
TERM DESCRIPTION
Intra-BSS Traffic This describes direct communication (not through the NWA1121-NI) between two
wireless devices within a wireless network. You might disable this kind of
communication to enhance security within your wireless network.
RTS/CTS Threshold In a wireless network which covers a large area, wireless devices are sometimes not
aware of each other’s presence. This may cause them to send information to the AP
at the same time and result in information colliding and not getting through.
By setting this value lower than the default value, the wireless devices must
sometimes get permission to send information to the NWA1121-NI. The lower the
value, the more often the devices must get permission.
If this value is greater than the fragmentation threshold value (see below), then
wireless devices never have to get permission to send information to the NWA1121-
NI.
Preamble A preamble affects the timing in your wireless network. There are two preamble
modes: long and short. If a device uses a different preamble mode than the
NWA1121-NI does, it cannot communicate with the NWA1121-NI.
Fragmentation A small fragmentation threshold is recommended for busy networks, while a larger
Threshold threshold provides faster performance if the network is not very busy.
TERM DESCRIPTION
Roaming If you have two or more NWA1121-NIs (or other wireless access points) on your
wireless network, you can enable this option so that wireless devices can change
locations without having to log in again. This is useful for devices, such as notebooks,
that move around a lot.
Antenna An antenna couples Radio Frequency (RF) signals onto air. A transmitter within a
wireless device sends an RF signal to the antenna, which propagates the signal
through the air. The antenna also operates in reverse by capturing RF signals from
the air.
Positioning the antennas properly increases the range and coverage area of a wireless
LAN.
WMM QoS prioritizes wireless traffic according to the delivery requirements of the individual and
applications. WMM QoS is a part of the IEEE 802.11e QoS enhancement to certified Wi-Fi wireless
networks.
On APs without WMM QoS, all traffic streams are given the same access priority to the wireless
network. If the introduction of another traffic stream creates a data transmission demand that
exceeds the current network capacity, then the new traffic stream reduces the throughput of the
other traffic streams.
The NWA1121-NI uses WMM QoS to prioritize traffic streams according to the IEEE 802.1q or DSCP
information in each packet’s header. The NWA1121-NI automatically determines the priority to use
for an individual traffic stream. This prevents reductions in data transmission for applications that
are sensitive to latency and jitter (variations in delay).
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server. WPA has
user authentication and improved data encryption over WEP.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher bit key
offers better security. You can manually enter 64-bit or 128-bit WEP keys.
7.1 Overview
This chapter describes how you can configure the IP address of your NWA1121-NI.
The Internet Protocol (IP) address identifies a device on a network. Every networking device
(including computers, servers, routers, printers, etc.) needs an IP address to communicate across
the network. These networking devices are also known as hosts.
The figure above illustrates one possible setup of your NWA1121-NI. The gateway IPv4 address is
192.168.1.1 and the IPv4 address of the NWA1121-NI is 192.168.1.2 (default). The gateway and
the device must belong in the same subnet mask to be able to communicate with each other.
1 IP address of 192.168.1.2
IPv6
IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The
increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP
addresses.
IPv6 Addressing
The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This
is an example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000.
2001:db8:1a2b:15::1a2f:0/32
Link-local Address
A link-local address uniquely identifies a device on the local network (the LAN). It is similar to a
“private IP address” in IPv4. You can have the same link-local address on multiple interfaces on a
device. A link-local unicast address has a predefined prefix of fe80::/10. The link-local unicast
address format is as follows.
Global Address
A global address uniquely identifies a device on the Internet. It is similar to a “public IP address” in
IPv4. A global unicast address starts with a 2 or 3.
Figure 42 LAN IP
Table 29 LAN IP
LABEL DESCRIPTION
IPv4 Address
Assignment
Obtain IP Address Select this option if your NWA1121-NI is using a dynamically assigned IPv4 address
Automatically from a DHCP server each time.
Note: You must know the IP address assigned to the NWA1121-NI (by the DHCP
server) to access the NWA1121-NI again.
Use Fixed IP Address Select this option if your NWA1121-NI is using a static IPv4 address. When you
select this option, fill in the fields below.
IP Address Enter the IP address of your NWA1121-NI in dotted decimal notation.
Note: If you change the NWA1121-NI's IP address, you must use the new IP address if
you want to access the web configurator again.
Subnet Mask Type the subnet mask.
Gateway IP Type the IPv4 address of the gateway. The gateway is an immediate neighbor of your
Address NWA1121-NI that will forward the packet to the destination. On the LAN, the
gateway must be a router on the same segment as your NWA1121-NI; over the
WAN, the gateway must be the IP address of one of the remote nodes.
8.1 Overview
This chapter discusses how to configure the NWA1121-NI’s VLAN settings.
In the figure above, to access and manage the NWA1121-NI from computer A, the NWA1121-NI
and switch B’s ports to which computer A and the NWA1121-NI are connected should be in the
same VLAN.
In Multi-Tenant Unit (MTU) applications, VLAN is vital in providing isolation and security among the
subscribers. When properly configured, VLAN prevents one subscriber from accessing the network
resources of another on the same LAN, thus a user will not see the printers and hard disks of
another user in the same building.
VLAN also increases network performance by limiting broadcasts to a smaller and more
manageable logical broadcast domain. In traditional switched environments, all broadcast packets
go to each and every individual port. With VLAN, all broadcasts are confined to a specific broadcast
domain.
9.1 Overview
This chapter shows you how to enable remote management of your NWA1121-NI. It provides
information on determining which services or protocols can access which of the NWA1121-NI’s
interfaces.
Remote Management allows a user to administrate the device over the network. You can manage
your NWA1121-NI from a remote location via the following interfaces:
• WLAN
• LAN
• Both WLAN and LAN
• Neither (Disable)
Figure 46 Remote Management Example
In the figure above, the NWA1121-NI (A) is being managed by a desktop computer (B) connected
via LAN (Land Area Network). It is also being accessed by a notebook (C) connected via WLAN
(Wireless LAN).
• Use the Telnet screen to configure through which interface(s) and from which IP address(es)
you can use Telnet to manage the NWA1121-NI. A Telnet connection is prioritized by the
NWA1121-NI over other remote management sessions (see Section 9.6 on page 106).
• Use the SNMP screen to configure through which interface(s) and from which IP address(es) a
network systems manager can access the NWA1121-NI (see Section 9.7 on page 107).
• Use the FTP screen to configure through which interface(s) and from which IP address(es) you
can use File Transfer Protocol (FTP) to manage the NWA1121-NI. You can use FTP to upload the
latest firmware for example (see Section 9.8 on page 110).
Telnet
Telnet is short for Telecommunications Network, which is a client-side protocol that enables you to
access a device over the network.
FTP
File Transfer Protocol (FTP) allows you to upload or download a file or several files to and from a
remote location using a client or the command console.
SNMP
Simple Network Management Protocol (SNMP) is a member of the TCP/IP protocol suite used for
exchanging management information between network devices.
Your NWA1121-NI supports SNMP agent functionality, which allows a manager station to manage
and monitor the NWA1121-NI through the network. The NWA1121-NI supports SNMP version one
(SNMPv1), version two (SNMPv2c) and version three (SNMPv3).
An SNMP managed network consists of two main types of component: agents and a manager.
An agent is a management software module that resides in a managed device (the NWA1121-NI).
An agent translates the local management information from the managed device into a form
compatible with SNMP. The manager is the console through which network administrators perform
network management functions. It executes applications that control and monitor managed
devices.
SNMP allows a manager and agents to communicate for the purpose of accessing information such
as packets received, node port status, etc.
Security can be further enhanced by encrypting the SNMP messages sent from the managers.
Encryption protects the contents of the SNMP messages. When the contents of the SNMP messages
are encrypted, only the intended recipients can read them.
• You have disabled that service in one of the remote management screens.
• The IP address in the Secured Client IP Address field does not match the client IP address. If
it does not match, the NWA1121-NI will disconnect the session immediately.
• You may only have one remote management session running at one time. The NWA1121-NI
automatically disconnects a remote management session of lower priority when another remote
management session of higher priority starts. The priorities for the different types of remote
management sessions are as follows:
1 Telnet
2 HTTP
Certificate
A certificate contains the certificate owner’s identity and public key. Certificates provide a way to
exchange public keys for use in authentication.
In the figure above, the NWA1121-NI (Z) checks the identity of the notebook (A) using a certificate
before granting access to the network.
The certification authority certificate that you can import to your NWA1121-NI should be in PFX
PKCS#12 file format. This format referred to as the Personal Information Exchange Syntax
Standard is comprised of a private key-public certificate pair that is further encrypted with a
password. Before you import a certificate into the NWA1121-NI, you should verify that you have the
correct certificate.
Key distribution is simple and very secure since you can freely distribute public keys and you never
need to transmit private keys.
To change your NWA1121-NI’s WWW settings, click System > WWW. The following screen shows.
Select All to allow any computer to access the NWA1121-NI using this service.
Choose Selected to just allow the computer with the IP address that you specify to
access the NWA1121-NI using this service.
Secured Client Select All to allow any computer to access the NWA1121-NI using this service.
MAC Address
Choose Selected to just allow the computer with the MAC address that you specify to
access the NWA1121-NI using this service.
Apply Click Apply to save your customized settings.
Cancel Click Cancel to begin configuring this screen afresh.
Select All to allow any computer to access the NWA1121-NI using this service.
Choose Selected to just allow the computer with the IP address that you specify to
access the NWA1121-NI using this service.
Secured Client Select All to allow any computer to access the NWA1121-NI using this service.
MAC Address
Choose Selected to just allow the computer with the MAC address that you specify to
access the NWA1121-NI using this service.
Apply Click Apply to save your customized settings.
Cancel Click Cancel to begin configuring this screen afresh.
manager. To change your NWA1121-NI’s SNMP settings, click System > SNMP. The following
screen displays.
Select All to allow any computer to access the NWA1121-NI using this service.
Choose Selected to just allow the computer with the IP address that you specify to
access the NWA1121-NI using this service.
Secured Client MAC Select All to allow any computer to access the NWA1121-NI using this service.
Address
Choose Selected to just allow the computer with the MAC address that you specify to
access the NWA1121-NI using this service.
SNMP Configuration
Protocol Version Select the SNMP version for the NWA1121-NI, which you allow the SNMP manager to
use to access the NWA1121-NI.
The SNMP version on the NWA1121-NI must match the version on the SNMP manager.
Get Community Enter the Get Community, which is the password for the incoming Get and GetNext
requests from the management station.
Set Community Enter the Set community, which is the password for incoming Set requests from the
management station.
Trap Community Type the trap community, which is the password sent with each trap to the SNMP
manager.
Trap Destination Type the IP address of the station to send your SNMP traps to.
SNMPv3 Admin
Settings
SNMPv3 Admin Select the check box to enable the SNMP administrator account for authentication with
SNMP managers using SNMP v3.
User Name Specify the user name of the SNMP administrator account.
Password Enter the password for SNMP administrator authentication.
Confirm Password Retype the password for confirmation.
Access Type Specify the SNMP administrator’s access rights to MIBs.
Read/Write - The SNMP administrator has read and write rights, meaning that the
user can create and edit the MIBs on the NWA1121-NI.
Read Only - The SNMP administrator has read rights only, meaning the user can collect
information from the NWA1121-NI.
Authentication Select an authentication algorithm used for SNMP communication with the SNMP
Protocol administrator.
MD5 (Message Digest 5) and SHA (Secure Hash Algorithm) are hash algorithms used
to authenticate SNMP data. SHA authentication is generally considered stronger than
MD5, but is slower.
Privacy Protocol Specify the encryption method used for SNMP communication with the SNMP
administrator.
DES - Data Encryption Standard is a widely used (but breakable) method of data
encryption. It applies a 56-bit key to each 64-bit block of data.
AES - Advanced Encryption Standard is another method for data encryption that also
uses a secret key. AES applies a 128-bit key to 128-bit blocks of data.
Read Only - The SNMP user has read rights only, meaning the user can collect
information from the NWA1121-NI.
Read/Write - The SNMP user has read and write rights, meaning that the user can
create and edit the MIBs on the NWA1121-NI.
Authentication Select an authentication algorithm used for SNMP communication with the SNMP user.
Protocol
MD5 (Message Digest 5) and SHA (Secure Hash Algorithm) are hash algorithms used
to authenticate SNMP data. SHA authentication is generally considered stronger than
MD5, but is slower.
Privacy Protocol Specify the encryption method used for SNMP communication with the SNMP user.
DES - Data Encryption Standard is a widely used (but breakable) method of data
encryption. It applies a 56-bit key to each 64-bit block of data.
AES - Advanced Encryption Standard is another method for data encryption that also
uses a secret key. AES applies a 128-bit key to 128-bit blocks of data.
Apply Click Apply to save your customized settings.
Cancel Click Cancel to begin configuring this screen afresh.
To change your NWA1121-NI’s FTP settings, click System > FTP. The following screen displays.
Select All to allow any computer to access the NWA1121-NI using this service.
Choose Selected to just allow the computer with the IP address that you specify to access
the NWA1121-NI using this service.
Secured Client Select All to allow any computer to access the NWA1121-NI using this service.
MAC Address
Choose Selected to just allow the computer with the MAC address that you specify to
access the NWA1121-NIe using this service.
Apply Click Apply to save your customized settings.
Cancel Click Cancel to begin configuring this screen afresh.
9.9.1 MIB
Managed devices in an SMNP managed network contain object variables or managed objects that
define each piece of information to be collected about a device. Examples of variables include such
as number of packets received, node port status etc. A Management Information Base (MIB) is a
collection of managed objects.SNMP itself is a simple request/response protocol based on the
manager/agent model. The manager issues a request and the agent returns responses using the
following protocol operations:
• Get - Allows the manager to retrieve an object variable from the agent.
• GetNext - Allows the manager to retrieve the next object variable from a table or list within an
agent. In SNMPv1, when a manager wants to retrieve all elements of a table from an agent, it
initiates a Get operation, followed by a series of GetNext operations.
• Set - Allows the manager to set values for object variables within an agent.
• Trap - Used by the agent to inform the manager of some events.
These keys work like a handwritten signature (in fact, certificates are often referred to as “digital
signatures”). Only you can write your signature exactly as it should look. When people know what
your signature looks like, they can verify whether something was signed by you, or by someone
else. In the same way, your private key “writes” your digital signature and your public key allows
people to verify whether data was signed by you, or by someone else. This process works as
follows.
1 Tim wants to send a message to Jenny. He needs her to be sure that it comes from him, and that
the message content has not been altered by anyone else along the way. Tim generates a public
key pair (one public key and one private key).
2 Tim keeps the private key and makes the public key openly available. This means that anyone who
receives a message seeming to come from Tim can read it and verify whether it is really from him
or not.
3 Tim uses his private key to sign the message and sends it to Jenny.
4 Jenny receives the message and uses Tim’s public key to verify it. Jenny knows that the message is
from Tim, and that although other people may have been able to read the message, no-one can
have altered it (because they cannot re-sign the message with Tim’s private key).
5 Additionally, Jenny uses her own private key to sign a message and Tim uses Jenny’s public key to
verify the message.
2 Make sure that the certificate has a “.cer” or “.crt” file name extension.
Figure 54 Certificates on Your Computer
3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll
down to the Thumbprint Algorithm and Thumbprint fields.
Figure 55 Certificate Details
4 Use a secure method to verify that the certificate owner has the same information in the
Thumbprint Algorithm and Thumbprint fields. The secure method may vary according to your
situation. Possible examples would be over the telephone or through an HTTPS connection.
10.1 Overview
This chapter provides information on viewing and generating logs on your NWA1121-NI.
Logs are files that contain recorded network activity over a set period. They are used by
administrators to monitor the health of the system(s) they are managing. Logs enable
administrators to effectively monitor events, errors, progress, etc. so that when network problems
or system failures occur, the cause or origin can be traced. Logs are also essential for auditing and
keeping track of changes made by users.
The figure above illustrates three ways to access logs. The user (U) can access logs directly from
the NWA1121-NI (A) via the Web configurator. Logs can also be located in an external log server
(B). An email server (C) can also send harvested logs to the user’s email account.
To change your NWA1121-NI’s log settings, click Configuration > Log Settings. The screen
appears as shown.
If you use SMTP authentication, the mail receiver should be the owner of the SMTP
account.
User Name If your e-mail account requires SMTP authentication, enter the username here.
Password Enter the password associated with the above username.
Syslog Logging Syslog logging sends a log to an external syslog server used to store logs.
Syslog Logging Select the check box to enable syslog logging.
Syslog Server IP Enter the IP address of the syslog server that will log the selected categories of logs.
Address
Syslog Port Enter the port number of the syslog server that will log the selected categories of
Number logs.
Send Log
Log Schedule This drop-down menu is used to configure the frequency of log messages being sent
as E-mail:
11.1 Overview
This chapter describes the maintenance screens. It discusses how you can upload new firmware,
manage configuration and restart your NWA1121-NI without turning it off and on.
This chapter provides information and instructions on how to identify and manage your NWA1121-
NI over the network.
In the figure above, the NWA1121-NI connects to a Domain Name Server (DNS) server to avail of a
domain name. It also connects to an Network Time Protocol (NTP) server to set the time on the
device.
This name can be up to 15 alphanumeric characters long. Spaces are not allowed, but
dashes "-" are accepted.
Apply Click Apply to save your changes.
Cancel Click Cancel to reload the previous configuration for this screen.
Each time you reload this page, the NWA1121-NI synchronizes the time with the
time server (if configured).
When you disable NTP Client Update, you can manually enter the new time in this
field and then click Apply.
Current Date This field displays the last updated date from the time server.
When you disable NTP Client Update, you can manually enter the new date in this
field and then click Apply.
Time and Date Setup
NTP Client Update Select this to have the NWA1121-NI get the time and date from the time server you
specified below.
NTP server Select this option to use the predefined list of Network Time Protocol (NTP) servers.
Select an NTP server from the drop-list box.
Manual IP Select this option to enter the IP address or URL of your time server. Check with
your ISP/network administrator if you are unsure of this information.
Time Zone Setup
Time Zone Choose the time zone of your location. This will set the time difference between
your time zone and Greenwich Mean Time (GMT).
Apply Click Apply to save your changes.
Cancel Click Cancel to reload the previous configuration for this screen.
The NWA1121-NI automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
After the upload was finished, log in again and check your new firmware version in the Dashboard
screen.
Click Maintenance > Configuration File. The screen appears as shown next.
You must then wait one minute before logging into the NWA1121-NI again.
The NWA1121-NI automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
If you uploaded the default configuration file you may need to change the IP address of your
computer to be in the same subnet as that of the default NWA1121-NI IP address (192.168.1.2).
See Appendix A on page 131 for details on how to set up your computer’s IP address.
You can also press the RESET button to reset your NWA1121-NI to its factory default settings.
Refer to Section 2.2 on page 20 for more information.
Click Restart to have the NWA1121-NI reboot. This does not affect the NWA1121-NI's
configuration.
This chapter offers some suggestions to solve problems you might encounter. The potential
problems are divided into the following categories.
The NWA1121-NI does not turn on. None of the LEDs turn on.
1 Make sure you are using the power adaptor or cord included with the NWA1121-NI.
2 Make sure the power adaptor or cord is connected to the NWA1121-NI and plugged in to an
appropriate power source. Make sure the power source is turned on.
1 Make sure you understand the normal behavior of the LED. See Section 1.7 on page 17.
3 Inspect your cables for damage. Contact the vendor to replace any damaged cables.
2 If you changed the IP address and have forgotten it, you might get the IP address of the NWA1121-
NI by looking up the IP address of the default gateway for your computer. To do this in most
Windows computers, click Start > Run, enter “cmd”, and then enter “ipconfig”. The IP address of
the Default Gateway might be the IP address of the NWA1121-NI (it depends on the network), so
enter this IP address in your Internet browser.
3 If this does not work, you have to reset the device to its factory defaults. See Section 2.2 on page
20.
2 If this does not work, you have to reset the device to its factory defaults. See Section 2.2 on page
20.
2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick
Start Guide and Section 1.7 on page 17.
3 Make sure your Internet browser does not block pop-up windows and has JavaScript and Java
enabled. See Section 12.1 on page 127.
4 Make sure your computer is in the same subnet as the NWA1121-NI. (If you know that there are
routers between your computer and the NWA1121-NI, skip this step.)
• If there is no DHCP server on your network, make sure your computer’s IP address is in the
same subnet as the NWA1121-NI.
5 Reset the device to its factory defaults, and try to access the NWA1121-NI with the default IP
address. See Chapter 2 on page 20.
6 If the problem continues, contact the network administrator or vendor, or try one of the advanced
suggestions.
Advanced Suggestions
• Try to access the NWA1121-NI using another service, such as Telnet. If you can access the
NWA1121-NI, check the remote management settings to find out why the NWA1121-NI does not
respond to HTTP.
• If your computer is connected wirelessly, use a computer that is connected to a LAN/Ethernet
port.
I can see the Login screen, but I cannot log in to the NWA1121-NI.
1 Make sure you have entered the user name and password correctly. The default password is 1234.
This fields are case-sensitive, so make sure [Caps Lock] is not on.
2 You cannot log in to the web configurator while someone is using the Telnet to access the
NWA1121-NI. Log out of the NWA1121-NI in the other session, or ask the person who is logged in
to log out.
4 If this does not work, you have to reset the device to its factory defaults. See Section 2.2 on page
20.
See the troubleshooting suggestions for I cannot see or access the Login screen in the web
configurator. Ignore the suggestions about your browser.
1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick
Start Guide and Section 12.1 on page 127.
2 2. Make sure your NWA1121-NI is connected to a networking device that provides Internet access.
3 If you are trying to access the Internet wirelessly, make sure the wireless settings on the wireless
client are the same as the settings on the AP.
4 Disconnect all the cables from your device, and follow the directions in the Quick Start Guide again.
I cannot access the Internet anymore. I had access to the Internet (with the NWA1121-NI),
but my Internet connection is not available anymore.
1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick
Start Guide and Section 1.7 on page 17.
1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.7 on page 17.
If the NWA1121-NI is sending or receiving a lot of information, try closing some programs that use
the Internet, especially peer-to-peer applications.
2 Check the signal strength. If the signal is weak, try moving the NWA1121-NI (in wireless client
mode) closer to the AP (if possible), and look around to see if there are any devices that might be
interfering with the wireless network (microwaves, other wireless networks, and so on).
4 If the problem continues, contact the network administrator or vendor, or try one of the advanced
suggestions.
Advanced Suggestions
• Check the settings for QoS. If it is disabled, you might consider activating it.
Note: Your specific NWA1121-NI may not support all of the operating systems described
in this appendix. See the product specifications for more information about which
operating systems are supported.
This appendix shows you how to configure the IP settings on your computer in order for it to be
able to communicate with the other devices on your network. Windows Vista/XP/2000, Mac OS 9/
OS X, and all versions of UNIX/LINUX include the software components you need to use TCP/IP on
your computer.
If you manually assign IP information instead of using a dynamic IP, make sure that your network’s
computers have IP addresses that place them in the same subnet.
Windows XP/NT/2000
The following example uses the default Windows XP display theme but can also apply to Windows
2000 and Windows NT.
4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP
address dynamically.
Select Use the following IP Address and fill in the IP address, Subnet mask, and Default
gateway fields if you have a static IP address that was assigned to you by your network
administrator or ISP. You may also have to enter a Preferred DNS server and an Alternate DNS
server, if that information was provided.
Verifying Settings
1 Click Start > All Programs > Accessories > Command Prompt.
2 In the Command Prompt window, type "ipconfig" and then press [ENTER].
You can also go to Start > Control Panel > Network Connections, right-click a network
connection, click Status and then click the Support tab to view your IP address and connection
information.
Windows Vista
This section shows screens from Windows Vista Professional.
Note: During this procedure, click Continue whenever Windows displays a screen saying
that it needs your permission to continue.
8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP
address dynamically.
Select Use the following IP Address and fill in the IP address, Subnet mask, and Default
gateway fields if you have a static IP address that was assigned to you by your network
administrator or ISP. You may also have to enter a Preferred DNS server and an Alternate DNS
server, if that information was provided.Click Advanced.
Verifying Settings
1 Click Start > All Programs > Accessories > Command Prompt.
2 In the Command Prompt window, type "ipconfig" and then press [ENTER].
You can also go to Start > Control Panel > Network Connections, right-click a network
connection, click Status and then click the Support tab to view your IP address and connection
information.
Windows 7
This section shows screens from Windows 7 Enterprise.
2 In the Control Panel, click View network status and tasks under the Network and Internet
category.
Note: During this procedure, click Continue whenever Windows displays a screen saying
that it needs your permission to continue.
7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP
address dynamically.
Select Use the following IP Address and fill in the IP address, Subnet mask, and Default
gateway fields if you have a static IP address that was assigned to you by your network
administrator or ISP. You may also have to enter a Preferred DNS server and an Alternate DNS
server, if that information was provided. Click Advanced if you want to configure advanced
settings for IP, DNS and WINS.
Verifying Settings
1 Click Start > All Programs > Accessories > Command Prompt.
2 In the Command Prompt window, type "ipconfig" and then press [ENTER].
3 When the Network preferences pane opens, select Built-in Ethernet from the network
connection type list, and then click Configure.
4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP
tab.
Verifying Settings
Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then
selecting the appropriate Network Interface from the Info tab.
3 When the Network preferences pane opens, select Ethernet from the list of available connection
types.
4 From the Configure list, select Using DHCP for dynamically assigned settings.
Verifying Settings
Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then
selecting the appropriate Network interface from the Info tab.
2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By
default, the Unlock button is greyed out until clicked.) You cannot make changes to your
configuration unless you first enter your admin password.
3 In the Authenticate window, enter your admin account name and password then click the
Authenticate button.
4 In the Network Settings window, select the connection that you want to configure, then click
Properties.
• In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP
address.
• In the Configuration list, select Static IP address if you have a static IP address. Fill in the
IP address, Subnet mask, and Gateway address fields.
6 Click OK to save the changes and close the Properties dialog box and return to the Network
Settings screen.
7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window
and then enter the DNS server information in the fields provided.
Verifying Settings
Check your TCP/IP properties by clicking System > Administration > Network Tools, and then
selecting the appropriate Network device from the Devices tab. The Interface Statistics
column shows data if your connection is working properly.
Follow the steps below to configure your computer IP address in the KDE:
2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
3 When the YaST Control Center window opens, select Network Devices and then click the
Network Card icon.
4 When the Network Settings window opens, click the Overview tab, select the appropriate
connection Name from the list, and then click the Configure button.
5 When the Network Card Setup window opens, click the Address tab
Figure 72 openSUSE 10.3: Network Card Setup
7 Click Next to save the changes and close the Network Card Setup window.
8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings
and then enter the DNS server information in the fields provided.
Verifying Settings
Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the
Options sub-menu, select Show Connection Information.
When the Connection Status - KNetwork Manager window opens, click the Statistics tab to
see if your connection is working properly.
Note: The screens used below belong to Internet Explorer version 6, 7 and 8. Screens for
other Internet Explorer versions may vary.
Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow
pop-up blocking and create an exception for your device’s IP address.
1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker.
Figure 75 Pop-up Blocker
You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab.
2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any
web pop-up blockers you may have enabled.
Figure 76 Internet Options: Privacy
1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
3 Type the IP address of your device (the web page that you do not want to have blocked) with the
prefix “http://”. For example, http://192.168.167.1.
JavaScript
If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript
are allowed.
1 In Internet Explorer, click Tools, Internet Options and then the Security tab.
Figure 79 Internet Options: Security
4 Under Active scripting make sure that Enable is selected (the default).
5 Under Scripting of Java applets make sure that Enable is selected (the default).
Java Permissions
1 From Internet Explorer, click Tools, Internet Options and then the Security tab.
JAVA (Sun)
1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab.
2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected.
Mozilla Firefox
Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps
below apply to Mozilla Firefox 3.0 as well.
You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the
screen that appears.
Click Content to show the screen below. Select the check boxes as shown in the following screen.
Opera
Opera 10 screens are used here. Screens for other versions may vary slightly.
Allowing Pop-Ups
From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer
to handle pop-ups and select Open all pop-ups.
Enabling Java
From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the left-
side menu. Select the check boxes as shown in the following screen.
Subnet masks determine the maximum number of possible hosts on a network. You can also use
subnet masks to divide one network into multiple sub-networks.
Introduction to IP Addresses
One part of the IP address is the network number, and the other part is the host ID. In the same
way that houses on a street share a common street name, the hosts on a network share a common
network number. Similarly, as each house has its own house number, each host on the network has
its own unique identifying number - the host ID. Routers use the network number to send packets
to the correct network, while the host ID determines to which host on the network the packets are
delivered.
Structure
An IP address is made up of four parts, written in dotted decimal notation (for example,
192.168.1.1). Each of these four parts is known as an octet. An octet is an eight-digit binary
number (for example 11000000, which is 192 in decimal notation).
Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in
decimal.
The following figure shows an example IP address in which the first three octets (192.168.1) are
the network number, and the fourth octet (16) is the host ID.
How much of the IP address is the network number and how much is the host ID varies according
to the subnet mask.
Subnet Masks
A subnet mask is used to determine which bits are part of the network number, and which bits are
part of the host ID (using a logical AND operation). The term “subnet” is short for “sub-network”.
A subnet mask has 32 bits. If a bit in the subnet mask is a “1” then the corresponding bit in the IP
address is part of the network number. If a bit in the subnet mask is “0” then the corresponding bit
in the IP address is part of the host ID.
The following example shows a subnet mask identifying the network number (in bold text) and host
ID of an IP address (192.168.1.2 in decimal).
By convention, subnet masks always consist of a continuous sequence of ones beginning from the
leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
Subnet masks can be referred to by the size of the network number part (the bits with a “1” value).
For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24
bits are zeroes.
Subnet masks are expressed in dotted decimal notation just like IP addresses. The following
examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks.
Network Size
The size of the network number determines the maximum number of possible hosts you can have
on your network. The larger the number of network number bits, the smaller the number of
remaining host ID bits.
An IP address with host IDs of all zeros is the IP address of the network (192.168.1.0 with a 24-bit
subnet mask, for example). An IP address with host IDs of all ones is the broadcast address for that
network (192.168.1.255 with a 24-bit subnet mask, for example).
As these two IP addresses cannot be used for individual hosts, calculate the maximum number of
possible hosts in a network as follows:
Notation
Since the mask is always a continuous number of ones beginning from the left, followed by a
continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the
number of ones instead of writing the value of each octet. This is usually specified by writing a “/”
followed by the number of bits in the mask after the address.
For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128.
The following table shows some possible subnet masks using both notations.
Subnetting
You can use subnetting to divide one network into multiple sub-networks. In the following example
a network administrator creates two sub-networks to isolate a group of servers from the rest of the
company network for security reasons.
In this example, the company network address is 192.168.1.0. The first three octets of the address
(192.168.1) are the network number, and the remaining octet is the host ID, allowing a maximum
of 28 – 2 or 254 possible hosts.
You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-
networks. The subnet mask is now 25 bits (255.255.255.128 or /25).
The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25
and 192.168.1.128 /25.
The following figure shows the company network after subnetting. There are now two sub-
networks, A and B.
In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126
possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s
broadcast address).
192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask
255.255.255.128 is its broadcast address. Therefore, the lowest IP address that can be assigned to
an actual host for subnet A is 192.168.1.1 and the highest is 192.168.1.126.
Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all
zeroes is the subnet itself, all ones is the subnet’s broadcast address).
Table 45 Subnet 1
LAST OCTET BIT
IP/SUBNET MASK NETWORK NUMBER VALUE
IP Address (Decimal) 192.168.1. 0
IP Address (Binary) 11000000.10101000.00000001. 00000000
Subnet Mask (Binary) 11111111.11111111.11111111. 11000000
Table 46 Subnet 2
LAST OCTET BIT
IP/SUBNET MASK NETWORK NUMBER VALUE
IP Address 192.168.1. 64
IP Address (Binary) 11000000.10101000.00000001. 01000000
Subnet Mask (Binary) 11111111.11111111.11111111. 11000000
Subnet Address: Lowest Host ID: 192.168.1.65
192.168.1.64
Broadcast Address: Highest Host ID: 192.168.1.126
192.168.1.127
Table 47 Subnet 3
LAST OCTET BIT
IP/SUBNET MASK NETWORK NUMBER VALUE
IP Address 192.168.1. 128
IP Address (Binary) 11000000.10101000.00000001. 10000000
Subnet Mask (Binary) 11111111.11111111.11111111. 11000000
Subnet Address: Lowest Host ID: 192.168.1.129
192.168.1.128
Broadcast Address: Highest Host ID: 192.168.1.190
192.168.1.191
Table 48 Subnet 4
LAST OCTET BIT
IP/SUBNET MASK NETWORK NUMBER VALUE
IP Address 192.168.1. 192
IP Address (Binary) 11000000.10101000.00000001. 11000000
Subnet Mask (Binary) 11111111.11111111.11111111. 11000000
Subnet Address: Lowest Host ID: 192.168.1.193
192.168.1.192
Broadcast Address: Highest Host ID: 192.168.1.254
192.168.1.255
The following table shows IP address last octet values for each subnet.
Subnet Planning
The following table is a summary for subnet planning on a network with a 24-bit network number.
The following table is a summary for subnet planning on a network with a 16-bit network number.
Configuring IP Addresses
Where you obtain your network number depends on your particular situation. If the ISP or your
network administrator assigns you a block of registered IP addresses, follow their instructions in
selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single user
account and the ISP will assign you a dynamic IP address when the connection is established. If this
is the case, it is recommended that you select a network number from 192.168.0.0 to
192.168.255.0. The Internet Assigned Number Authority (IANA) reserved this block of addresses
specifically for private use; please do not use any other number unless you are told otherwise. You
must also enable Network Address Translation (NAT) on the NWA1121-NI.
Once you have decided on the network number, pick an IP address for your NWA1121-NI that is
easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network
is using that IP address.
The subnet mask specifies the network number portion of an IP address. Your NWA1121-NI will
compute the subnet mask automatically based on the IP address that you entered. You don't need
to change the subnet mask computed by the NWA1121-NI unless you are instructed to do
otherwise.
Private IP Addresses
Every machine on the Internet must have a unique address. If your networks are isolated from the
Internet (running only between two branch offices, for example) you can assign any IP addresses to
the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has
reserved the following three blocks of IP addresses specifically for private networks:
• 10.0.0.0 — 10.255.255.255
• 172.16.0.0 — 172.31.255.255
• 192.168.0.0 — 192.168.255.255
You can obtain your IP address from the IANA, from an ISP, or it can be assigned from a private
network. If you belong to a small organization and your Internet access is through an ISP, the ISP
can provide you with the Internet addresses for your local networks. On the other hand, if you are
part of a much larger organization, you should consult your network administrator for the
appropriate IP addresses.
Regardless of your particular situation, do not create an arbitrary IP address; always follow the
guidelines above. For more information on address assignment, please refer to RFC 1597, Address
Allocation for Private Internets and RFC 1466, Guidelines for Management of IP Address Space.
BSS
A Basic Service Set (BSS) exists when all communications between wireless clients or between a
wireless client and a wired network client go through one access point (AP).
Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless
client A and B can access the wired network and communicate with each other. When Intra-BSS is
disabled, wireless client A and B can still access the wired network but cannot communicate with
each other.
ESS
An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access
point, with each access point connected together by a wired network. This wired connection
between APs is called a Distribution System (DS).
This type of wireless LAN topology is called an Infrastructure WLAN. The Access Points not only
provide communication with the wired network but also mediate wireless network traffic in the
immediate neighborhood.
An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated
wireless clients within the same ESS must have the same ESSID in order to communicate.
Channel
A channel is the radio frequency(ies) used by wireless devices to transmit and receive data.
Channels available depend on your geographical area. You may have a choice of channels (for your
region) so you should use a channel different from an adjacent AP (access point) to reduce
interference. Interference occurs when radio signals from different access points overlap causing
interference and degrading performance.
Adjacent channels partially overlap however. To avoid interference due to overlap, your AP should
be on a channel at least five channels away from a channel that an adjacent AP is using. For
example, if your region has 11 channels and an adjacent AP is using channel 1, then you need to
select a channel between 6 or 11.
RTS/CTS
A hidden node occurs when two stations are within range of the same access point, but are not
within range of each other. The following figure illustrates a hidden node. Both stations (STA) are
within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they
cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore,
they are considered hidden from each other.
Figure 94 RTS/CTS
When station A sends data to the AP, it might not know that the station B is already using the
channel. If these two stations send data at the same time, collisions may occur when both sets of
data arrive at the AP at the same time, resulting in a loss of messages for both stations.
RTS/CTS is designed to prevent collisions due to hidden nodes. An RTS/CTS defines the biggest
size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send) handshake is
invoked.
When a data frame exceeds the RTS/CTS value you set (between 0 to 2432 bytes), the station
that wants to transmit this frame must first send an RTS (Request To Send) message to the AP for
permission to send it. The AP then responds with a CTS (Clear to Send) message to all other
stations within its range to notify them to defer their transmission. It also reserves and confirms
with the requesting station the time frame for the requested transmission.
Stations can send frames smaller than the specified RTS/CTS directly to the AP without the RTS
(Request To Send)/CTS (Clear to Send) handshake.
You should only configure RTS/CTS if the possibility of hidden nodes exists on your network and
the "cost" of resending large frames is more than the extra network overhead involved in the RTS
(Request To Send)/CTS (Clear to Send) handshake.
If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the
RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be
fragmented before they reach RTS/CTS size.
Note: Enabling the RTS Threshold causes redundant network overhead that could
negatively affect the throughput performance instead of providing a remedy.
Fragmentation Threshold
A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes)
that can be sent in the wireless network before the AP will fragment the packet into smaller data
frames.
A large Fragmentation Threshold is recommended for networks not prone to interference while
you should set a smaller threshold for busy networks or networks that are prone to interference.
If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you
set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames
will be fragmented before they reach RTS/CTS size.
Preamble Type
Preamble is used to signal that data is coming to the receiver. Short and long refer to the length of
the synchronization field in a packet.
Short preamble increases performance as less time sending preamble means more time for sending
data. All IEEE 802.11 compliant wireless adapters support long preamble, but not all support short
preamble.
Use long preamble if you are unsure what preamble mode other wireless devices on the network
support, and to provide more reliable communications in busy wireless networks.
Use short preamble if you are sure all wireless devices on the network support it, and to provide
more efficient communications.
Use the dynamic setting to automatically use short preamble when all wireless devices on the
network support it, otherwise the NWA1121-NI uses long preamble.
Note: The wireless devices MUST use the same preamble mode in order to communicate.
Wireless security methods available on the NWA1121-NI are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the NWA1121-NI identity.
The following figure shows the relative effectiveness of these wireless security methods available on
your NWA1121-NI.
Most Secure
Note: You must enable the same wireless security settings on the NWA1121-NI and on all
wireless clients that you want to associate with it.
IEEE 802.1x
In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to
support extended authentication as well as providing additional accounting and control features. It
is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x
are:
RADIUS
RADIUS is based on a client-server model that supports authentication, authorization and
accounting. The access point is the client and the server is the RADIUS server. The RADIUS server
handles the following tasks:
• Authentication
Determines the identity of the users.
• Authorization
Determines the network services available to authenticated users once they are connected to the
network.
• Accounting
Keeps track of the client’s network activity.
RADIUS is a simple package exchange in which your AP acts as a message relay between the
wireless client and the network RADIUS server.
• Access-Request
Sent by an access point requesting authentication.
• Access-Reject
Sent by a RADIUS server rejecting access.
• Access-Accept
Sent by a RADIUS server allowing access.
• Access-Challenge
Sent by a RADIUS server requesting more information in order to allow access. The access point
sends a proper response from the user and then sends another Access-Request message.
The following types of RADIUS messages are exchanged between the access point and the RADIUS
server for user accounting:
• Accounting-Request
Sent by the access point requesting accounting.
• Accounting-Response
Sent by the RADIUS server to indicate that it has started or stopped accounting.
In order to ensure network security, the access point and the RADIUS server use a shared secret
key, which is a password, they both know. The key is not sent over the network. In addition to the
shared key, password information exchanged is also encrypted to protect the network from
unauthorized access.
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE
802.1x transport mechanism in order to support multiple types of user authentication. By using EAP
to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a
RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that
supports IEEE 802.1x. .
For EAP-TLS authentication type, you must first have a wired connection to the network and obtain
the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs) can be used
to authenticate users and a CA issues certificates and guarantees the identity of each certificate
owner.
However, MD5 authentication has some weaknesses. Since the authentication server needs to get
the plaintext passwords, the passwords must be stored. Thus someone other than the
authentication server may access the password file. In addition, it is possible to impersonate an
authentication server as MD5 authentication method does not perform mutual authentication.
Finally, MD5 authentication method does not support data encryption with dynamic session key. You
must configure WEP encryption keys for data encryption.
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x.
If this feature is enabled, it is not necessary to configure a default encryption key in the wireless
security configuration screen. You may still configure and store keys, but they will not be used while
dynamic WEP is enabled.
For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic
keys for data encryption. They are often deployed in corporate environments, but for public
deployment, a simple user name and password pair is more practical. The following table is a
comparison of the features of authentication types.
Key differences between WPA or WPA2 and WEP are improved data encryption and user
authentication.
If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use
WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use
WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical) password entered into
each access point, wireless gateway and wireless client. As long as the passwords match, a wireless
client will be granted access to a WLAN.
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on
whether you have an external RADIUS server or not.
Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less
secure than WPA or WPA2.
Encryption
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity
Check (MIC) and IEEE 802.1x. WPA2 also uses TKIP when required for compatibility reasons, but
offers stronger encryption than TKIP with Advanced Encryption Standard (AES) in the Counter
mode with Cipher block chaining Message authentication code Protocol (CCMP).
TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server.
AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit mathematical algorithm
called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check
(MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying
mechanism.
WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is
never used twice.
The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key
hierarchy and management system, using the PMK to dynamically generate unique data encryption
keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless
clients. This all happens in the background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets,
altering them and resending them. The MIC provides a strong mathematical function in which the
receiver and the transmitter each compute and then compare the MIC. If they do not match, it is
assumed that the data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating an integrity
checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi
network than WEP and difficult for an intruder to break into the network.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference
between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific
credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force
password-guessing attacks but it’s still an improvement over WEP as it employs a consistent,
single, alphanumeric password to derive a PMK which is used to generate unique temporal
encryption keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of
WEP)
User Authentication
WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate
wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange
messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a
network. Other WPA2 authentication features that are different from WPA include key caching and
pre-authentication. These two features are optional and may not be supported in all wireless
devices.
Key caching allows a wireless client to store the PMK it derived through a successful authentication
with an AP. The wireless client uses the PMK when it tries to connect to the same AP and does not
need to go with the authentication process again.
Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an
AP) to perform IEEE 802.1x authentication with another AP before connecting to it.
The Windows XP patch is a free download that adds WPA capability to Windows XP's built-in "Zero
Configuration" wireless client. However, you must run Windows XP to use it.
1 The AP passes the wireless client's authentication request to the RADIUS server.
2 The RADIUS server then checks the user's identification against its database and grants or denies
network access accordingly.
3 A 256-bit Pairwise Master Key (PMK) is derived from the authentication process by the RADIUS
server and the client.
4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and
management system, using the PMK to dynamically generate unique data encryption keys. The
keys are used to encrypt every data packet that is wirelessly communicated between the AP and
the wireless clients.
Figure 95 WPA(2) with RADIUS Application Example
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must
consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and
symbols).
2 The AP checks each wireless client's password and allows it to join the network only if the password
matches.
3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not
sent over the network, but is derived from the PSK and the SSID.
4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information
exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data
exchanged between them.
Figure 96 WPA(2)-PSK Authentication
Antenna Overview
An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to
the antenna, which propagates the signal through the air. The antenna also operates in reverse by
capturing RF signals from the air.
Positioning the antennas properly increases the range and coverage area of a wireless LAN.
Antenna Characteristics
Frequency
An antenna in the frequency of 2.4GHz or 5GHz is needed to communicate efficiently in a wireless
LAN
Radiation Pattern
A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage
area.
Antenna Gain
Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width.
Higher antenna gain improves the range of the signal for better communications.
For an indoor site, each 1 dB increase in antenna gain results in a range increase of approximately
2.5%. For an unobstructed outdoor site, each 1dB increase in gain results in a range increase of
approximately 5%. Actual results may vary depending on the network environment.
Antenna gain is sometimes specified in dBi, which is how much the antenna increases the signal
power compared to using an isotropic antenna. An isotropic antenna is a theoretical perfect antenna
that sends out radio signals equally well in all directions. dBi represents the true gain that the
antenna provides.
• Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The
coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room
environment. With a wide coverage area, it is possible to make circular overlapping coverage
areas with multiple access points.
• Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light
from its bulb. The angle of the beam determines the width of the coverage pattern. Angles
typically range from 20 degrees (very directional) to 120 degrees (less directional). Directional
antennas are ideal for hallways and outdoor point-to-point applications.
Positioning Antennas
In general, antennas should be mounted as high as practically possible and free of obstructions. In
point-to–point application, position both antennas at the same height and in a direct line of sight to
each other to attain the best performance.
For omni-directional antennas mounted on a table, desk, and so on, point the antenna up. For
omni-directional antennas mounted on a wall or ceiling, point the antenna down. For a single AP
application, place omni-directional antennas as close to the center of the coverage area as possible.
For directional antennas, point the antenna in the direction of the desired coverage area.
Copyright
Copyright © 2012 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise,
without the prior written permission of ZyXEL Communications Corporation.
Disclaimers
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the patent
rights of others. ZyXEL further reserves the right to make changes in any products described herein
without notice. This publication is subject to change without notice.
Your use of the NWA1121-NI is subject to the terms and conditions of any related service providers.
Trademarks
Trademarks mentioned in this publication are used for identification purposes only and may be
properties of their respective owners.
Certifications
This device has been tested and found to comply with the limits for a Class B digital device pursuant
to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against
harmful interference in a residential installation. This device generates, uses, and can radiate radio
frequency energy, and if not installed and used in accordance with the instructions, may cause
harmful interference to radio communications. However, there is no guarantee that interference will
not occur in a particular installation.
If this device does cause harmful interference to radio/television reception, which can be
determined by turning the device off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
3 Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment.
2) this device must accept any interference, including interference that may cause undesired
operation of the device
This device has been designed to operate with an antenna having a maximum gain of 3dBi.
Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required
antenna impedance is 50 ohms.
To reduce potential radio interference to other users, the antenna type and its gain should be so
chosen that the EIRP is not more than required for successful communication.
注意 !
依據 低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用
者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現
有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。
前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍
受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
Notices
Changes or modifications not expressly approved by the party responsible for compliance could
void the user's authority to operate the equipment.
This device is designed for the WLAN 2.4 GHz and/or 5 GHz networks throughout the EC region and
Switzerland, with restrictions in France.
Ce produit est conçu pour les bandes de fréquences 2,4 GHz et/ou 5 GHz conformément à la
législation Européenne. En France métropolitaine, suivant les décisions n°03-908 et 03-909 de
l’ARCEP, la puissance d’émission ne devra pas dépasser 10 mW (10 dB) dans le cadre d’une
installation WiFi en extérieur pour les fréquences comprises entre 2454 MHz et 2483,5 MHz.
Viewing Certifications
Go to http://www.zyxel.com to view this product’s documentation and certifications.
components without charge for either parts or labor, and to whatever extent it shall deem
necessary to restore the product or components to proper operating condition. Any replacement
will consist of a new or re-manufactured functionally equivalent product of equal or higher value,
and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been
modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working
conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser.
This warranty is in lieu of all other warranties, express or implied, including any implied warranty of
merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for
indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact your vendor. You may also refer to the warranty
policy for the region in which you bought the device at http://www.zyxel.com/web/
support_warranty_info.php.
Registration
Register your product online to receive e-mail notices of firmware upgrades and information at
www.zyxel.com.
Regulatory Information
European Union
The following information applies if you use the product within the European Union.
[Czech] ZyXEL tímto prohlašuje, že tento zařízení je ve shodě se základními požadavky a dalšími
příslušnými ustanoveními směrnice 1999/5/EC.
[Danish] Undertegnede ZyXEL erklærer herved, at følgende udstyr udstyr overholder de væsentlige
krav og øvrige relevante krav i direktiv 1999/5/EF.
[German] Hiermit erklärt ZyXEL, dass sich das Gerät Ausstattung in Übereinstimmung mit den
grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie
1999/5/EU befindet.
[Estonian] Käesolevaga kinnitab ZyXEL seadme seadmed vastavust direktiivi 1999/5/EÜ põhinõuetele
ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele.
English Hereby, ZyXEL declares that this equipment is in compliance with the essential
requirements and other relevant provisions of Directive 1999/5/EC.
[Spanish] Por medio de la presente ZyXEL declara que el equipo cumple con los requisitos esenciales
y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE.
[Greek] ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ ZyXEL ΔΗΛΩΝΕΙ ΟΤΙ εξοπλισμός ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ
ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕC.
[French] Par la présente ZyXEL déclare que l'appareil équipements est conforme aux exigences
essentielles et aux autres dispositions pertinentes de la directive 1999/5/EC.
[Italian] Con la presente ZyXEL dichiara che questo attrezzatura è conforme ai requisiti essenziali ed
alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
[Latvian] Ar šo ZyXEL deklarē, ka iekārtas atbilst Direktīvas 1999/5/EK būtiskajām prasībām un
citiem ar to saistītajiem noteikumiem.
[Lithuanian] Šiuo ZyXEL deklaruoja, kad šis įranga atitinka esminius reikalavimus ir kitas 1999/5/EB
Direktyvos nuostatas.
[Dutch] Hierbij verklaart ZyXEL dat het toestel uitrusting in overeenstemming is met de essentiële
eisen en de andere relevante bepalingen van richtlijn 1999/5/EC.
[Maltese] Hawnhekk, ZyXEL, jiddikjara li dan tagħmir jikkonforma mal-ħtiġijiet essenzjali u ma
provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
[Hungarian] Alulírott, ZyXEL nyilatkozom, hogy a berendezés megfelel a vonatkozó alapvetõ
követelményeknek és az 1999/5/EK irányelv egyéb elõírásainak.
[Polish] Niniejszym ZyXEL oświadcza, że sprzęt jest zgodny z zasadniczymi wymogami oraz
pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
[Portuguese] ZyXEL declara que este equipamento está conforme com os requisitos essenciais e outras
disposições da Directiva 1999/5/EC.
[Slovenian] ZyXEL izjavlja, da je ta oprema v skladu z bistvenimi zahtevami in ostalimi relevantnimi
določili direktive 1999/5/EC.
[Slovak] ZyXEL týmto vyhlasuje, že zariadenia spĺňa základné požiadavky a všetky príslušné
ustanovenia Smernice 1999/5/EC.
[Finnish] ZyXEL vakuuttaa täten että laitteet tyyppinen laite on direktiivin 1999/5/EY oleellisten
vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.
[Swedish] Härmed intygar ZyXEL att denna utrustning står I överensstämmelse med de väsentliga
egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EC.
[Bulgarian] С настоящото ZyXEL декларира, че това оборудване е в съответствие със съществените
изисквания и другите приложими разпоредбите на Директива 1999/5/ЕC.
[Icelandic] Hér með lýsir, ZyXEL því yfir að þessi búnaður er í samræmi við grunnkröfur og önnur
viðeigandi ákvæði tilskipunar 1999/5/EC.
[Norwegian] Erklærer herved ZyXEL at dette utstyret er I samsvar med de grunnleggende kravene og
andre relevante bestemmelser I direktiv 1999/5/EF.
[Romanian] Prin prezenta, ZyXEL declară că acest echipament este în conformitate cu cerinţele
esenţiale şi alte prevederi relevante ale Directivei 1999/5/EC.
National Restrictions
This product may be used in all EU countries (and other countries following the EU directive 1999/
5/EC) without any limitation except for the countries mentioned below:
Ce produit peut être utilisé dans tous les pays de l’UE (et dans tous les pays ayant transposés la
directive 1999/5/CE) sans aucune limitation, excepté pour les pays mentionnés ci-dessous:
Questo prodotto è utilizzabile in tutte i paesi EU (ed in tutti gli altri paesi che seguono le direttive EU
1999/5/EC) senza nessuna limitazione, eccetto per i paesii menzionati di seguito:
Das Produkt kann in allen EU Staaten ohne Einschränkungen eingesetzt werden (sowie in anderen
Staaten die der EU Direktive 1995/5/CE folgen) mit Außnahme der folgenden aufgeführten
Staaten:
In the majority of the EU and other European countries, the 2, 4- and 5-GHz bands have been
made available for the use of wireless local area networks (LANs). Later in this document you will
find an overview of countries inwhich additional restrictions or requirements or both are applicable.
The requirements for any country may evolve. ZyXEL recommends that you check with the local
authorities for the latest status of their national regulations for both the 2,4- and 5-GHz wireless
LANs.
The following countries have restrictions and/or requirements in addition to those given in the table
labeled “Overview of Regulatory Requirements for Wireless LANs”:.
Belgium
The Belgian Institute for Postal Services and Telecommunications (BIPT) must be notified of any
outdoor wireless link having a range exceeding 300 meters. Please check http://www.bipt.be for
more details.
Draadloze verbindingen voor buitengebruik en met een reikwijdte van meer dan 300 meter dienen
aangemeld te worden bij het Belgisch Instituut voor postdiensten en telecommunicatie (BIPT). Zie
http://www.bipt.be voor meer gegevens.
Les liaisons sans fil pour une utilisation en extérieur d’une distance supérieure à 300 mètres
doivent être notifiées à l’Institut Belge des services Postaux et des Télécommunications (IBPT).
Visitez http://www.ibpt.be pour de plus amples détails.
Denmark
In Denmark, the band 5150 - 5350 MHz is also allowed for outdoor usage.
France
For 2.4 GHz, the output power is restricted to 10 mW EIRP when the product is used outdoors in the
band 2454 - 2483.5 MHz. There are no restrictions when used indoors or in other parts of the 2.4
GHz band. Check http://www.arcep.fr/ for more details.
Pour la bande 2.4 GHz, la puissance est limitée à 10 mW en p.i.r.e. pour les équipements utilisés en
extérieur dans la bande 2454 - 2483.5 MHz. Il n'y a pas de restrictions pour des utilisations en
intérieur ou dans d'autres parties de la bande 2.4 GHz. Consultez http://www.arcep.fr/ pour de plus
amples détails.
R&TTE 1999/5/EC
WLAN 2.4 – 2.4835 GHz
IEEE 802.11 b/g/n
Location Frequency Range(GHz) Power (EIRP)
Indoor (No restrictions) 2.4 – 2.4835 100mW (20dBm)
Outdoor 2.4 – 2.454 100mW (20dBm)
2.454 – 2.4835 10mW (10dBm)
Italy
This product meets the National Radio Interface and the requirements specified in the National
Frequency Allocation Table for Italy. Unless this wireless LAN product is operating within the
boundaries of the owner's property, its use requires a “general authorization.” Please check http://
www.sviluppoeconomico.gov.it/ for more details.
Questo prodotto è conforme alla specifiche di Interfaccia Radio Nazionali e rispetta il Piano
Nazionale di ripartizione delle frequenze in Italia. Se non viene installato all 'interno del proprio
fondo, l'utilizzo di prodotti Wireless LAN richiede una “Autorizzazione Generale”. Consultare http://
www.sviluppoeconomico.gov.it/ per maggiori dettagli.
Latvia
The outdoor usage of the 2.4 GHz band requires an authorization from the Electronic
Communications Office. Please check http://www.esd.lv for more details.
2.4 GHz frekvenèu joslas izmantoðanai ârpus telpâm nepiecieðama atïauja no Elektronisko sakaru
direkcijas. Vairâk informâcijas: http://www.esd.lv.
Notes:
1. Although Norway, Switzerland and Liechtenstein are not EU member states, the EU Directive
1999/5/EC has also been implemented in those countries.
2. The regulatory limits for maximum output power are specified in EIRP. The EIRP level (in dBm) of
a device can be calculated by adding the gain of the antenna used(specified in dBi) to the output
power available at the connector (specified in dBm).
Safety Warnings
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock
from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage
points or other risks. ONLY qualified service personnel should service or disassemble this device. Please
contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for
example, 110V AC in North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can
walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of
electric shock from lightning.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Antenna Warning! This device meets ETSI and FCC certification requirements when using the included
antenna(s). Only use the included antenna(s).
• If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged.
• The PoE (Power over Ethernet) devices that supply or receive power and their connected Ethernet cables
must all be completely indoors.
• This product is for indoor use only (utilisation intérieure exclusivement).
Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste
Electronics and Electrical Equipment. It means that used electrical and electronic products should not
be mixed with general waste. Used electrical and electronic equipment should be treated separately.
Index
802.1x-Only 58
802.1x-Static128 58 C
802.1x-Static64 58
CA 186
Certificate
authentication 104
A
file format 104
Certificate Authority
access privileges 12
See CA.
Accounting Server 88
Certificates
Advanced Encryption Standard
Fingerprint 112
See AES.
MD5 112
AES 187 public key 104
Alerts 116 SHA1 112
Alternative subnet mask notation 174 Certification Authority 112
Antenna 92 certifications 193
antenna notices 195
directional 191 viewing 195
gain 191 Channel 56
omni-directional 191 channel 181
AP (access point) 181 interference 181
Applications Controlling network access, Ways of 11
Access Point 14 copyright 193
AP + Bridge 14
CTS (Clear to Send) 182
applications
MBSSID 11
Repeater 14
ATC 73 D
ATC+WMM 73
disclaimer 193
Distribution System 56
DNS 97, 119
B
documentation
related 2
Basic Service Set 56
Domain Name Server (DNS) 119
see BSS
DS 56
Basic Service Set, See BSS 179
DTIM Interval 63, 65, 70
beacon 56
dynamic WEP key exchange 186
Beacon Interval 63, 65, 70
G
Generic Token Card 59 L
GTC 59
Guide LEAP 59
Quick Start 2 LEDs 17, 127
Blinking 17
Flashing 17
Off 17
H Lightweight Extensible Authentication Protocol 59
Log 49
hidden node 181
Log Screens 115
Logs
accessing logs 115
I receiving logs via e-mail 116
Logs Screen
IANA 178 Mail Server 117
IBSS 179 Mail Subject 117
Send Log to 117