ZyAIR Access Point Series User’s Guide

 

List of Figures

Figure 1-1 PoE Installation Example .............................................................................................................

1-3

Figure 1-2 WDS Functionality Example........................................................................................................

1-5

Figure 1-3 Internet Access Application..........................................................................................................

1-7

Figure 1-4 Corporation Network Application ................................................................................................

1-7

Figure 2-1 Change Password Screen..............................................................................................................

2-1

Figure 2-2 The MAIN MENU Screen of the Web Configurator....................................................................

2-3

Figure 3-1 Wizard 1 : General Setup..............................................................................................................

3-2

Figure 3-2 Wizard 2 : Wireless LAN Setup ...................................................................................................

3-4

Figure 3-3 Wizard 3 : IP Address Assignment ...............................................................................................

3-7

Figure 4-1 System General Setup ..................................................................................................................

4-1

Figure 4-2 Password.......................................................................................................................................

4-3

Figure 4-3 Time Setting .................................................................................................................................

4-4

Figure 5-1 IBSS (Ad-hoc) Wireless LAN ......................................................................................................

5-1

Figure 5-2 Basic Service set...........................................................................................................................

5-2

Figure 5-3 Extended Service Set....................................................................................................................

5-3

Figure 5-4 RTS/CTS ......................................................................................................................................

5-4

Figure 5-5 Wireless ........................................................................................................................................

5-5

Figure 5-6 Bridging Example.........................................................................................................................

5-7

Figure 5-7 Bridge Loop: Two Bridges Connected to Hub .............................................................................

5-7

Figure 5-8 Bridge Loop: Bridge Connected to Wired LAN...........................................................................

5-8

Figure 5-9 Wireless : Bridge ..........................................................................................................................

5-9

Figure 5-10 Roaming Example ....................................................................................................................

5-10

Figure 5-11 Roaming ....................................................................................................................................

5-11

Figure 6-1 ZyAIR Wireless Security Levels ..................................................................................................

6-1

Figure 6-2 WEP Authentication Steps............................................................................................................

6-2

Figure 6-3 Wireless ........................................................................................................................................

6-3

Figure 6-4 MAC Address Filter .....................................................................................................................

6-6

Figure 6-5 EAP Authentication ......................................................................................................................

6-9

Figure 6-6 802.1x Authentication ................................................................................................................

6-10

Figure 6-7 Local User Database...................................................................................................................

6-13

Figure 6-8 RADIUS.....................................................................................................................................

6-14

Figure 7-1 Multi-ESS Example......................................................................................................................

7-2

Figure 7-2 Multi-ESS with VLAN Example..................................................................................................

7-3

Figure 7-3 Wireless : Multiple ESS ...............................................................................................................

7-4

Figure 7-4 Wireless : Edit ESS.......................................................................................................................

7-6

Figure 7-5 MAC Filter Summary...................................................................................................................

7-8

Figure 7-6 VLAN...........................................................................................................................................

7-9

Figure 8-1 IP Setup ........................................................................................................................................

8-2

Figure 9-1 View Log ......................................................................................................................................

9-1

List of Figures

xi