List of Figures
Figure 39 Tutorial: MAC Filter Edit (SERVER_1) ...................................................................................
72
Figure 40 Tutorial: SSID Profiles Activated ............................................................................................
73
Figure 41 Tutorial: SSID Tab Correct Settings ........................................................................................
Figure 42 System > General ..................................................................................................................
77
Figure 43 SYSTEM > Password. ............................................................................................................
79
Figure 44 SYSTEM > Time Setting ........................................................................................................
80
Figure 45 Basic Service set ....................................................................................................................
83
Figure 46 Extended Service Set .............................................................................................................
84
Figure 47 DiffServ: Differentiated Service Field ......................................................................................
87
Figure 48 Wireless: Access Point ...........................................................................................................
91
Figure 49 Bridging Example ...................................................................................................................
93
Figure 50 Bridge Loop: Two Bridges Connected to Hub ........................................................................
Figure 51 Bridge Loop: Bridge Connected to Wired LAN .......................................................................
94
Figure 52 Wireless: Bridge/Repeater .....................................................................................................
Figure 53 Wireless: AP+Bridge ..............................................................................................................
97
Figure 54 EAP Authentication ..............................................................................................................
100
Figure 55 WPA(2)-PSK Authentication .................................................................................................
102
Figure 56 WPA(2) with RADIUS Application Example .........................................................................
103
Figure 57 Wireless > Security ...............................................................................................................
105
Figure 58 WIRELESS > Security: WEP ................................................................................................
106
Figure 59 Security: 802.1x Only ..........................................................................................................
107
Figure 60 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ............................................................
108
Figure 61 Security: WPA .....................................................................................................................
109
Figure 62 Security:WPA2 or WPA2-MIX ................................................................................................
110
Figure 63 Security: WPA-PSK,WPA2-PSK or WPA2-PSK-MIX ............................................................
111
Figure 64 RADIUS .................................................................................................................................
112
Figure 65 Multiple BSS with VLAN Example .........................................................................................
116
Figure 66 Wireless: Multiple BSS ..........................................................................................................
Figure 67 SSID ......................................................................................................................................
119
Figure 68 Configuring SSID ..................................................................................................................
120
Figure 69 Layer-2 Isolation Application ................................................................................................
124
Figure 70 WIRELESS > Layer 2 Isolation ............................................................................................
125
Figure 71 WIRELESS > Layer-2 Isolation Configuration Screen .........................................................
126
Figure 72 Layer-2 Isolation Example Configuration .............................................................................
127
Figure 73 Layer-2 Isolation Example 1 .................................................................................................
Figure 74 Layer-2 Isolation Example 2 .................................................................................................
128
Figure 75 WIRELESS > MAC Filter ......................................................................................................
Figure 76 MAC Address Filter ..............................................................................................................
129
Figure 77 Roaming Example ................................................................................................................
131
Figure 78 Roaming ...............................................................................................................................
132
Figure 79 IP Setup ................................................................................................................................
134
Figure 80 Rogue AP: Example ............................................................................................................
136
Figure 81 “Honeypot” Attack .................................................................................................................
137
22
ZyXEL NWA-3160 Series User’s Guide