Chapter 1 Introducing the NWA

clients and the wired LAN. Clients A and B access the AP and the wired network behind the AP throught repeaters Z and Y.

Figure 5 Repeater Application

When the NWA is in Repeater mode, repeater security between the NWA and other repeater is independent of the security between the wireless clients and the AP or repeater. If you do not enable repeater security, traffic between APs is not encrypted. When repeater security is enabled, both APs and repeaters must use the same pre-shared key. See Section 6.6 on page 73 for more details.

Once the security settings of peer sides match one another, the connection between devices is made.

At the time of writing, repeater security is compatible with the NWA only.

1.3 Ways to Manage the NWA

Use any of the following methods to manage the NWA.

Web Configurator. This is recommended for everyday management of the NWA using a (supported) web browser.

FTP (File Transfer Protocol) for firmware upgrades and configuration backup and restore.

SNMP (Simple Network Management Protocol). The device can be monitored by an SNMP manager.

 

15

NWA1120 Series User’s Guide