Table of Contents
Chapter 3
LAN Screen..............................................................................................................................
35
3.1 LAN and WAN .....................................................................................................................
3.2
IP Address and Subnet Mask ..............................................................................................
3.2.1 Private IP Addresses ..................................................................................................
36
3.2.2 Management IP Addresses ........................................................................................
3.3 VLAN ...................................................................................................................................
37
3.3.1 VLAN Tagging ............................................................................................................
3.3.2 VLAN Application Example ........................................................................................
3.4
LAN ......................................................................................................................................
38
Chapter 4
Centralized Configuration ......................................................................................................
41
4.1
Introduction to Centralized Configuration ............................................................................
4.2 SSH ...................................................................................................................................
4.3 How SSH Works ..................................................................................................................
42
4.4
SSH Implementation on the NXC-8160 ...............................................................................
43
4.4.1 Requirements for Using SSH .....................................................................................
4.5
Centralized Configuration Screen ........................................................................................
Chapter 5
Wireless LAN...........................................................................................................................
47
5.1
Wireless LAN Introduction ...................................................................................................
5.2
Wireless Security Overview .................................................................................................
48
5.2.1 SSID ...........................................................................................................................
5.2.2 User Authentication ....................................................................................................
5.2.3 Encryption ..................................................................................................................
49
5.2.4 Additional Installation Requirements for Using 802.1x ...............................................
50
5.3
Introduction to RADIUS .......................................................................................................
5.4
Configuring WLAN .............................................................................................................
5.4.1 Rename SSIDs .........................................................................................................
53
5.5
Configuring Wireless Security .............................................................................................
54
5.5.1 No Security .................................................................................................................
56
5.5.2 Static WEP .................................................................................................................
57
5.5.3 Static WEP + IEEE 802.1x (LEAP) ............................................................................
59
5.5.4 WPA-PSK ...................................................................................................................
60
5.5.5 WPA ...........................................................................................................................
61
Chapter 6
Advanced Screen....................................................................................................................
63
6.1 SNMP ................................................................................................................................
6.1.1 SNMP Traps ...............................................................................................................
64
6.2
Configuring the Advanced Screen .......................................................................................
12
NXC-8160 User’s Guide