ZyAIR B-500 Wireless Access Point User’s Guide

Chapter 17 Firmware and Configuration File Maintenance .................................................................

17-1

17.1

Filename Conventions .............................................................................................................

17-1

17.2

Backup Configuration..............................................................................................................

17-2

17.2.1 Backup Configuration Using FTP....................................................................................

17-2

17.2.2 Using the FTP command from the DOS Prompt .............................................................

17-3

17.2.3 Backup Configuration Using TFTP .................................................................................

17-4

17.2.4

Example: TFTP Command ..............................................................................................

17-4

17.3

Restore Configuration..............................................................................................................

17-5

17.4

Uploading Firmware and Configuration Files .........................................................................

17-6

17.4.1

Firmware Upload .............................................................................................................

17-7

17.4.2

Configuration File Upload ...............................................................................................

17-7

17.4.3 Using the FTP command from the DOS Prompt Example ..............................................

17-8

17.4.4

TFTP File Upload ............................................................................................................

17-9

17.4.5

Example: TFTP Command ............................................................................................

17-10

Chapter 18 System Maintenance and Information.................................................................................

18-1

18.1

Command Interpreter Mode.....................................................................................................

18-1

18.2

Time and Date Setting .............................................................................................................

18-2

18.2.1 Resetting the Time ...........................................................................................................

18-3

APPENDICES...............................................................................................................................................

VI

Appendix A Troubleshooting......................................................................................................................

A-1

Problems Starting Up the ZyAIR.........................................................................................................

A-1

Problems with the Ethernet Interface...................................................................................................

A-1

Problems with the Password ................................................................................................................

A-2

Problems with Telnet ...........................................................................................................................

A-2

Problems with the WLAN Interface ....................................................................................................

A-3

Appendix B Brute-Force Password Guessing Protection........................................................................

B-1

Appendix C Setting up Your Computer’s IP Address..............................................................................

C-1
Appendix D Wireless LAN and IEEE 802.11 ...........................................................................................D-1
Appendix E Wireless LAN With IEEE 802.1x .........................................................................................E-1
Appendix F Types of EAP Authentication ................................................................................................F-1
Appendix G IP Subnetting .........................................................................................................................G-1

Appendix H Command Interpreter...........................................................................................................

H-1
Appendix I Log Descriptions ......................................................................................................................

I-1

Appendix J Index.........................................................................................................................................

J-1

x

Table of Contents