ZyXEL Communications ZyXEL ZyAIR NWA-3500 User Manual

Page 15

Advertising
background image

Table of Contents

ZyXEL NWA-3500 User’s Guide

15

Chapter 10
IP Screen................................................................................................................................ 137

10.1 Factory Ethernet Defaults ................................................................................................ 137
10.2 TCP/IP Parameters ......................................................................................................... 137

10.2.1 WAN IP Address Assignment ................................................................................. 137

10.3 Configuring IP .................................................................................................................. 138

Chapter 11
Rogue AP............................................................................................................................... 141

11.1 Rogue AP Introduction ..................................................................................................... 141
11.2 Rogue AP Examples ........................................................................................................ 141

11.2.1 “Honeypot” Attack ................................................................................................... 142

11.3 Configuring Rogue AP Detection ..................................................................................... 143

11.3.1 Rogue AP: Configuration ........................................................................................ 143
11.3.2 Rogue AP: Friendly AP .......................................................................................... 144
11.3.3 Rogue AP List ........................................................................................................ 145

Chapter 12
Remote Management Screens............................................................................................. 147

12.1 Remote Management Overview ...................................................................................... 147

12.1.1 Remote Management Limitations .......................................................................... 147
12.1.2 System Timeout .................................................................................................... 147

12.2 Configuring Telnet ............................................................................................................ 148
12.3 Configuring FTP .............................................................................................................. 149
12.4 Configuring WWW ........................................................................................................... 150
12.5 SNMP .............................................................................................................................. 151

12.5.1 Supported MIBs ..................................................................................................... 152
12.5.2 SNMP Traps ........................................................................................................... 153

12.6 SNMP Traps .................................................................................................................... 153

12.6.1 Configuring SNMP ................................................................................................. 154

Chapter 13
Internal RADIUS Server ........................................................................................................ 157

13.1 Internal RADIUS Overview .............................................................................................. 157
13.2 Internal RADIUS Server Setting ...................................................................................... 157
13.3 Trusted AP Overview ....................................................................................................... 159
13.4 Configuring Trusted AP ................................................................................................... 160
13.5 Configuring Trusted Users ............................................................................................... 161

Chapter 14
Certificates ............................................................................................................................ 163

14.1 Certificates Overview ....................................................................................................... 163

14.1.1 Advantages of Certificates ..................................................................................... 164

Advertising