beautypg.com

ZyXEL Communications NWA3160 User Manual

Page 12

background image

Table of Contents

ZyXEL NWA-3160 Series User’s Guide

12

Chapter 3
Tutorial ..................................................................................................................................... 45

3.1 How to Configure the Wireless LAN .................................................................................... 45

3.1.1 Choosing the Wireless Mode ..................................................................................... 45
3.1.2 Wireless LAN Configuration Overview ....................................................................... 46
3.1.3 Further Reading ......................................................................................................... 48

3.2 How to Configure Multiple Wireless Networks ..................................................................... 48

3.2.1 Change the Operating Mode ...................................................................................... 49
3.2.2 Configure the VoIP Network ....................................................................................... 51

3.2.2.1 Set Up Security for the VoIP Profile ................................................52
3.2.2.2 Activate the VoIP Profile ..................................................................54

3.2.3 Configure the Guest Network ..................................................................................... 54

3.2.3.1 Set Up Security for the Guest Profile ..............................................55
3.2.3.2 Set up Layer 2 Isolation ..................................................................56
3.2.3.3 Activate the Guest Profile ................................................................57

3.2.4 Testing the Wireless Networks ................................................................................... 57

3.3 How to Set Up and Use Rogue AP Detection ..................................................................... 58

3.3.1 Set Up and Save a Friendly AP list ............................................................................ 60
3.3.2 Activate Periodic Rogue AP Detection ....................................................................... 62
3.3.3 Set Up E-mail Logs .................................................................................................... 63
3.3.4 Configure Your Other Access Points .......................................................................... 64
3.3.5 Test the Setup ............................................................................................................ 64

3.4 Using Multiple MAC Filters and L-2 Isolation Profiles .......................................................... 65

3.4.1 Scenario ..................................................................................................................... 65
3.4.2 Your Requirements ..................................................................................................... 65
3.4.3 Setup .......................................................................................................................... 66
3.4.4 Configure the SERVER_1 Network ............................................................................ 66
3.4.5 Configure the SERVER_2 Network ............................................................................ 69
3.4.6 Checking your Settings and Testing the Configuration .............................................. 70

3.4.6.1 Checking Settings ...........................................................................70
3.4.6.2 Testing the Configuration ................................................................70

Chapter 4
Status Screens ........................................................................................................................ 73

4.1 The Status Screen ............................................................................................................... 73

Chapter 5
Management Mode.................................................................................................................. 77

5.1 About CAPWAP ................................................................................................................... 77

5.1.1 CAPWAP Discovery and Management ...................................................................... 77
5.1.2 CAPWAP and DHCP .................................................................................................. 78
5.1.3 CAPWAP and IP Subnets .......................................................................................... 78
5.1.4 Notes on CAPWAP .................................................................................................... 79