ZyXEL Communications NWA3160 User Manual
Page 21

List of Figures
ZyXEL NWA-3160 Series User’s Guide
21
Figure 82 Multiple BSS with VLAN Example ........................................................................................ 138
Figure 83 Wireless: Multiple BSS ......................................................................................................... 138
Figure 84 SSID ..................................................................................................................................... 141
Figure 85 Configuring SSID .................................................................................................................. 142
Figure 86 Layer-2 Isolation Application ................................................................................................ 146
Figure 87 WIRELESS > Layer 2 Isolation ............................................................................................ 147
Figure 88 WIRELESS > Layer-2 Isolation Configuration Screen ......................................................... 148
Figure 89 Layer-2 Isolation Example Configuration ............................................................................. 149
Figure 90 Layer-2 Isolation Example 1 ................................................................................................. 149
Figure 91 Layer-2 Isolation Example 2 ................................................................................................. 150
Figure 92 WIRELESS > MAC Filter ...................................................................................................... 150
Figure 93 MAC Address Filter .............................................................................................................. 151
Figure 94 Roaming Example ................................................................................................................ 153
Figure 95 Roaming ............................................................................................................................... 154
Figure 96 IP Setup ................................................................................................................................ 156
Figure 97 Rogue AP: Example ............................................................................................................ 158
Figure 98 “Honeypot” Attack ................................................................................................................. 159
Figure 99 ROGUE AP > Configuration ................................................................................................. 160
Figure 100 ROGUE AP > Friendly AP .................................................................................................. 161
Figure 101 ROGUE AP > Rogue AP .................................................................................................... 162
Figure 102 Telnet Configuration on a TCP/IP Network ......................................................................... 164
Figure 103 Remote Management: Telnet ............................................................................................. 164
Figure 104 Remote Management: FTP ................................................................................................ 165
Figure 105 Remote Management: WWW ............................................................................................. 166
Figure 106 SNMP Management Model ................................................................................................ 168
Figure 107 Remote Management: SNMP ............................................................................................ 171
Figure 108 Remote Management: SNMPv3 User Profile ..................................................................... 172
Figure 109 Internal RADIUS Server Setting Screen ............................................................................. 176
Figure 110 Trusted AP Overview .......................................................................................................... 178
Figure 111 Trusted AP Screen .............................................................................................................. 179
Figure 112 Trusted Users Screen ......................................................................................................... 180
Figure 113 Certificates on Your Computer ............................................................................................ 182
Figure 114 Certificate Details ............................................................................................................... 183
Figure 115 My Certificates .................................................................................................................... 184
Figure 116 My Certificate Import .......................................................................................................... 186
Figure 117 My Certificate Create .......................................................................................................... 187
Figure 118 My Certificate Details .......................................................................................................... 190
Figure 119 Trusted CAs ........................................................................................................................ 192
Figure 120 Trusted CA Import .............................................................................................................. 194
Figure 121 Trusted CA Details ............................................................................................................. 195
Figure 122 View Log ............................................................................................................................. 199
Figure 123 Log Settings ....................................................................................................................... 201
Figure 124 WIRELESS VLAN .............................................................................................................. 209