beautypg.com

ZyXEL Communications NWA-3160 Series User Manual

Page 15

background image

Table of Contents

ZyXEL NWA-3160 Series User’s Guide

15

Chapter 10
IP Screen................................................................................................................................ 133

10.1 Factory Ethernet Defaults ................................................................................................ 133
10.2 TCP/IP Parameters ......................................................................................................... 133

10.2.1 WAN IP Address Assignment ................................................................................. 133

10.3 Configuring IP .................................................................................................................. 134

Chapter 11
Rogue AP............................................................................................................................... 135

11.1 Rogue AP Introduction ..................................................................................................... 135
11.2 Rogue AP Examples ........................................................................................................ 135

11.2.1 “Honeypot” Attack ................................................................................................... 136

11.3 Configuring Rogue AP Detection ..................................................................................... 137

11.3.1 Rogue AP: Configuration ........................................................................................ 137
11.3.2 Rogue AP: Friendly AP .......................................................................................... 138
11.3.3 Rogue AP List ........................................................................................................ 139

Chapter 12
Remote Management Screens............................................................................................. 141

12.1 Remote Management Overview ...................................................................................... 141

12.1.1 Remote Management Limitations .......................................................................... 141
12.1.2 System Timeout .................................................................................................... 141

12.2 Configuring Telnet ............................................................................................................ 142
12.3 Configuring FTP .............................................................................................................. 143
12.4 Configuring WWW ........................................................................................................... 144
12.5 SNMP .............................................................................................................................. 145

12.5.1 Supported MIBs ..................................................................................................... 146
12.5.2 SNMP Traps ........................................................................................................... 147

12.6 SNMP Traps .................................................................................................................... 147

12.6.1 Configuring SNMP ................................................................................................. 148

Chapter 13
Internal RADIUS Server ........................................................................................................ 151

13.1 Internal RADIUS Overview .............................................................................................. 151
13.2 Internal RADIUS Server Setting ...................................................................................... 151
13.3 Trusted AP Overview ....................................................................................................... 153
13.4 Configuring Trusted AP ................................................................................................... 154
13.5 Configuring Trusted Users ............................................................................................... 155

Chapter 14
Certificates ............................................................................................................................ 157

14.1 Certificates Overview ....................................................................................................... 157

14.1.1 Advantages of Certificates ..................................................................................... 158