User`s guide
Table of Contents
NWA3550 User’s Guide
15
11.1 Rogue AP Introduction .....................................................................................................137
11.2 Rogue AP Examples ........................................................................................................ 137
11.2.1 “Honeypot” Attack ................................................................................................... 138
11.3 Configuring Rogue AP Detection ..................................................................................... 139
11.3.1 Rogue AP: Configuration ........................................................................................ 139
11.3.2 Rogue AP: Friendly AP .......................................................................................... 140
11.3.3 Rogue AP List ........................................................................................................ 141
Chapter 12
Remote Management Screens............................................................................................. 143
12.1 Remote Management Overview ...................................................................................... 143
12.1.1 Remote Management Limitations .......................................................................... 143
12.1.2 System Timeout .................................................................................................... 144
12.2 SSH ............................................................................................................................... 144
12.3 How SSH Works .............................................................................................................. 144
12.4 SSH Implementation on the ZyXEL Device ..................................................................... 145
12.4.1 Requirements for Using SSH ................................................................................. 145
12.5 Configuring Telnet ............................................................................................................ 145
12.6 Configuring FTP .............................................................................................................. 147
12.7 WWW (HTTP and HTTPS) ............................................................................................. 148
12.8 Configuring WWW ...........................................................................................................149
12.9 HTTPS Example .............................................................................................................. 150
12.9.1 Internet Explorer Warning Messages ..................................................................... 150
12.9.2 Netscape Navigator Warning Messages ................................................................ 151
12.9.3 Avoiding the Browser Warning Messages .............................................................. 151
12.9.4 Login Screen .......................................................................................................... 152
12.10 SNMP ............................................................................................................................ 154
12.10.1 Supported MIBs ................................................................................................... 156
12.10.2 SNMP Traps ......................................................................................................... 156
12.11 SNMP Trap Interface Index ........................................................................................... 157
12.11.1 SNMP v3 and Security ......................................................................................... 157
12.11.2 Configuring SNMP ................................................................................................ 157
12.11.2.1 The SNMPv3 User Profile Screen ............................................ 159
Chapter 13
Internal RADIUS Server........................................................................................................ 161
13.1 Internal RADIUS Overview .............................................................................................. 161
13.2 Internal RADIUS Server Setting ...................................................................................... 161
13.3 Trusted AP Overview .......................................................................................................163
13.4 Configuring Trusted AP ................................................................................................... 164
13.5 Configuring Trusted Users ............................................................................................... 166
Chapter 14
Certificates ............................................................................................................................ 169