User`s guide
List of Figures
NWA3550 User’s Guide
22
Figure 39 Tutorial: MAC Filter Edit (SERVER_1) ................................................................................... 73
Figure 40 Tutorial: SSID Profiles Activated ............................................................................................ 75
Figure 41 Tutorial: SSID Tab Correct Settings ........................................................................................ 75
Figure 42 System > General .................................................................................................................. 79
Figure 43 SYSTEM > Password. ............................................................................................................ 81
Figure 44 SYSTEM > Time Setting ........................................................................................................ 82
Figure 45 Example of a Wireless Network ............................................................................................. 85
Figure 46 DiffServ: Differentiated Service Field ...................................................................................... 89
Figure 47 Wireless: Access Point ........................................................................................................... 92
Figure 48 Bridging Example ................................................................................................................... 94
Figure 49 Bridge Loop: Two Bridges Connected to Hub ........................................................................ 95
Figure 50 Bridge Loop: Bridge Connected to Wired LAN ....................................................................... 95
Figure 51 Wireless: Bridge/Repeater ..................................................................................................... 96
Figure 52 Wireless: AP+Bridge .............................................................................................................. 98
Figure 53 Wireless > Security ............................................................................................................... 104
Figure 54 WIRELESS > Security: WEP ................................................................................................ 105
Figure 55 Security: 802.1x Only .......................................................................................................... 106
Figure 56 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ............................................................ 107
Figure 57 Security: WPA ..................................................................................................................... 108
Figure 58 Security:WPA2 or WPA2-MIX ............................................................................................... 109
Figure 59 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................110
Figure 60 RADIUS .................................................................................................................................111
Figure 61 Multiple BSS with VLAN Example .........................................................................................114
Figure 62 Wireless: Multiple BSS ..........................................................................................................115
Figure 63 SSID ......................................................................................................................................117
Figure 64 Configuring SSID ...................................................................................................................119
Figure 65 Layer-2 Isolation Application ................................................................................................ 122
Figure 66 WIRELESS > Layer 2 Isolation ............................................................................................ 123
Figure 67 WIRELESS > Layer-2 Isolation Configuration Screen ......................................................... 124
Figure 68 Layer-2 Isolation Example Configuration ............................................................................. 125
Figure 69 Layer-2 Isolation Example 1 ................................................................................................. 125
Figure 70 Layer-2 Isolation Example 2 ................................................................................................. 126
Figure 71 WIRELESS > MAC Filter ...................................................................................................... 127
Figure 72 MAC Address Filter .............................................................................................................. 128
Figure 73 Roaming Example ................................................................................................................ 130
Figure 74 Roaming ............................................................................................................................... 131
Figure 75 IP Setup ................................................................................................................................ 134
Figure 76 Rogue AP: Example ............................................................................................................ 138
Figure 77 “Honeypot” Attack ................................................................................................................. 139
Figure 78 ROGUE AP > Configuration ................................................................................................. 140
Figure 79 ROGUE AP > Friendly AP .................................................................................................... 141
Figure 80 ROGUE AP > Rogue AP ...................................................................................................... 142
Figure 81 How SSH Works ................................................................................................................... 144