User`s guide

Table of Contents
ZyXEL NWA-3160 Series User’s Guide
12
Chapter 3
Tutorial ..................................................................................................................................... 47
3.1 How to Configure the Wireless LAN .................................................................................... 47
3.1.1 Choosing the Wireless Mode ..................................................................................... 47
3.1.2 Wireless LAN Configuration Overview ....................................................................... 48
3.1.3 Further Reading ......................................................................................................... 50
3.2 How to Configure Multiple Wireless Networks ..................................................................... 50
3.2.1 Change the Operating Mode ...................................................................................... 51
3.2.2 Configure the VoIP Network ....................................................................................... 53
3.2.2.1 Set Up Security for the VoIP Profile ................................................54
3.2.2.2 Activate the VoIP Profile ..................................................................56
3.2.3 Configure the Guest Network ..................................................................................... 56
3.2.3.1 Set Up Security for the Guest Profile ..............................................57
3.2.3.2 Set up Layer 2 Isolation ..................................................................58
3.2.3.3 Activate the Guest Profile ................................................................59
3.2.4 Testing the Wireless Networks ................................................................................... 59
3.3 How to Set Up and Use Rogue AP Detection ..................................................................... 60
3.3.1 Set Up and Save a Friendly AP list ............................................................................ 62
3.3.2 Activate Periodic Rogue AP Detection ....................................................................... 64
3.3.3 Set Up E-mail Logs .................................................................................................... 65
3.3.4 Configure Your Other Access Points .......................................................................... 66
3.3.5 Test the Setup ............................................................................................................ 66
3.4 Using Multiple MAC Filters and L-2 Isolation Profiles .......................................................... 67
3.4.1 Scenario ..................................................................................................................... 67
3.4.2 Your Requirements ..................................................................................................... 67
3.4.3 Setup .......................................................................................................................... 68
3.4.4 Configure the SERVER_1 Network ............................................................................ 68
3.4.5 Configure the SERVER_2 Network ............................................................................ 71
3.4.6 Checking your Settings and Testing the Configuration .............................................. 72
3.4.6.1 Checking Settings ...........................................................................72
3.4.6.2 Testing the Configuration ................................................................72
Chapter 4
Status Screens ........................................................................................................................ 75
4.1 The Status Screen ............................................................................................................... 75
Chapter 5
Management Mode..................................................................................................................79
5.1 About CAPWAP ................................................................................................................... 79
5.1.1 CAPWAP Discovery and Management ...................................................................... 79
5.1.2 CAPWAP and DHCP .................................................................................................. 80
5.1.3 CAPWAP and IP Subnets .......................................................................................... 80
5.1.4 Notes on CAPWAP .................................................................................................... 81