User`s guide

List of Figures
ZyXEL NWA-3160 Series User’s Guide
23
Figure 82 Wireless: Multiple BSS ......................................................................................................... 140
Figure 83 SSID ..................................................................................................................................... 143
Figure 84 Configuring SSID .................................................................................................................. 144
Figure 85 Layer-2 Isolation Application ................................................................................................ 148
Figure 86 WIRELESS > Layer 2 Isolation ............................................................................................ 149
Figure 87 WIRELESS > Layer-2 Isolation Configuration Screen ......................................................... 150
Figure 88 Layer-2 Isolation Example Configuration ............................................................................. 151
Figure 89 Layer-2 Isolation Example 1 ................................................................................................. 151
Figure 90 Layer-2 Isolation Example 2 ................................................................................................. 152
Figure 91 WIRELESS > MAC Filter ...................................................................................................... 152
Figure 92 MAC Address Filter .............................................................................................................. 153
Figure 93 Roaming Example ................................................................................................................ 155
Figure 94 Roaming ............................................................................................................................... 156
Figure 95 IP Setup ................................................................................................................................ 158
Figure 96 Rogue AP: Example ............................................................................................................ 160
Figure 97 “Honeypot” Attack ................................................................................................................. 161
Figure 98 ROGUE AP > Configuration ................................................................................................. 162
Figure 99 ROGUE AP > Friendly AP .................................................................................................... 163
Figure 100 ROGUE AP > Rogue AP .................................................................................................... 164
Figure 101 Telnet Configuration on a TCP/IP Network ......................................................................... 166
Figure 102 Remote Management: Telnet ............................................................................................. 166
Figure 103 Remote Management: FTP ................................................................................................ 167
Figure 104 Remote Management: WWW ............................................................................................. 168
Figure 105 SNMP Management Model ................................................................................................ 170
Figure 106 Remote Management: SNMP ............................................................................................ 173
Figure 107 Remote Management: SNMPv3 User Profile ..................................................................... 174
Figure 108 Internal RADIUS Server Setting Screen ............................................................................. 178
Figure 109 Trusted AP Overview .......................................................................................................... 180
Figure 110 Trusted AP Screen ............................................................................................................. 181
Figure 111 Trusted Users Screen ......................................................................................................... 182
Figure 112 Certificates on Your Computer ............................................................................................ 184
Figure 113 Certificate Details ............................................................................................................... 185
Figure 114 My Certificates .................................................................................................................... 186
Figure 115 My Certificate Import .......................................................................................................... 188
Figure 116 My Certificate Create .......................................................................................................... 189
Figure 117 My Certificate Details .......................................................................................................... 192
Figure 118 Trusted CAs ........................................................................................................................ 194
Figure 119 Trusted CA Import .............................................................................................................. 196
Figure 120 Trusted CA Details ............................................................................................................. 197
Figure 121 View Log ............................................................................................................................. 201
Figure 122 Log Settings ....................................................................................................................... 203
Figure 123 WIRELESS VLAN ...............................................................................................................211
Figure 124 RADIUS VLAN ................................................................................................................... 212