Zyxel g-3000h manual


















All rights reserved. Page 19 Figure Login Screen An AP acts as a bridge between the wireless and wired networks, extending your existing wired network without any additional wiring. Page 28 Control Panels and then click Modem. Graphics Icons Key Only stations within the same group can talk to each other.

Stations on a logical network can belong to one or more groups. The ZyAIR supports Page Table 1 Ieee The modulation technique defines how bits are encoded onto radio waves. Table 1 IEEE This may be necessary if for example, there is interference or difficulty with channel assignment due to a high density of APs within a coverage area.

This allows you to select the channel with minimum interference for your ZyAIR. Note: A different channel should be configured for each WLAN interface to reduce the effects of radio interference. Page Resetting The Zyair 2. The web configurator screens for your model may vary slightly for different ZyAIR models. Figure 11 Wizard 1: General Setup The following table describes the labels in this screen. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses to the hosts without problems.

Click OK to close the window and log in to the web configurator again using the new IP address if you change the default IP address Figure 15 System General Setup The following table describes the labels in this screen. The default is 5 minutes. After it times out you have to log in with your password again.

New Password Type your new system password up to 31 characters. WMM QoS prioritizes wireless traffic according to the delivery requirements of the individual and applications. This bridge has the lowest cost to the root among the bridges connected to the LAN. For each profile you can configure a name and one of the wireless security modes.

Bridge loops cause broadcast traffic to circle the network endlessly, resulting in possible throughput degradation and disruption of communications. The following examples show two network topologies that can lead to this problem: If two or more ZyAIRs in bridge mode are connected to the same hub as shown next. See later in this chapter and the appendices for more information on IEEE Select this to use WEP encryption.

Profile Name This field displays a name given to a security profile in the Security configuration screen. Page Security: Page Figure 34 Security: Table 23 Security: User Name Enter the username up to 31 characters for this user profile.

When a wireless client scans for an AP to associate, this is the identity that is broadcast and viewed in the wireless client utility. SSID Type a name to identify this wireless profile on the network.

Layer-2 isolation does not check the traffic between wireless clients that are associated with the same AP. When a wireless station moves from a coverage area to another, it scans and uses the channel of a new access point, which then informs the access points on the LAN about the change. The configured Name field is checked against these attributes. Disable Tx Tagging on the port you are using to connect to your computer. Select Add to add a condition for this policy to act on.

Select the Strongest encryption option. Select the value from the Attribute value drop-down list box. Certificates are based on public-private key pairs. With self-signed certificates, this is the same information as in the Subject field.

Use this screen to have the ZyAIR create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request, see the following figure. You may use any character, including spaces, but the ZyAIR drops trailing spaces. Apply Click Apply to begin certificate or certification request generation. Cancel Click Cancel to quit and return to the My Certificates screen. If you want to change the name, type up to 31 characters to identify this certificate.

You may use any character not including spaces. If the issuing certification authority is one that you have imported as a trusted certification authority, it may be the only certification authority in the list along with the certificate itself. A window display asking you to confirm that you want to delete the certificate. Note that subsequent certificates move up by one when you take this action.

Click the details icon to open the Trusted CA Details screen. If you want to change the name, type up to 31 characters to identify this key certificate. If the issuing This field also displays the domain names or IP addresses of the servers. An agent is a management software module that resides in a managed device the ZyAIR.

An agent translates the local management information from the managed device into a form compatible with SNMP. The purpose of the MIBs is to let administrators collect statistical data and monitor status and performance.

Refer to the appendix for example log message explanations. Also provided are "system up time" and "poll interval s ". The Poll Interval field is configurable. RxPkts This is the number of received packets on the wireless bridge. Refresh Click Refresh to reload the screen. For our In some operating systems, you may see the following icon on your desktop.

Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Table 58 Restore Configuration The following warning screen will appear. After you enter the password, the SMT displays the main menu, as shown next. Exit Use this to exit from SMT and return to a blank screen.

Chapter 15 Introducing the SMT The System Name field is for identification purposes. It is recommended you type your computer's "Computer name". These fields are not available on all models. This field is available when you select User-Defined in the field above.

From the main menu, enter 3 to display menu 3. Page Figure Menu 3. Table 65 Menu 3. Page Table 69 Menu 3. Table 69 Menu 3. Page Figure Menu See the web configurator chapter on SNMP for background information.

Change Password 5. We have sent a verification link to to complete your registration. Log In Sign Up. Forgot password? Enter your email address and check your inbox. Please check your email for further instructions. Enter a new password. The following lists what you need to do: 1. Hardware Connections 4. Hardware Installation 2. Accessing the Web Configurator 5. Power over Ethernet optional 3. Internet Access Setup 6. GH Quick Start Guide 2.

You can only view or download manuals with.



0コメント

  • 1000 / 1000