List of Figures
NWA3550 User’s Guide
20
Figure 39 Tutorial: Example Network ..................................................................................................... 76
Figure 40 Tutorial: SSID Profile .............................................................................................................. 78
Figure 41 Tutorial: SSID Edit .................................................................................................................. 78
Figure 42 Tutorial: Layer-2 Isolation Edit ................................................................................................ 79
Figure 43 Tutorial: MAC Filter Edit (SERVER_1) ................................................................................... 79
Figure 44 Tutorial: SSID Profiles Activated ............................................................................................ 81
Figure 45 Tutorial: SSID Tab Correct Settings ........................................................................................ 81
Figure 46 System > General .................................................................................................................. 85
Figure 47 SYSTEM > Password. ............................................................................................................ 87
Figure 48 SYSTEM > Time Setting ........................................................................................................ 88
Figure 49 Example of a Wireless Network ............................................................................................. 91
Figure 50 DiffServ: Differentiated Service Field ...................................................................................... 95
Figure 51 Wireless: Access Point ........................................................................................................... 99
Figure 52 Bridging Example ................................................................................................................. 102
Figure 53 Bridge Loop: Two Bridges Connected to Hub ...................................................................... 102
Figure 54 Bridge Loop: Bridge Connected to Wired LAN ..................................................................... 103
Figure 55 Wireless: Bridge/Repeater ................................................................................................... 104
Figure 56 Wireless: AP+Bridge ............................................................................................................ 107
Figure 57 Wireless > Security ................................................................................................................112
Figure 58 WIRELESS > Security: WEP .................................................................................................113
Figure 59 Security: 802.1x Only ...........................................................................................................114
Figure 60 Security: 802.1x Static 64-bit, 802.1x Static 128-bit .............................................................115
Figure 61 Security: WPA ......................................................................................................................116
Figure 62 Security:WPA2 or WPA2-MIX ................................................................................................117
Figure 63 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................118
Figure 64 RADIUS .................................................................................................................................119
Figure 65 Multiple BSS with VLAN Example ........................................................................................ 122
Figure 66 Wireless: Multiple BSS ......................................................................................................... 123
Figure 67 SSID ..................................................................................................................................... 126
Figure 68 Configuring SSID .................................................................................................................. 127
Figure 69 Layer-2 Isolation Application ................................................................................................ 130
Figure 70 WIRELESS > Layer 2 Isolation ............................................................................................ 131
Figure 71 WIRELESS > Layer-2 Isolation Configuration Screen ......................................................... 132
Figure 72 Layer-2 Isolation Example Configuration ............................................................................. 133
Figure 73 Layer-2 Isolation Example 1 ................................................................................................. 133
Figure 74 Layer-2 Isolation Example 2 ................................................................................................. 134
Figure 75 WIRELESS > MAC Filter ...................................................................................................... 135
Figure 76 MAC Address Filter .............................................................................................................. 136
Figure 77 Roaming Example ................................................................................................................ 138
Figure 78 Roaming ............................................................................................................................... 139
Figure 79 IP Setup ................................................................................................................................ 142
Figure 80 Rogue AP: Example ............................................................................................................ 146
Figure 81 “Honeypot” Attack ................................................................................................................. 147