ZyAIR B-500 Wireless Access Point User’s Guide
x
Table of Contents
Chapter 17 Firmware and Configuration File Maintenance
.................................................................
17-1
17.1
Filename Conventions
.............................................................................................................
17-1
17.2
Backup Configuration
..............................................................................................................
17-2
17.2.1
Backup Configuration Using FTP
....................................................................................
17-2
17.2.2
Using the FTP command from the DOS Prompt
.............................................................
17-3
17.2.3
Backup Configuration Using TFTP
.................................................................................
17-4
17.2.4
Example: TFTP Command
..............................................................................................
17-4
17.3
Restore Configuration
..............................................................................................................
17-5
17.4
Uploading Firmware and Configuration Files
.........................................................................
17-6
17.4.1
Firmware Upload
.............................................................................................................
17-7
17.4.2
Configuration File Upload
...............................................................................................
17-7
17.4.3
Using the FTP command from the DOS Prompt Example
..............................................
17-8
17.4.4
TFTP File Upload
............................................................................................................
17-9
17.4.5
Example: TFTP Command
............................................................................................
17-10
Chapter 18 System Maintenance and Information
.................................................................................
18-1
18.1
Command Interpreter Mode
.....................................................................................................
18-1
18.2
Time and Date Setting
.............................................................................................................
18-2
18.2.1
Resetting the Time
...........................................................................................................
18-3
APPENDICES
...............................................................................................................................................
VI
Appendix A Troubleshooting
......................................................................................................................
A-1
Problems Starting Up the ZyAIR
.........................................................................................................
A-1
Problems with the Ethernet Interface
...................................................................................................
A-1
Problems with the Password
................................................................................................................
A-2
Problems with Telnet
...........................................................................................................................
A-2
Problems with the WLAN Interface
....................................................................................................
A-3
Appendix B Brute-Force Password Guessing Protection
........................................................................
B-1
Appendix C Setting up Your Computer’s IP Address
..............................................................................
C-1
Appendix D Wireless LAN and IEEE 802.11
...........................................................................................
D-1
Appendix E Wireless LAN With IEEE 802.1x
.........................................................................................
E-1
Appendix F Types of EAP Authentication
................................................................................................
F-1
Appendix G IP Subnetting
.........................................................................................................................
G-1
Appendix H Command Interpreter
...........................................................................................................
H-1
Appendix I Log Descriptions
......................................................................................................................
I-1
Appendix J Index
.........................................................................................................................................
J-1