ZyXEL NWA1123-NI User Guide - Page 16

Ways to Manage the NWA - firmware

Page 16 highlights

Chapter 1 Introducing the NWA clients and the wired LAN. Clients A and B access the AP and the wired network behind the AP throught repeaters Z and Y. Figure 5 Repeater Application When the NWA is in Repeater mode, universal repeater security between the NWA and other repeater is independent of the security between the wireless clients and the AP or repeater. If you do not enable universal repeater security, traffic between APs is not encrypted. When universal repeater security is enabled, both APs and repeaters must use the same pre-shared key. See Section 6.6 on page 76 for more details. Once the security settings of peer sides match one another, the connection between devices is made. At the time of writing, universal repeater security is compatible with the NWA only. 1.3 Ways to Manage the NWA Use any of the following methods to manage the NWA. • Web Configurator. This is recommended for everyday management of the NWA using a (supported) web browser. • FTP (File Transfer Protocol) for firmware upgrades and configuration backup and restore. • SNMP (Simple Network Management Protocol). The device can be monitored by an SNMP manager. 16 NWA1120 Series User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212

Chapter 1 Introducing the NWA
NWA1120 Series User’s Guide
16
clients and the wired LAN. Clients
A
and
B
access the AP and the wired network behind the AP
throught repeaters
Z
and
Y
.
Figure 5
Repeater Application
When the NWA is in Repeater mode, universal repeater security between the NWA and other
repeater is independent of the security between the wireless clients and the AP or repeater. If you
do not enable universal repeater security, traffic between APs is not encrypted. When universal
repeater security is enabled, both APs and repeaters must use the same pre-shared key. See
Section 6.6 on page 76
for more details.
Once the security settings of peer sides match one another, the connection between devices is
made.
At the time of writing, universal repeater security is compatible with the NWA only.
1.3
Ways to Manage the NWA
Use any of the following methods to manage the NWA.
Web Configurator. This is recommended for everyday management of the NWA using a
(supported) web browser.
FTP (File Transfer Protocol) for firmware upgrades and configuration backup and restore.
SNMP (Simple Network Management Protocol). The device can be monitored by an SNMP
manager.