ZyXEL NWA50AX User Guide - Page 12

Introduction, 1.1 Overview, 1.2 Zyxel Device Roles

Page 12 highlights

CHAPTER 1 Introduction 1.1 Overview The Zyxel Device can be managed in one of the following methods: remote management through Nebula Control Center (NCC) or local management in Standalone Mode. The Zyxel Device runs in standalone mode by default, but it is recommended to use NCC management if it is available for your device. For more information about Access Point (AP) management, see Section 2.1 on page 20. Use the Zyxel Device to set up a wireless network with other IEEE 802.11a/b/g/n/ac/ax compatible devices in either 2.4 GHz and 5 GHz networks or both at the same time. When two or more APs are interconnected, this network is called a Wireless Distribution System (WDS). See Section 1.2.2 on page 13 for more information on root and repeater APs and how to set them up. 1.2 Zyxel Device Roles This section describes some of the different roles that your Zyxel Device can take up within a network. Not all roles are supported by all models (see Section 1.4 on page 18). The Zyxel Device can serve as a: • Access Point (AP) - This is used to allow wireless clients to connect to the Internet. • Radio Frequency (RF) monitor - An RF monitor searches for rogue APs to help eliminate network threats if it supports monitor mode and rogue APs detection/containment. An RF monitor cannot simultaneously act as an AP. • Root AP - A root AP connects to the gateway or switch through a wired Ethernet connection and has wireless repeaters connected to it to extend its range. • Wireless repeater - A wireless repeater wirelessly connects to a root AP and extends the network's wireless range. The following figure shows a network setup that uses these different roles to create a secure Wireless Distribution System (WDS). The root AP (Y) is connected to a network with Internet access and has a wireless repeater (X) connected to it to expand the wireless network's range. Clients (A, B, and C) can access the wired network through the wireless repeater and/or root AP. If a client (D) tries to set up his own AP (R) with weak security settings, the network becomes exposed to threats. The RF monitor (M) scans the area to detect all APs, which can help the network administrator discover these rogue APs and remove them or use the NXC to quarantine them. NWA50AX User's Guide 12

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256

NWA50AX User’s Guide
12
C
HAPTER
1
Introduction
1.1
Overview
The Zyxel Device can be managed in one of the following methods: remote management through
Nebula Control Center (NCC) or local management in Standalone Mode. The Zyxel Device runs in
standalone mode by default, but it is recommended to use NCC management if it is available for your
device. For more information about Access Point (AP) management, see
Section 2.1 on page 20
.
Use the Zyxel Device to set up a wireless network with other IEEE 802.11a/b/g/n/ac/ax compatible
devices in either 2.4 GHz and 5 GHz networks or both at the same time.
When two or more APs are interconnected, this network is called a Wireless Distribution System (WDS).
See
Section 1.2.2 on page 13
for more information on root and repeater APs and how to set them up.
1.2
Zyxel Device Roles
This section describes some of the different roles that your Zyxel Device can take up within a network.
Not all roles are supported by all models (see
Section 1.4 on page 18
). The Zyxel Device can serve as a:
Access Point (AP) - This is used to allow wireless clients to connect to the Internet.
Radio Frequency (RF) monitor - An RF monitor searches for rogue APs to help eliminate network
threats if it supports monitor mode and rogue APs detection/containment. An RF monitor cannot
simultaneously act as an AP.
Root AP - A root AP connects to the gateway or switch through a wired Ethernet connection and
has wireless repeaters connected to it to extend its range.
Wireless repeater - A wireless repeater wirelessly connects to a root AP and extends the network’s
wireless range.
The following figure shows a network setup that uses these different roles to create a secure Wireless
Distribution System (WDS). The root AP (
Y
) is connected to a network with Internet access and has a
wireless repeater (
X
) connected to it to expand the wireless network’s range. Clients (
A, B,
and
C
) can
access the wired network through the wireless repeater and/or root AP.
If a client (
D
) tries to set up his own AP (
R
) with weak security settings, the network becomes exposed to
threats. The RF monitor (
M
) scans the area to detect all APs, which can help the network administrator
discover these rogue APs and remove them or use the NXC to quarantine them.