ZyXEL Communications NWA-3500 Network Router User Manual


 
Chapter 25 Product Specifications
NWA-3500/NWA-3550 User’s Guide
298
Table 90 Firmware Specifications
Antenna
Specifications
SMA antenna connectors, equipped by default with 2dBi omni
antenna, 60°
When facing the front of the NWA, the antenna on the right is
used by wireless LAN adaptor WLAN1, and the antenna on the left
is used by wireless LAN adaptor WLAN2.
Output Power IEEE 802.11b/g: 17 dBm
IEEE 802.11a: 14 dBm
Operating
Environment
Temperature: 0º C ~ 5º C
Humidity: 20% ~ 95% RH
Storage Environment Temperature: -40º C ~ 60º C
Humidity: 5% ~ 95% RH
Distance between the
centers of wall-
mounting holes on
the device’s back.
80 mm
Screw size for wall-
mounting
6mm ~ 8mm (0.24" ~ 0.31") head width.
Default IP Address 192.168.1.2
Default Subnet Mask 255.255.255.0 (24 bits)
Default Password 1234
Wireless LAN Standards IEEE 802.11a, IEEE 802.11b, IEEE 802.11g
Wireless security WEP, WPA(2), WPA(2)-PSK, IEEE 802.1x
Layer 2 isolation Prevents wireless clients associated with your NWA from
communicating with other wireless clients, APs, computers or
routers in a network.
Multiple BSSID
(MBSSID)
MBSSID mode allows the NWA to operate up to 8 different
wireless networks (BSSs) simultaneously, each with
independently-configurable wireless and security settings.
Rogue AP detection Rogue AP detection detects and logs unknown access points
(APs) operating in the area.
Internal RADIUS server PEAP, 32-entry Trusted AP list, 128-entry Trusted Users list.
VLAN 802.1Q VLAN tagging.
STP (Spanning Tree
Protocol) / RSTP (Rapid
STP)
(R)STP detects and breaks network loops and provides backup
links between switches, bridges or routers. It allows a bridge to
interact with other (R)STP-compliant bridges in your network to
ensure that only one path exists between any two stations on
the network.
WMM QoS WMM (Wi-Fi MultiMedia) QoS (Quality of Service) allows you to
prioritize wireless traffic.
Certificates The NWA can use certificates (also called digital IDs) to
authenticate users. Certificates are based on public-private key
pairs. Certificates provide a way to exchange public keys for
use in authentication.