ZyXEL Communications ZyAIR B-500 Network Router User Manual


 
ZyAIR B-500 Wireless Access Point User’s Guide
x Table of Contents
Chapter 17 Firmware and Configuration File Maintenance .................................................................17-1
17.1 Filename Conventions .............................................................................................................17-1
17.2 Backup Configuration..............................................................................................................17-2
17.2.1 Backup Configuration Using FTP....................................................................................17-2
17.2.2 Using the FTP command from the DOS Prompt .............................................................17-3
17.2.3 Backup Configuration Using TFTP.................................................................................17-4
17.2.4 Example: TFTP Command ..............................................................................................17-4
17.3 Restore Configuration..............................................................................................................17-5
17.4 Uploading Firmware and Configuration Files .........................................................................17-6
17.4.1 Firmware Upload .............................................................................................................17-7
17.4.2 Configuration File Upload ...............................................................................................17-7
17.4.3 Using the FTP command from the DOS Prompt Example ..............................................17-8
17.4.4 TFTP File Upload ............................................................................................................17-9
17.4.5 Example: TFTP Command ............................................................................................17-10
Chapter 18 System Maintenance and Information.................................................................................18-1
18.1 Command Interpreter Mode.....................................................................................................18-1
18.2 Time and Date Setting .............................................................................................................18-2
18.2.1 Resetting the Time...........................................................................................................18-3
APPENDICES...............................................................................................................................................VI
Appendix A Troubleshooting......................................................................................................................A-1
Problems Starting Up the ZyAIR.........................................................................................................A-1
Problems with the Ethernet Interface...................................................................................................A-1
Problems with the Password ................................................................................................................A-2
Problems with Telnet ...........................................................................................................................A-2
Problems with the WLAN Interface ....................................................................................................A-3
Appendix B Brute-Force Password Guessing Protection........................................................................ B-1
Appendix C Setting up Your Computer’s IP Address..............................................................................C-1
Appendix D Wireless LAN and IEEE 802.11 ...........................................................................................D-1
Appendix E Wireless LAN With IEEE 802.1x ......................................................................................... E-1
Appendix F Types of EAP Authentication ................................................................................................ F-1
Appendix G IP Subnetting .........................................................................................................................G-1
Appendix H Command Interpreter...........................................................................................................H-1
Appendix I Log Descriptions ...................................................................................................................... I-1
Appendix J Index.........................................................................................................................................J-1