ZyXEL Communications ZyAIR B-500 User Manual
ZyAIR B-500 Wireless Access Point User’s Guide
x Table of Contents
Chapter 17 Firmware and Configuration File Maintenance .................................................................17-1
17.1
Filename Conventions .............................................................................................................17-1
17.2
Backup Configuration..............................................................................................................17-2
17.2.1
Backup Configuration Using FTP....................................................................................17-2
17.2.2
Using the FTP command from the DOS Prompt .............................................................17-3
17.2.3
Backup Configuration Using TFTP .................................................................................17-4
17.2.4
Example: TFTP Command ..............................................................................................17-4
17.3
Restore Configuration..............................................................................................................17-5
17.4
Uploading Firmware and Configuration Files .........................................................................17-6
17.4.1
Firmware Upload .............................................................................................................17-7
17.4.2
Configuration File Upload ...............................................................................................17-7
17.4.3
Using the FTP command from the DOS Prompt Example ..............................................17-8
17.4.4
TFTP File Upload ............................................................................................................17-9
17.4.5
Example: TFTP Command ............................................................................................17-10
Chapter 18 System Maintenance and Information.................................................................................18-1
18.1
Command Interpreter Mode.....................................................................................................18-1
18.2
Time and Date Setting .............................................................................................................18-2
18.2.1
Resetting the Time ...........................................................................................................18-3
APPENDICES...............................................................................................................................................VI
Appendix A Troubleshooting...................................................................................................................... A-1
Problems Starting Up the ZyAIR......................................................................................................... A-1
Problems with the Ethernet Interface................................................................................................... A-1
Problems with the Password ................................................................................................................ A-2
Problems with Telnet ........................................................................................................................... A-2
Problems with the WLAN Interface .................................................................................................... A-3
Appendix B Brute-Force Password Guessing Protection ........................................................................ B-1
Appendix C Setting up Your Computer’s IP Address.............................................................................. C-1
Appendix D Wireless LAN and IEEE 802.11 ........................................................................................... D-1
Appendix E Wireless LAN With IEEE 802.1x ......................................................................................... E-1
Appendix F Types of EAP Authentication ................................................................................................ F-1
Appendix G IP Subnetting .........................................................................................................................G-1
Appendix H Command Interpreter...........................................................................................................H-1
Appendix I Log Descriptions ...................................................................................................................... I-1
Appendix J Index.........................................................................................................................................J-1