Label | Description |
---|---|
Advanced mode | Select Off to disable Advanced mode. This allows you to create SSID profiles by only specifying an SSID name and optional password. NCC sets all other WiFi settings to default. |
+ Add SSID network | Click this button to configure up to eight different SSID profiles for your Nebula Device |
No. | This shows the index number of this profile. |
delete | Click this icon to remove the SSID profile. |
Name | This shows the SSID name for this profile. Click the text box and enter a new SSID if you want to change it. |
Enabled | Click to turn on or off this profile. |
Programmable SSID | Select On to have each Nebula Device that uses this SSID generate a unique SSID name and pre-shared key (PSK) based on the Nebula Device’s model name, serial number, or MAC address. For example, a hotel can install a Nebula Device in each room and then have each Nebula Device broadcast a unique SSID based on the room number: FreeWiFi_Room1, FreeWiFi_Room2, FreeWiFi_Room3, and so on. |
Name | Name: Enter a programmable SSID name in the format PREFIX+VALUE(X). This name overrides the original SSID name. • PREFIX: Optional prefix to add to the SSID, for example “FreeWiFi_”. To use “$” in the SSID name, enter “$$” • VALUE: Specify a Nebula Device value to use to generate the SSID name. Use one of the following: $AP = Nebula Device device name. $MAC = Nebula Device MAC address. $SN = Nebula Device serial number. • X: Specify how many characters of the Nebula Device value to use in the SSID. A positive number means the first X characters, and a negative number means the last X characters. Example: FreeWiFi_Room$AP(–3) generates an SSID called “FreeWiFi_Room” + the last three characters of the access point device name. |
PSK | PSK: Enter an optional programmable PSK in the format GENTYPE(Y). • GENTYPE: Specify how the Nebula Device will generate a random PSK. $GENMIX = The Nebula Device generates a mix of random letters and numbers. $GENNUM = The Nebula Device generates a mix of random numbers only. $AP = Nebula Device device name. $MAC = Nebula Device MAC address. $SN = Nebula Device serial number. Y = Specify the length of the PSD. The minimum length is 8. Example 1: $GENNUM(10) generates a unique 10-character PSK for this SSID, consisting only of numbers. Example 2: $MAC(-5)$SN(-5) uses the MAC address’s last 5 characters and the serial number’s last 5 characters (for example, 8E3AE02451). Example 3: ZYXEL-$GENMIX(4) appends the fixed characters ‘ZYXEL’ and generates a unique 4-character mix of random letters and numbers (for example, ZYXEL-3c4d). You can specify a fixed PSK for this SSID at Site-wide > Configure > Access points / Security router > SSID advanced settings. |
Broadcasting APs | Select All APs or specify the AP to use this SSID profile. |
Tagging | Enter or select the tags you created for Nebula Devices in the Site-wide > Devices > Access points / Security router / Mobile router screen. The SSID profile will only be applied to Nebula Devices with the specified tag. If you leave this field blank, this SSID profile will be applied to all Nebula Devices in the site. |
Guest Network | Select On to set this WiFi network as a guest network. Layer 2 isolation and intra-BSS blocking are automatically enabled on the SSID. WiFi clients connecting to this SSID can access the Internet through the Nebula Device but cannot directly connect to the LAN or the WiFi clients in the same SSID or any other SSIDs. In your VLAN-enabled network, if the SSID's gateway MAC address and the Nebula Device's gateway MAC address are different and belong to different VLANs, you need to manually add the SSID's gateway MAC address to the layer 2 isolation list. See SSID Advanced Settings. If you have a Nebula Security Appliance installed in the site but the gateway interface with the same VLAN ID is not configured as a guest interface, Smart Guest/VLAN network tip, click here. displays after you select On. Click here to open a screen where you can directly select to use the interface as a Guest interface. |
SSID advanced settings | |
Edit | Click this button to go to the SSID advanced settings screen and configure WiFi security and advanced settings, such as band selection, enable assisted roaming and U-APSD (Unscheduled automatic power save delivery). See Site-wide > Configure > Access points > SSID advanced settings for more information on assisted roaming and U-APSD. |
WLAN security | This shows the encryption method used in this profile. |
Sign-in method | This shows the authentication method used in this profile or Disable. |
Band mode | This shows whether the SSID use either 2.4 GHz band, 5 GHz band, or the 6 GHz band. |
VLAN ID | This shows the ID number of the VLAN to which the SSID belongs. |
Rate limiting | This shows the maximum incoming/outgoing transmission data rate (in Kbps) on a per-station basis. |
Captive portal customization | |
Edit | Click this button to go to the Captive portal screen and configure the captive portal settings. See Captive Portal Customization. |
Theme | If captive portal is enabled, this shows the name of the captive portal page used in this profile. |
Label | Description |
---|---|
Recipient | |
All site administrators | Select this to send alerts to all site administrators for the current site. |
Custom email recipient | Enter the email addresses to which you want to send alerts. |
Notification Type | For each alert, you can set how to receive alert notifications: • Email: Alert notifications are sent by email to configured administrators, custom email recipients, and additional recipients. • In-app Push: Alert notifications are sent to site administrators who are logged into the Nebula Mobile app. This type of notification is not available for some features. • Both: Alert notifications are sent by email and app notification. • Disabled: No alerts are sent. |
Show additional recipients | Add additional user accounts who will receive email and in-app notifications for the alert. |
System Alerts | |
Wireless | Specify how long in minutes the NCC waits before generating and sending an alert when an AP becomes offline. |
Switches | Specify how long in minutes the NCC waits before generating and sending an alert when a port or a Switch goes offline. |
Security Appliance | Select the check box to have the NCC generate and send an alert by email when the following events occur: • A Security Appliance goes offline. • Any DHCP pool on the Security Appliance runs out of IP addresses. • A VPN connection to or from the Security Appliance is established or disconnected. • The WAN connectivity status changed. |
Mobile router | Specify how long in minutes the NCC waits before generating and sending an alert when a mobile router goes offline. |
Other | Specify whether to send an alert each time configuration settings are changed. |
Label | Description |
---|---|
Access Point / Switch / Security router / Firewall or Security Gateway / Mobile Router | |
Upgrade available | This shows the status of the Nebula Device’s firmware in your site. • Up to date is displayed if all the Nebula Device(s) of a particular type (for example, all Switches) in your site are using the latest firmware version. • Upgrade available is displayed if there is firmware update available for any of the Nebula Device(s) of a particular type in your site. Click Devices to see a table list of your Nebula Device(s) that can receive this upgrade. • Locked is displayed if all the Nebula Device(s) of a particular type (for example, all Switches) in your site are using a specific version of firmware that Zyxel customer support is monitoring for troubleshooting. • No devices is displayed if there is no Nebula Device of a particular type (for example, Mobile Router) registered in your site. |
Settings | Create a schedule for each Nebula Device type. The following Upgrade policy are available: • Select Auto upgrade at to create a recurring schedule. With a recurring schedule, NCC will check and install the firmware when a new firmware release is available for each Nebula Device type. • Select Upgrade at to install the firmware at a specific date and time (up to 1 month from now) when firmware update is available for each Nebula Device type. Due to network bandwidth and number of Nebula Devices per site, not all Nebula Devices may get the firmware upgrade on the specified date/time. This field’s setting will change to the Auto upgrade at schedule after performing the firmware update. • Select Upgrade now to immediately install the firmware for each Nebula Device type. Then select the Firmware type (Stable or Latest (default)). This button is selectable only when there is firmware update available. This field’s setting will return to it’s previous setting (Auto upgrade at or Ignore upgrade) after performing the firmware update. • Select Ignore upgrade if you choose not to install the firmware. NCC will still perform a mandatory upgrade if the Nebula Device’s firmware have security vulnerabilities, and/or lack key performance improvements. When the schedule for Auto upgrade at is earlier than the mandatory upgrade schedule, then the Auto upgrade at schedule has priority. |
Firmware type | Set the type of firmware to be installed for each Nebula Device type. • Select Stable to install a firmware that may not have the latest features but has passed Zyxel internal and external testing. • Select Latest to install the most recently release firmware with the latest features, improvements, and bug fixes. This field is hidden when Ignore upgrade is selected in Settings. We generally recommend updating to the Latest firmware type so that you get the latest features, improvements, and bug fixes. All firmware releases are thoroughly tested internally by our engineers. If your requirements are such that you prefer fewer updates, go with the Stable firmware type. |
Label | Description |
---|---|
Upgrade Now | Click this to immediately install the firmware on the selected Nebula Devices. This button is selectable only when there is firmware update available for all the selected Nebula Devices. Then, select the Firmware type to be installed. • Select Stable to install a firmware that may not have the latest features but has passed Zyxel internal and external testing. • Select Latest to install the most recently release firmware with the latest features, improvements, and bug fixes. |
Schedule Upgrade | Click this to pop up a window where you can create a new schedule for the selected Nebula Devices. You can select to upgrade firmware according to the site-wide schedule configured for the Nebula Device type in the site, create a recurring schedule, edit the schedule with a specific date and time when firmware update is available for all the selected Nebula Devices, or immediately install the firmware. With a recurring schedule, the NCC will check and perform a firmware update when a new firmware release is available for any of the selected Nebula Devices. If the NCC service is downgraded from Nebula Professional Pack to Nebula Base, the Nebula Devices automatically changes to adhere to the side-wide schedule. |
Reset | Select one or more Nebula Devices, and then click Reset to allow the Nebula Devices to follow the site-wide firmware management settings. |
Status | This shows the status of the Nebula Device. • Green: The Nebula Device is online and has no alerts. • Amber: The Nebula Device has alerts. • Red: The Nebula Device is offline. • Gray: The Nebula Device has been offline for 7 days or more. |
Device type | This shows the type of the Nebula Device. |
Model | This shows the model number of the Nebula Device. |
Tag | This shows the tag created and added to the Nebula Device. |
Name | This shows the descriptive name of the Nebula Device. |
MAC address | This shows the MAC address of the Nebula Device. |
S/N | This shows the serial number of the Nebula Device. |
Current version | This shows the version number of the firmware the Nebula Device is currently running. It shows N/A when the Nebula Device goes offline and its firmware version is not available. |
Firmware status | The status shows Good if the Nebula Device is running a stable firmware and no immediate action is required. The installed firmware does not have the latest features but provides the smoothest operation. The status shows Warning if a newer firmware is available and immediate action is recommended. The newer firmware may contain security enhancements, new features, and performance improvements. The status shows Critical if a newer firmware is available and immediate action is required. The firmware may have security vulnerabilities and/or lack key performance improvements. The status shows Custom if the Nebula Device is running a firmware with specialized features that is not available to the general public. The status changes to Upgrading... after you click Upgrade Now to install the firmware immediately. |
Firmware type | This shows Stable when the installed firmware may not have the latest features but has passed Zyxel internal and external testing. This shows Latest when the installed firmware is the most recent release with the latest features, improvements, and bug fixes. This shows General Availability when the installed firmware is a release before Latest, but is still undergoing Zyxel external testing. This shows Dedicated when the installed firmware is locked and Zyxel support is monitoring. Contact Zyxel customer support if you want to unlock the firmware in order to upgrade to a later one. This shows Beta when the installed firmware is a release version for testing the latest features and is still undergoing Zyxel internal and external testing. This shows N/A when the Nebula Device is offline and its firmware status is not available. |
Availability | This shows whether the firmware on the Nebula Device is Up to date, there is firmware update available for the Nebula Device (Upgrade available), or a specific version of firmware has been installed by Zyxel customer support (Locked). Contact Zyxel customer support if you want to unlock the firmware in order to upgrade to a later one. |
Upgrade scheduled | This shows the date and time when a new firmware upgrade is scheduled to occur. Otherwise, it shows Follow upgrade time and the Nebula Device sticks to the site-wide schedule or No when the firmware on the Nebula Device is up-to-date or the Nebula Device goes offline and its firmware status is not available. A lock icon displays if a specific schedule is created for the Nebula Device, which means the Nebula Device firmware will not be upgraded according to the schedule configured for all Nebula Devices in the site. |
Last upgrade time | This shows the last date and time the firmware was upgraded on the Nebula Device. |
Schedule upgrade version | This shows the version number of the firmware which is scheduled to be installed. |
Click this icon to display a greater or lesser number of configuration fields. |
Label | Description |
---|---|
Authorization | Select one or more than one user account and click this button to configure the authorization settings for the selected user accounts. |
Remove users | Select one or more than one user account and click this button to remove the selected user accounts. |
VPN access | Select one or more than one user account and click this button to configure whether the accounts can be used to connect to the organization’s networks through VPN. |
VLAN attribute | Select one or more than one user account and click this button to assign the users to a specific VLAN ID, or clear the VLAN ID. Then click Update. |
Search users | Enter a key word as the filter criteria to filter the list of user accounts. |
N User | This shows how many user accounts (N) match the filter criteria and how many user accounts of the selected type are created in total. |
Import | Click this button to create user accounts in bulk by importing a complete list of all new users in an Excel file. |
Add | Click this button to create a new user account. See Cloud Authentication MAC Screen. |
Export | Click this button to save the account list as a CSV or XML file to your computer. |
Email | This shows the email address of the user account. |
Username | This shows the user name of the user account. |
Description | This shows the descriptive name of the user account. |
802.1X | This shows whether 802.1X (WPA-Enterprise) authentication is enabled on the account. |
VPN access | This shows whether the accounts can be used to connect to the organization’s networks through VPN. |
Authorized | This shows whether the user has been authorized in this site or not. |
Expire in (UTC) | This shows the date and time that the account expires. This shows -- if authentication is disabled for this account. This shows Never if the account never expires. This shows Multiple value if the account has different Expire in values across different sites. |
Login by | This shows whether the user needs to log in with the email address and/or user name. |
DPPSK | This shows the account’s dynamic personal pre-shared key (DPPSK), if one is set. |
VLAN assignment | This field is available only when the account type is set to User. This shows the VLAN assigned to the user. |
2FA Status | This shows whether the account has set up two-factor authentication yet. |
Bypass 2FA | This shows whether the account is allowed to bypass two-factor authentication, if two-factor authentication is enabled on a captive portal or VPN gateway. |
Authorized by | This shows the email address of the administrator account that authorized the user. If the account has been authorized by different administrators across different sites, it shows Multiple value. |
Created by | This shows the email address of the administrator account that created the user. |
Created at | This shows the date and time that the account was created. |
Click this icon to display a greater or lesser number of configuration fields. |
Label | Description |
---|---|
Authorization | Select one or more than one account and click this button to configure the authorization settings for the selected user accounts. |
Remove users | Select one or more than one user account and click this button to remove the selected user accounts. |
Search users | Enter a key word as the filter criteria to filter the list of user accounts. |
N User | This shows how many user accounts (N) match the filter criteria and how many user accounts of the selected type are created in total. |
Import | Click this button to create user accounts in bulk by importing a complete list of all new users in an Excel file. |
Add | Click this button to create a new user account. See Cloud Authentication DPPSK Screen. |
Export | Click this button to save the account list as a CSV or XML file to your computer. |
MAC address | This shows the MAC address of the user account. |
Description | This shows the descriptive name of the user account. |
Account type | This shows the type of user account: USER, MAC, or DPPSK. |
Authorized | This shows whether the user has been authorized in this site or not. |
Authorized by | This shows the email address of the administrator account that authorized the user. If the account has been authorized by different administrators across different sites, it shows Multiple value. |
Expire in | This shows the date and time that the account expires. This shows -- if authentication is disabled for this account. This shows Never if the account never expires. This shows Multiple value if the account has different Expire in values across different sites. |
Created at | This shows the date and time that the account was created. |
Click this icon to display a greater or lesser number of configuration fields. |
Label | Description |
---|---|
Authorization | Select one or more than one user account and click this button to configure the authorization settings for the selected user accounts. |
Remove users | Select one or more than one user account and click this button to remove the selected user accounts. |
Print | Click this button to print the unique dynamic personal pre-shared key (DPPSK) and expiry time of each selected user account. The account details can be cut into cards, and then given to users in order to grant them WiFi network access. |
Search users | Enter a key word as the filter criteria to filter the list of user accounts. |
N Users | This shows how many user accounts (N) match the filter criteria and how many user accounts of the selected type are created in total. |
Import | Click this button to create user accounts in bulk by importing a complete list of all new users in an Excel file. |
Add | Click this button to create a single new account, or a batch of accounts. • Single DPPSK: See Add/Edit DPPSK Account. • Batch create DPPSK: See Batch Create DPPSK Accounts. |
Export | Click this button to save the account list as a CSV or XML file to your computer. |
Email | This shows the email address of the user account. |
Username | This shows the user name of the user account. |
Account type | This shows the type of user account: USER, MAC, or DPPSK. |
DPPSK | This shows the account’s dynamic personal pre-shared key (DPPSK). |
VLAN ID | This shows the VLAN assigned to the account. |
Description | This shows the descriptive name of the user account. |
Authorized | This shows whether the user has been authorized in this site or not. |
Expire in | This shows the date and time that the account expires. This shows -- if authentication is disabled for this account. This shows Never if the account never expires. This shows Multiple value if the account has different Expire in values across different sites. |
Created by | This shows the email address of the administrator account that created the user. |
Created at | This shows the date and time that the account was created. |
Click this icon to display a greater or lesser number of configuration fields. |
cdr | without Gold/utm security pack | with gold/utm security pack | after gold/utm security pack expires |
---|---|---|---|
With Nebula Pro Pack | CDR will not function. CDR settings will be grayed-out. | CDR full functionality. | CDR will disable its full functionality. • CDR fields in an “Enabled/Disabled” state will show “Enabled/Disabled” but grayed-out. • The Policy rule settings, Quarantine VLAN, and Exempt list will be kept in Site-wide > Configure > Collaborative detection & response. • Previously quarantined clients will be released. |
With Nebula Base/Plus Pack | CDR will not function. CDR settings will be grayed-out. | User is notified that CDR is with partial functionality only. • CDR event detection is available • CDR triggered events are logged in the Site-wide > Monitor > Site features logs • Containment actions (Alert/Block/Quarantine) is not available • Previously blocked/quarantined clients will be released in Site-wide > Monitor > Containment list. | CDR will disable its full functionality. • CDR fields in an “Enabled/Disabled” state will show “Enabled/Disabled” but grayed-out. • The Policy rule settings, Quarantine VLAN, and Exempt list will be kept in Site-wide > Configure > Collaborative detection & response. • Previously quarantined clients will be released. |
Label | Description |
---|---|
Collaborative detection & response | |
Enable | Select this check box to activate Collaborative Detection & Response. Make sure you have active Web Filtering, Anti-Malware, IPS (Intrusion Prevention System), and CDR (Collaborative Detection & Response) licenses. |
Policy | |
Category | Category refers to the signature type that identified the malicious traffic: Malware (Anti-Malware, Anti-Virus), IDP (IPS), and Web Threat (Content Filtering and URL Threat Filtering). |
Event Type | This displays some details on the category of malicious traffic detected. |
Occurrence (1–100) | Enter the number of security events that need to occur within the defined Duration to trigger a CDR Containment action. |
Duration (1–1440) | Enter the length of time in minutes the event should occur from a client the Occurrence number of times to trigger a CDR Containment action. For example, Occurrence is set to 10, and Duration is set to 100. If the NCC detects 10 or more occurrences of malicious traffic in less than 100 minutes, then CDR Containment is triggered. |
Containment | Select the action to be taken when the number of security events exceed the threshold within the defined duration. Alert: Select this if you just want to issue a notification in NCC. Block: Select this if you want to block traffic from a suspect client at the NCC, or from a suspect WiFi client at the AP connected to the NCC. Traffic is still broadcast to other clients in the same subnet. A ‘notification’ web page is displayed when this action is triggered. Quarantine: Select this if you want to isolate traffic from a suspect client at the NCC in a quarantine VLAN. Traffic is not broadcast to other clients in the same subnet. A ‘notification’ web page is displayed to the client when this action is triggered. |
Containment | Use this section to configure the selection containment action. |
General | |
Theme | Configure the CDR block page. • Click the Preview icon at the upper right corner of a theme image to display the block page in a new frame. • Click the Copy icon to create a new custom theme (block page). |
Logo | This shows the logo image that you uploaded for the customized block page. Click Choose File and specify the location and file name of the logo graphic or click Browse to locate it. You can use the following image file formats: GIF, PNG, or JPG. File size must be less than 200 KB, and images larger than 244 x 190 will be resized. |
Notification message | Enter the message that is displayed on the CDR block page. The client is redirected here when a Block or Quarantine action is triggered. For example, “Malicious traffic is coming from your device so traffic is temporarily stopped. Please contact the network administrator.” Redirect external URL: Enter a URL in “http://domain” or “https://domain” format to an external notification page. The client is redirected here when a Block or Quarantine action is triggered. Make sure the external notification page is accessible from the NCC. |
Redirect external URL | Enable this setting, and then enter a URL in “http://domain” or “https://domain” format to an external notification page. The client is redirected to this page when a Block or Quarantine action is triggered. You can download a sample block page by clicking Download. The external notification page must be accessible from NCC. |
Containment Period | Enter how long the client should be blocked or quarantined. This should be at least twice the DHCP server lease time in order to prevent false positives. |
Block | Enter how long a suspect client should be blocked or quarantined. You can enter from 1 minute to 1 day (1,440 minutes). 0 means the suspect is blocked forever until released in Site-wide > Monitor > Containment list. |
Block wireless client | Select this to have traffic from the suspect client blocked at the AP. Clear this to have traffic from the suspect client blocked at the NCC. |
Quarantine | |
Quarantine VLAN | Click Set to configure a VLAN in order to isolate traffic from suspect clients. Traffic from a suspect client is broadcast to all members in the VLAN. |
Exempt list | Enter IPv4 and /or MAC addresses of client devices that are exempt from CDR checking. |
Label | Description |
---|---|
Interface Properties | |
Interface Name | This field is read-only. The default name is “Quarantine”. |
Port group | Select the name of the port group to which you want the interface to belong. |
Base Port | Select the Ethernet interface on which the VLAN interface runs. |
VLAN ID | Enter the VLAN ID. This 12-bit number uniquely identifies each VLAN. Allowed values are 1 – 4094. (0 and 4095 are reserved) |
IP address assignment | This is a 3-bit field within a 802.1Q VLAN tag that is used to prioritize associated outgoing VLAN traffic. “0” is the lowest priority level and “7” is the highest. |
IP address | Enter the IP address for this interface. |
Subnet mask | Enter the subnet mask of this interface in dot decimal notation. The subnet mask indicates what part of the IP address is the same for all computers in the network. |
DHCP Server | |
Get Automatically | Enter the IP address from which the Security Appliance begins allocating IP addresses. If you want to assign a static IP address to a specific computer, click Add new under Static DHCP Table. |
IP pool start address | Enter the IP address from which the Security Appliance begins allocating IP addresses for this VLAN. |
Pool size | Enter the total number of IP addresses the DHCP server will hand out. |
OK | Click OK to save your changes back to the NCC. |
Cancel | Click Cancel to exit this screen without saving. |
Label | Description |
---|---|
Site Information | |
Site name | Enter a descriptive name for the site. |
Local time zone | Choose the time zone of the site’s location. |
Site location | Enter the complete address or coordinates (physical location) of the Nebula Devices in the site. All newly added Nebula Devices will automatically use this as the default address and location on the Google map. You can edit each Nebula Device’s location on the Google map. |
Device configuration | |
Local credentials | The default password is generated automatically by the NCC when the site is created. You can specify a new password to access the status page of the Nebula Device’s built-in web-based configurator. The settings here apply to all Nebula Devices in this site. |
Smart guest/VLAN network | Click On to enable this feature. This allows the NCC to check if the VLAN ID and guest network settings are consistent on the APs and Security Appliance in the same site to ensure guest network connectivity. The guest settings you configure for a gateway interface (in Site-wide > Configure > Security gateway > Interface addressing) will also apply to the WiFi networks (SSIDs) associated with the same VLAN ID (in Site-wide > Configure > Access points > SSID settings). For example, if you set a gateway interface in VLAN 100 as a guest interface, the SSID that belongs to VLAN 100 will also act as a guest network. |
Captive portal reauthentication | |
For my AD server users | Select how often the user (authenticated by an AD server) has to log in again. |
For my RADIUS server users | Select how often the user (authenticated by a RADIUS server) has to log in again. |
For click-to-continue users | Select how often the user (authenticated through the captive portal) has to log in again. |
For cloud authentication users | Select how often the user (authenticated using the NCC user database) has to log in again. |
SNMP | |
SNMP access | Select V1/V2c to allow SNMP managers using SNMP to access the Nebula Devices in this site. Otherwise, select Disable. |
SNMP community string | This field is available when you select V1/V2c. Enter the password for the incoming SNMP requests from the management station. |
Reporting | |
Syslog server | Click Add to create a new entry. |
Server IP | Enter the IP address of the server. |
Types | Select the type of logs the server is for. Besides sending Gateway traffic log to a Syslog server, you can also set the Security Appliance (through its Web Configurator) to save a copy of the logs to a connected USB storage device. Gateway traffic log includes the traffic information (such as its source, destination or usage) of the Security Appliance clients. |
Action | Click the Delete icon to remove the entry. |
Use timezone for syslog server logs | Click On to enable this feature. This allows the Syslog server logs to use the site’s timezone. If disabled, the Syslog server logs will show GMT 0 time. GMT does not adjust automatically for Daylight Savings Time (DST). You must adjust for Daylight Savings directly in the Syslog server. |
AP traffic log | Log traffic for access points in the site that have NAT mode enabled. You can also send the logs to a Syslog server, by selecting AP traffic log under Syslog server > Types. For details on configuring NAT mode, see SSID Advanced Settings. |
SecuReporter | Click On to enable this feature. This allows the NCC to send traffic logs to SecuReporter. Disable this option if you have configured sending of traffic logs to an external syslog server. |
API access | API access allows third-party software to integrate with the DPPSK feature in NCC. For more information, please contact Zyxel. |
API token | Generate an API token for DPPSK third-party integration. |
Copy | Click this button to copy the API key to the system’s clipboard. |
Delete | Click this button to delete the API key. |