ZyXEL Communications G-2000 Plus User Manual

Page 12

Advertising
background image

ZyAIR G-2000 Plus User’s Guide

11

Table of Contents

Chapter 7
Wireless Security ...................................................................................................
88

7.1 Wireless Security Overview ...............................................................................88
7.2 Security Parameters Summary ..........................................................................90
7.3 WEP Overview ...................................................................................................90

7.3.1 Data Encryption .......................................................................................90

7.3.1.1 Authentication .................................................................................90

7.4 Configuring WEP Encryption ..............................................................................91
7.5 Introduction to WPA ...........................................................................................93

7.5.1 User Authentication .................................................................................93
7.5.2 Encryption ................................................................................................94
7.5.3 WPA-PSK Application Example ................................................................94

7.6 Configuring WPA-PSK Authentication ................................................................95
7.7 Wireless Client WPA Supplicants .......................................................................97

7.7.1 WPA with RADIUS Application Example ..................................................97

7.8 Configuring WPA Authentication ........................................................................98
7.9 Introduction to RADIUS ....................................................................................100

7.9.1 Types of RADIUS Messages ..................................................................100

7.9.1.1 Access-Challenge .........................................................................100
7.9.1.2 Accounting-Request ......................................................................101
7.9.1.3 Accounting-Response ...................................................................101
7.9.1.4 EAP Authentication Overview .......................................................101

7.10 Configuring RADIUS ......................................................................................102
7.11 802.1x Overview .............................................................................................104
7.12 Dynamic WEP Key Exchange ........................................................................104
7.13 Configuring 802.1x and Dynamic WEP Key Exchange ..................................105
7.14 Configuring 802.1x and Static WEP Key Exchange .......................................107
7.15 Configuring 802.1x .........................................................................................110
7.16 MAC Filter ......................................................................................................112

Chapter 8
Internal RADIUS Server ....................................................................................... 11
4

8.1 Internal RADIUS Overview ...............................................................................114
8.2 Internal RADIUS Server Setting .......................................................................116
8.3 Trusted AP Overview .......................................................................................118
8.4 Configuring Trusted AP ....................................................................................119
8.5 Trusted Users Overview ...................................................................................120
8.6 Configuring Trusted Users ...............................................................................120

Chapter 9
WAN.......................................................................................................................
124

9.1 WAN Overview .................................................................................................124
9.2 Configuring WAN ISP .......................................................................................124

Advertising