ZyXEL Communications P-334W User Manual

Page 11

Advertising
background image

Prestige 334W User’s Guide

Table of Contents

xi

7.4

Configuring Roaming .................................................................................................................. 7-6

7.4.1

Requirements for Roaming .................................................................................................... 7-8

Chapter 8 Wireless Security........................................................................................................................ 8-1

8.1

Wireless Security Overview......................................................................................................... 8-1

8.2

Security Parameters Summary ................................................................................................... 8-3

8.3

WEP Overview ............................................................................................................................. 8-4

8.3.1

Data Encryption ..................................................................................................................... 8-4

8.3.2

Authentication........................................................................................................................ 8-4

8.3.3

Preamble Type ....................................................................................................................... 8-6

8.4

Configuring WEP Encryption..................................................................................................... 8-6

8.5

Introduction to WPA.................................................................................................................... 8-8

8.5.1

User Authentication ............................................................................................................... 8-9

8.5.2

Encryption.............................................................................................................................. 8-9

8.5.3

WPA-PSK Application Example ........................................................................................... 8-9

8.6

Configuring WPA-PSK Authentication.................................................................................... 8-10

8.7

Wireless Client WPA Supplicants ............................................................................................. 8-13

8.7.1

WPA with RADIUS Application Example .......................................................................... 8-13

8.8

Configuring WPA Authentication ............................................................................................. 8-14

8.9

802.1x Overview ......................................................................................................................... 8-16

8.10

Dynamic WEP Key Exchange ............................................................................................... 8-17

8.11

Configuring 802.1x and Dynamic WEP Key Exchange .......................................................... 8-17

8.12

Configuring 802.1x and Static WEP Key Exchange............................................................ 8-19

8.13

Configuring 802.1x................................................................................................................. 8-23

8.14

MAC Filter.............................................................................................................................. 8-25

8.15

Introduction to Local User Database.................................................................................... 8-27

8.16

Configuring Local User Database......................................................................................... 8-28

8.17

Introduction to RADIUS ....................................................................................................... 8-29

8.17.1

EAP Authentication Overview............................................................................................. 8-30

8.18

Configuring RADIUS............................................................................................................. 8-31

Chapter 9 WAN Screens .............................................................................................................................. 9-1

9.1

WAN Overview............................................................................................................................. 9-1

9.2

TCP/IP Priority (Metric) ............................................................................................................. 9-1

9.3

Configuring Route........................................................................................................................ 9-1

9.4

Configuring WAN ISP ................................................................................................................. 9-2

9.4.1

Ethernet Encapsulation........................................................................................................... 9-2

9.4.2

PPPoE Encapsulation ............................................................................................................. 9-4

9.4.3

PPTP Encapsulation ............................................................................................................... 9-6

9.5

Configuring WAN IP.................................................................................................................... 9-7

9.6

Configuring WAN MAC .............................................................................................................9-11

9.7

Traffic Redirect .......................................................................................................................... 9-12

9.8

Configuring Traffic Redirect..................................................................................................... 9-13

Advertising