ZyXEL Communications P-334W User Manual
Page 11

Prestige 334W User’s Guide
Table of Contents
xi
7.4
Configuring Roaming .................................................................................................................. 7-6
7.4.1
Requirements for Roaming .................................................................................................... 7-8
Chapter 8 Wireless Security........................................................................................................................ 8-1
8.1
Wireless Security Overview......................................................................................................... 8-1
8.2
Security Parameters Summary ................................................................................................... 8-3
8.3
WEP Overview ............................................................................................................................. 8-4
8.3.1
Data Encryption ..................................................................................................................... 8-4
8.3.2
Authentication........................................................................................................................ 8-4
8.3.3
Preamble Type ....................................................................................................................... 8-6
8.4
Configuring WEP Encryption..................................................................................................... 8-6
8.5
Introduction to WPA.................................................................................................................... 8-8
8.5.1
User Authentication ............................................................................................................... 8-9
8.5.2
Encryption.............................................................................................................................. 8-9
8.5.3
WPA-PSK Application Example ........................................................................................... 8-9
8.6
Configuring WPA-PSK Authentication.................................................................................... 8-10
8.7
Wireless Client WPA Supplicants ............................................................................................. 8-13
8.7.1
WPA with RADIUS Application Example .......................................................................... 8-13
8.8
Configuring WPA Authentication ............................................................................................. 8-14
8.9
802.1x Overview ......................................................................................................................... 8-16
8.10
Dynamic WEP Key Exchange ............................................................................................... 8-17
8.11
Configuring 802.1x and Dynamic WEP Key Exchange .......................................................... 8-17
8.12
Configuring 802.1x and Static WEP Key Exchange............................................................ 8-19
8.13
Configuring 802.1x................................................................................................................. 8-23
8.14
MAC Filter.............................................................................................................................. 8-25
8.15
Introduction to Local User Database.................................................................................... 8-27
8.16
Configuring Local User Database......................................................................................... 8-28
8.17
Introduction to RADIUS ....................................................................................................... 8-29
8.17.1
EAP Authentication Overview............................................................................................. 8-30
8.18
Configuring RADIUS............................................................................................................. 8-31
Chapter 9 WAN Screens .............................................................................................................................. 9-1
9.1
WAN Overview............................................................................................................................. 9-1
9.2
TCP/IP Priority (Metric) ............................................................................................................. 9-1
9.3
Configuring Route........................................................................................................................ 9-1
9.4
Configuring WAN ISP ................................................................................................................. 9-2
9.4.1
Ethernet Encapsulation........................................................................................................... 9-2
9.4.2
PPPoE Encapsulation ............................................................................................................. 9-4
9.4.3
PPTP Encapsulation ............................................................................................................... 9-6
9.5
Configuring WAN IP.................................................................................................................... 9-7
9.6
Configuring WAN MAC .............................................................................................................9-11
9.7
Traffic Redirect .......................................................................................................................... 9-12
9.8
Configuring Traffic Redirect..................................................................................................... 9-13