ZyXEL Communications ZyXEL ZyAIR NWA-3500 User Manual

Page 14

Advertising
background image

Table of Contents

ZyXEL NWA-3500 User’s Guide

14

7.3 EAP Authentication Overview ............................................................................................ 104
7.4 Introduction to WPA ........................................................................................................... 104

7.4.1 User Authentication ................................................................................................. 105
7.4.2 Encryption ............................................................................................................... 105
7.4.3 WPA(2)-PSK Application Example ........................................................................... 105

7.5 WPA(2) with External RADIUS Application Example ......................................................... 106
7.6 Security Modes .................................................................................................................. 107
7.7 Wireless Client WPA Supplicants ...................................................................................... 108
7.8 Wireless Security Effectiveness ......................................................................................... 108
7.9 Configuring Security .......................................................................................................... 108

7.9.1 Security: WEP .......................................................................................................... 109
7.9.2 Security: 802.1x Only ................................................................................................110
7.9.3 Security: 802.1x Static 64-bit, 802.1x Static 128-bit ..................................................111
7.9.4 Security: WPA ...........................................................................................................113
7.9.5 Security: WPA2 or WPA2-MIX ...................................................................................113
7.9.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ...................................................115

7.10 Introduction to RADIUS ....................................................................................................116
7.11 Configuring RADIUS .........................................................................................................116

Chapter 8
MBSSID and SSID ................................................................................................................. 119

8.1 Wireless LAN Infrastructures ..............................................................................................119

8.1.1 MBSSID ....................................................................................................................119
8.1.2 Notes on Multiple BSS ..............................................................................................119
8.1.3 Multiple BSS Example ...............................................................................................119
8.1.4 Multiple BSS with VLAN Example .............................................................................119
8.1.5 Configuring Multiple BSSs ....................................................................................... 120

8.2 SSID .................................................................................................................................. 122

8.2.1 The SSID Screen ..................................................................................................... 122
8.2.2 Configuring SSID ..................................................................................................... 123

Chapter 9
Other Wireless Configuration .............................................................................................. 127

9.1 Layer-2 Isolation Introduction ............................................................................................ 127
9.2 The Layer-2 Isolation Screen ............................................................................................ 128
9.3 Configuring Layer-2 Isolation ............................................................................................. 129

9.3.1 Layer-2 Isolation Examples ...................................................................................... 130

9.3.1.1 Layer-2 Isolation Example 1 ........................................................................... 131
9.3.1.2 Layer-2 Isolation Example 2 ........................................................................... 131

9.4 The MAC Filter Screen ...................................................................................................... 132

9.4.1 Configuring MAC Filtering ........................................................................................ 133

9.5 Configuring Roaming ......................................................................................................... 134

9.5.1 Requirements for Roaming ...................................................................................... 135

Advertising