ZyXEL Communications ZyAIR G-2000 Plus User Manual page 12

802.11g wireless 4-port router
Hide thumbs Also See for ZyAIR G-2000 Plus:
Table of Contents

Advertisement

ZyAIR G-2000 Plus User's Guide
Wireless Security ................................................................................................... 88
7.1 Wireless Security Overview ...............................................................................88
7.2 Security Parameters Summary ..........................................................................90
7.3 WEP Overview ...................................................................................................90
7.4 Configuring WEP Encryption ..............................................................................91
7.5 Introduction to WPA ...........................................................................................93
7.6 Configuring WPA-PSK Authentication ................................................................95
7.7 Wireless Client WPA Supplicants .......................................................................97
7.8 Configuring WPA Authentication ........................................................................98
7.9 Introduction to RADIUS ....................................................................................100
7.10 Configuring RADIUS ......................................................................................102
7.11 802.1x Overview .............................................................................................104
7.12 Dynamic WEP Key Exchange ........................................................................104
7.13 Configuring 802.1x and Dynamic WEP Key Exchange ..................................105
7.14 Configuring 802.1x and Static WEP Key Exchange .......................................107
7.15 Configuring 802.1x .........................................................................................110
7.16 MAC Filter ......................................................................................................112
Chapter 8
Internal RADIUS Server ....................................................................................... 114
8.1 Internal RADIUS Overview ...............................................................................114
8.2 Internal RADIUS Server Setting .......................................................................116
8.3 Trusted AP Overview .......................................................................................118
8.4 Configuring Trusted AP ....................................................................................119
8.5 Trusted Users Overview ...................................................................................120
8.6 Configuring Trusted Users ...............................................................................120
WAN....................................................................................................................... 124
9.1 WAN Overview .................................................................................................124
9.2 Configuring WAN ISP .......................................................................................124
11
7.3.1 Data Encryption .......................................................................................90
7.3.1.1 Authentication .................................................................................90
7.5.1 User Authentication .................................................................................93
7.5.2 Encryption ................................................................................................94
7.5.3 WPA-PSK Application Example ................................................................94
7.7.1 WPA with RADIUS Application Example ..................................................97
7.9.1 Types of RADIUS Messages ..................................................................100
7.9.1.1 Access-Challenge .........................................................................100
7.9.1.2 Accounting-Request ......................................................................101
7.9.1.3 Accounting-Response ...................................................................101
7.9.1.4 EAP Authentication Overview .......................................................101
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents