ZyAIR G-405 User's Guide
4.1
Web Configurator Overview........................................................................................................4-1
4.2
4.3
Resetting the ZyAIR ....................................................................................................................4-2
4.3.1
4.3.2
4.4
4.5
Change Your Password................................................................................................................4-3
4.6
The Information Screen ...............................................................................................................4-4
4.6.1
Using the Site Survey...........................................................................................................4-6
5.1
Overview......................................................................................................................................5-1
5.1.1
5.1.2
LAN MAC Address Cloning ...............................................................................................5-3
6.1
6.1.1
Data Encryption with WEP..................................................................................................6-2
6.1.2
IEEE 802.1x.........................................................................................................................6-2
6.1.3
WPA ....................................................................................................................................6-3
6.1.4
6.1.5
6.2
6.3
6.4
Configuring IEEE802.1x .............................................................................................................6-8
6.4.1
IEEE802.1x with MD5 ........................................................................................................6-8
6.4.2
IEEE802.1x with TLS........................................................................................................6-10
6.4.3
IEEE802.1x with TTLS ..................................................................................................... 6-12
6.5
Configuring WPA ......................................................................................................................6-14
6.5.1
WPA with TLS ..................................................................................................................6-14
6.5.2
WPA with TTLS ................................................................................................................6-16
6.5.3
WPA-PSK..........................................................................................................................6-18
6.6
The Log Table Screen................................................................................................................6-19
7.1
Introduction..................................................................................................................................7-1
7.2
7.3
IP Settings....................................................................................................................................7-3
7.4
7.5
Restore Configuration..................................................................................................................7-5
7.6
Firmware Upgrade .......................................................................................................................7-6
x
Table of Contents