ZyXEL Communications ZyWall 70 User Manual page 11

Internet security appliance
Hide thumbs Also See for ZyWall 70:
Table of Contents

Advertisement

Wireless LAN ........................................................................................................ 109
6.1 Introduction ......................................................................................................109
6.2 Wireless Security .............................................................................................109
6.3 Security Parameters Summary ........................................................................110
6.4 WEP Encryption ............................................................................................... 111
6.5 802.1x Overview .............................................................................................. 111
6.6 Dynamic WEP Key Exchange .......................................................................... 111
6.7 Introduction to WPA .........................................................................................112
6.8 WPA-PSK Application Example .......................................................................113
6.9 Introduction to RADIUS ....................................................................................113
6.10 WPA with RADIUS Application Example ........................................................114
6.11 Wireless Client WPA Supplicants ...................................................................114
6.12 Configuring Wireless LAN ..............................................................................115
6.13 Configuring MAC Filter ...................................................................................127
WAN Screens........................................................................................................ 131
7.1 WAN Overview .................................................................................................131
7.2 Multiple WAN ....................................................................................................131
7.3 Load Balancing Introduction .............................................................................132
7.4 Load Balancing Algorithms ..............................................................................132
7.5 TCP/IP Priority (Metric) ....................................................................................135
7.6 Configuring General .........................................................................................135
7.7 Configuring Load Balancing .............................................................................138
Table of Contents
6.7.1 User Authentication ................................................................................112
6.7.2 Encryption ...............................................................................................112
6.12.1 Static WEP ............................................................................................117
6.12.2 WPA-PSK .............................................................................................119
6.12.3 WPA ......................................................................................................120
6.12.4 802.1x + Dynamic WEP ........................................................................121
6.12.5 802.1x + Static WEP .............................................................................123
6.12.6 802.1x + No WEP .................................................................................124
6.12.7 No Access 802.1x + Static WEP ...........................................................126
6.12.8 No Access 802.1x + No WEP ...............................................................127
6.13.1 EAP Authentication Overview ...............................................................129
7.4.1 Least Load First ......................................................................................132
7.4.1.1 Example 1 .....................................................................................132
7.4.1.2 Example 2 .....................................................................................133
7.4.2 Weighted Round Robin ...........................................................................134
7.4.3 Spillover ..................................................................................................134
7.7.1 Least Load First ......................................................................................138
ZyWALL 70 User's Guide
11

Advertisement

Table of Contents
loading

Table of Contents