Restricted Access; Hide G-1000 Identity; Configuring Wireless Lan On The G-1000 - ZyXEL Communications ZyXEL ZyAIR G-1000 User Manual

802.11g wireless access point
Hide thumbs Also See for ZyXEL ZyAIR G-1000:
Table of Contents

Advertisement

• Use the Local User Database if you have less than 32 wireless clients in your network.
The G-1000 uses MD5 encryption when a client authenticates with the Local User
Database

6.2.3 Restricted Access

The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).

6.2.4 Hide G-1000 Identity

If you hide the ESSID, then the G-1000 cannot be seen when a wireless client scans for local
APs. The trade-off for the extra security of "hiding" the G-1000 may be inconvenience for
some valid WLAN clients.

6.2.5 Configuring Wireless LAN on the G-1000

1 Configure the
ESSID and WEP in
the Wireless screen. If you configure WEP, you can't configure WPA(2) or WPA(2)-
PSK.
2 Use the MAC Filter screen to restrict access to your wireless network by MAC address.
3 Use the Roaming screen to configure the G-1000 so that in a network environment with
multiple access points, wireless stations are able to switch from one access point to
another as they move between the coverage areas.
4 Configure WPA(2) or WPA(2)-PSK in the 802.1x/WPA screen. Configure 802.1x
wireless client authentication in the 802.1x/WPA screen.
5 Configure the built-in authentication database in the Local User Database screen.
6 Configure the authentication and accounting servers for RADIUS in the RADIUS screen.
The following figure shows the relative effectiveness of these wireless security methods
available on your G-1000.
Chapter 6 Wireless LAN
G-1000 User's Guide
51

Advertisement

Table of Contents
loading

Table of Contents