ZyXEL Communications ZyAIR G-500 User Manual page 8

802.11g wireless access point
Hide thumbs Also See for ZyAIR G-500:
Table of Contents

Advertisement

ZyAIR G-500 Wireless Access Point User's Guide
5.1.2
BSS ....................................................................................................................................5-1
5.1.3
ESS ....................................................................................................................................5-2
5.2
Wireless LAN Basics.................................................................................................................5-3
5.2.1
RTS/CTS............................................................................................................................5-3
5.2.2
Fragmentation Threshold ...................................................................................................5-4
5.3
Configuring Wireless .................................................................................................................5-5
5.4
Configuring Roaming ................................................................................................................5-6
5.4.1
Requirements for Roaming ................................................................................................5-8
Chapter 6 Wireless Security........................................................................................................................6-1
6.1
Wireless Security Overview.......................................................................................................6-1
6.2
WEP Overview ..........................................................................................................................6-1
6.2.1
Data Encryption .................................................................................................................6-2
6.2.2
Authentication....................................................................................................................6-2
6.3
Preamble Type ...........................................................................................................................6-3
6.4
Configuring WEP Encryption....................................................................................................6-3
6.5
MAC Filter.................................................................................................................................6-6
6.6
802.1x Overview........................................................................................................................6-8
6.7
Introduction to RADIUS............................................................................................................6-8
6.7.1
EAP Authentication Overview...........................................................................................6-9
6.8
Dynamic WEP Key Exchange .................................................................................................6-10
6.9
Introduction to WPA................................................................................................................6-11
6.9.1
User Authentication .........................................................................................................6-11
6.9.2
Encryption........................................................................................................................6-11
6.10 WPA-PSK Application Example .............................................................................................6-12
6.11 WPA with RADIUS Application Example..............................................................................6-12
6.12 Security Parameters Summary .................................................................................................6-13
6.13 Wireless Client WPA Supplicants ...........................................................................................6-14
6.14 Configuring 802.1x and WPA .................................................................................................6-14
6.14.1
Authentication Required: 802.1x .....................................................................................6-15
6.14.2
Authentication Required: WPA .......................................................................................6-18
6.14.3
Authentication Required: WPA-PSK...............................................................................6-20
6.15 Introduction to Local User Database........................................................................................6-21
6.16 Configuring Local User Database............................................................................................6-21
6.17 Configuring RADIUS ..............................................................................................................6-23
Chapter 7 IP Screen .....................................................................................................................................7-1
7.1
Factory Ethernet Defaults ..........................................................................................................7-1
7.2
TCP/IP Parameters.....................................................................................................................7-1
7.2.1
IP Address and Subnet Mask .............................................................................................7-1
7.3
Configuring IP ...........................................................................................................................7-1
REMOTE MANAGEMENT AND LOGS ..................................................................................................IV
Chapter 8 Remote Management.................................................................................................................8-1
viii
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents