ZyXEL Communications ZyWall 35 User Manual page 10

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 User's Guide
4.2 DHCP Setup .......................................................................................................97
4.3 LAN TCP/IP ........................................................................................................98
4.4 Configuring LAN .................................................................................................99
4.5 Configuring Static DHCP ..................................................................................101
4.6 Configuring IP Alias ..........................................................................................102
4.7 Configuring Port Roles .....................................................................................104
Bridge Screens..................................................................................................... 107
5.1 Bridge Loop ......................................................................................................107
5.2 Spanning Tree Protocol (STP) .........................................................................107
5.3 Configuring Bridge ...........................................................................................109
5.4 Configuring Port Roles ..................................................................................... 111
Chapter 6
Wireless LAN and Authentication Server .......................................................... 113
6.1 Wireless LAN Overview ...................................................................................113
6.2 Wireless LAN Basics ........................................................................................113
6.3 Wireless Security .............................................................................................115
6.4 Security Parameters Summary ........................................................................116
6.5 WEP Encrytion .................................................................................................116
6.6 802.1x Overview ..............................................................................................117
6.7 Dynamic WEP Key Exchange ..........................................................................117
6.8 Introduction to WPA .........................................................................................117
6.9 WPA-PSK Application Example .......................................................................118
6.10 WPA with RADIUS Application Example ........................................................119
8
4.2.1 IP Pool Setup ............................................................................................97
4.2.2 DNS Servers .............................................................................................97
4.3.1 Factory LAN Defaults ................................................................................98
4.3.2 IP Address and Subnet Mask ...................................................................98
4.3.3 RIP Setup .................................................................................................98
4.3.4 Multicast ....................................................................................................99
5.2.1 Rapid STP ..............................................................................................108
5.2.2 STP Terminology ....................................................................................108
5.2.3 How STP Works .....................................................................................108
5.2.4 STP Port States ......................................................................................109
6.2.1 Channel ..................................................................................................113
6.2.2 ESS ID ....................................................................................................113
6.2.3 RTS/CTS ...............................................................................................114
6.2.4 Fragmentation Threshold ........................................................................115
6.8.1 User Authentication ................................................................................117
6.8.2 Encryption ...............................................................................................118

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zywall 70

Table of Contents