ZyXEL Communications 2602H Series Network Card User Manual


 
Prestige 2602H/HW Series User’s Guide
Table of Contents 13
5.2.3 Restricted Access .....................................................................................92
5.2.4 Hide Prestige Identity ................................................................................92
5.2.5 Configuring Wireless LAN on the Prestige ...............................................92
5.3 Configuring the Wireless Screen ........................................................................93
5.3.1 WEP Encryption ........................................................................................93
5.4 Configuring MAC Filters .....................................................................................95
5.5 Introduction to WPA ...........................................................................................97
5.5.1 WPA-PSK Application Example ................................................................97
5.5.2 WPA with RADIUS Application Example ..................................................98
5.5.3 Wireless Client WPA Supplicants ............................................................99
5.6 Configuring IEEE 802.1x and WPA ....................................................................99
5.6.1 Authentication Required: 802.1x .............................................................100
5.6.2 Authentication Required: WPA ...............................................................102
5.6.3 Authentication Required: WPA-PSK .......................................................104
5.7 Configuring Local User Authentication .............................................................105
5.8 Configuring RADIUS ........................................................................................106
Chapter 6
WAN Setup............................................................................................................ 109
6.1 WAN Overview .................................................................................................109
6.1.1 Encapsulation .........................................................................................109
6.1.1.1 ENET ENCAP ...............................................................................109
6.1.1.2 PPP over Ethernet ........................................................................109
6.1.1.3 PPPoA ...........................................................................................109
6.1.1.4 RFC 1483 ......................................................................................110
6.1.2 Multiplexing .............................................................................................110
6.1.2.1 VC-based Multiplexing ..................................................................110
6.1.2.2 LLC-based Multiplexing .................................................................110
6.1.3 VPI and VCI ............................................................................................110
6.1.4 IP Address Assignment ..........................................................................110
6.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation ...................110
6.1.4.2 IP Assignment with RFC 1483 Encapsulation ............................... 111
6.1.4.3 IP Assignment with ENET ENCAP Encapsulation ........................ 111
6.1.5 Nailed-Up Connection (PPP) .................................................................. 111
6.2 Metric .............................................................................................................. 111
6.3 PPPoE Encapsulation ......................................................................................112
6.4 Traffic Shaping .................................................................................................112
6.5 Zero Configuration Internet Access ..................................................................113
6.6 Configuring WAN Setup ...................................................................................113
6.7 Traffic Redirect .................................................................................................116
6.8 Configuring WAN Backup .................................................................................117