ZyXEL Communications 2602HWNLI-D7A Modem User Manual


 
Prestige 2602HWNLI-D7A Support Notes
All contents copyright (c) 2007 ZyXEL Communications Corporation.
8
How do I secure the data across an Access Point's radio link ? ........................................................................................ 218
What is WEP ? .................................................................................................................................................................. 218
What is the difference between 40-bit and 64-bit WEP ? ............................................................................................. 218
What is a WEP key ? ......................................................................................................................................................... 218
A WEP key is a user defined string of characters used to encrypt and decrypt data ? ..................................................... 218
Can the SSID be encrypted ? ............................................................................................................................................. 218
By turning off the broadcast of SSID, can someone still sniff the SSID ? .......................................................................... 219
What are Insertion Attacks? ............................................................................................................................................. 219
What is Wireless Sniffer? .................................................................................................................................................. 219
What is the difference between Open System and Shared Key of Authentication Type ? ................................................ 219
What is 802.1x ? ............................................................................................................................................................... 219
What is the difference between No authentication required, No access allowed and Authentication required ? ........... 220
What is AAA ? ................................................................................................................................................................... 220
What is RADIUS ? .............................................................................................................................................................. 220
What is WPA ? .................................................................................................................................................................. 220
What is WPA-PSK? ............................................................................................................................................................ 221
TROUBLE SHOOTING...........................................................................................................................................................221
USING EMBEDDED PACKET TRACE ................................................................................................................................................. 221
DEBUG PPPOE CONNECTION ....................................................................................................................................................... 235
CLI COMMAND LIST ............................................................................................................................................................246
Application Notes
General Application Notes
Internet Connection
A typical Internet access application of the Prestige is shown below. For a small office, there are some
components needs to be checked before accessing the Internet.
Before you begin
Setting up the Windows
Setting up the Prestige router