ZyXEL Communications 2602HW Series Network Router User Manual


 
Prestige 2602HW Series User’s Guide
9
5.4 LAN TCP/IP ........................................................................................................75
5.4.1 Factory LAN Defaults ................................................................................75
5.4.2 IP Address and Subnet Mask ...................................................................75
5.4.3 RIP Setup .................................................................................................75
5.4.4 Multicast ....................................................................................................76
5.5 Any IP .................................................................................................................76
5.5.1 How Any IP Works ....................................................................................77
5.6 Configuring LAN .................................................................................................78
5.7 Configuring Static DHCP ....................................................................................80
Chapter 6
Wireless LAN Setup ............................................................................................... 81
6.1 Wireless LAN Introduction ..................................................................................81
6.1.1 Additional Installation Requirements for Using IEEE 802.1x ....................81
6.1.2 Channel ....................................................................................................81
6.1.3 ESS ID ......................................................................................................82
6.1.4 RTS/CTS ..................................................................................................82
6.1.5 Fragmentation Threshold ..........................................................................83
6.2 Levels of Security ...............................................................................................83
6.3 Data Encryption with WEP .................................................................................84
6.4 Configuring Wireless LAN ..................................................................................84
6.5 Configuring MAC Filter .......................................................................................86
6.6 Network Authentication ......................................................................................88
6.6.1 EAP ...........................................................................................................88
6.6.1.1 RADIUS ...........................................................................................88
6.6.1.2 Types of RADIUS Messages ...........................................................88
6.6.2 EAP Authentication Overview ...................................................................89
6.7 Introduction to WPA ...........................................................................................90
6.7.1 User Authentication .................................................................................90
6.7.2 Encryption ................................................................................................90
6.8 WPA-PSK Application Example .........................................................................91
6.9 WPA with RADIUS Application Example ............................................................91
6.10 Security Parameters Summary ........................................................................92
6.11 Wireless Client WPA Supplicants ....................................................................93
6.12 Configuring 802.1x and WPA ...........................................................................93
6.12.1 Authentication Required: 802.1x .............................................................94
6.12.2 Authentication Required: WPA ...............................................................96
6.12.3 Authentication Required: WPA-PSK .......................................................97
6.13 Configuring Local User Authentication .............................................................99
6.14 Configuring RADIUS ......................................................................................100