ZyXEL Communications ZyXEL G-560 Network Router User Manual


 
ZyXEL G-560 User’s Guide
viii Table of Contents
5.2.2 IP Address and Subnet Mask .............................................................................................5-2
5.3 Configuring System Settings .....................................................................................................5-2
5.4 Time Settings.............................................................................................................................5-4
Chapter 6 Wireless Screens.........................................................................................................................6-1
6.1 Wireless LAN Overview............................................................................................................6-1
6.1.1 IBSS...................................................................................................................................6-1
6.1.2 BSS ....................................................................................................................................6-1
6.1.3 ESS ....................................................................................................................................6-2
6.2 Wireless LAN Basics.................................................................................................................6-3
6.2.1 Channel..............................................................................................................................6-3
6.2.2 SSID...................................................................................................................................6-3
6.2.3 RTS/CTS............................................................................................................................6-4
6.2.4 Fragmentation Threshold...................................................................................................6-5
6.3 Configuring Wireless.................................................................................................................6-5
6.4 Wireless Security Overview.......................................................................................................6-7
6.5 WEP Overview ..........................................................................................................................6-8
6.5.1 Data Encryption .................................................................................................................6-8
6.5.2 Authentication....................................................................................................................6-8
6.6 802.1x Overview......................................................................................................................6-10
6.7 Introduction to RADIUS..........................................................................................................6-10
6.7.1 EAP Authentication Overview.........................................................................................6-11
6.8 Dynamic WEP Key Exchange.................................................................................................6-12
6.9 Introduction to WPA................................................................................................................6-12
6.9.1 User Authentication .........................................................................................................6-12
6.9.2 Encryption........................................................................................................................6-12
6.10 WPA-PSK Application Example.............................................................................................6-13
6.11 WPA with RADIUS Application Example..............................................................................6-14
6.12 Security Parameters Summary.................................................................................................6-14
6.13 Wireless Client WPA Supplicants ...........................................................................................6-15
6.14 Configuring Wireless Security.................................................................................................6-15
6.14.1 Disable .............................................................................................................................6-15
6.14.2 WEP.................................................................................................................................6-16
6.14.3 WPA-PSK........................................................................................................................6-18
6.14.4 WPA ................................................................................................................................6-19
6.14.5 802.1x ..............................................................................................................................6-20
6.15 MAC Filter...............................................................................................................................6-22
Chapter 7 Management Screens.................................................................................................................7-1
7.1 Maintenance Overview..............................................................................................................7-1
7.2 Configuring Password................................................................................................................7-1
7.3 Logs ...........................................................................................................................................7-2
7.4 Configuration Screen .................................................................................................................7-3