
|
| Chapter 10 Interface | |
| Table 65 Network > Interface > WLAN | ||
| LABEL | DESCRIPTION |
|
| Name | This field displays the name of the WLAN interface. |
|
|
|
|
|
| SSID | This is the SSID (Service Set IDentity) of the WLAN interface. |
|
|
|
|
|
| IP Address | This field displays the current IP address of the WLAN interface. If the IP address is |
|
|
| 0.0.0.0, the interface does not have an IP address yet. |
|
|
| This screen also shows whether the IP address is a static IP address (STATIC) or |
|
|
| dynamically assigned (DHCP). IP addresses are always static in virtual interfaces. |
|
|
|
|
|
| Mask | This field displays the interface’s subnet mask in dot decimal notation. |
|
|
|
|
|
| Security | This field displays what type of security the WLAN interface uses. |
|
|
|
|
|
| Add icon | This column lets you create, edit, remove, activate, and deactivate WLAN interfaces. |
|
|
| To create an interface, click the Add icon at the top of the column. |
|
|
| To activate or deactivate an interface, click the Active icon next to it. Make sure you |
|
|
| click Apply to save and apply the change. |
|
|
| To edit an interface, click the Edit icon next to it. The edit screen appears. |
|
|
| To remove an interface, click the Remove icon next to it. The ZyWALL confirms you |
|
|
| want to remove it before doing so. |
|
|
| To connect or disconnect an interface, click the Connect icon next to it. You might |
|
|
| use this icon to test the interface or to manually establish the connection. |
|
|
|
|
|
| Apply | Click Apply to save your changes back to the ZyWALL. |
|
|
|
|
|
| Reset | Click Reset to begin configuring this screen afresh. |
|
|
|
|
|
Use the strongest security that every wireless client in the wireless network supports.
Table 66 Wireless Security Levels
SECURITY | SECURITY TYPE | |||
LEVEL | ||||
| ||||
Weakest | No Security | |||
|
|
|
| |
|
|
| MAC Address Filtering | |
|
|
| ||
|
|
|
| |
|
|
| WEP Encryption | |
|
|
|
| |
|
|
| IEEE 802.1x EAP with RADIUS Server Authentication | |
|
|
|
| |
|
|
| ||
|
|
| ||
|
|
|
| |
|
|
| WPA | |
|
|
|
| |
Strongest | ||||
|
|
|
| |
|
|
| WPA2 | |
|
|
|
|
"WPA2 or
•You can use the ZyWALL’s local user database to use WPA or WPA2 without using an external RADIUS server. With WPA or WPA2, users have to log into the wireless network before using it. This is called user authentication. WPA and WPA2 are also called the enterprise version of WPA).
| 235 |
ZyWALL USG 100/200 Series User’s Guide | |
|
|