ZyXEL G-220 v2 User’s Guide
2.2.2 IEEE 802.1x ..............................................................................................
28
2.2.2.1 EAP Authentication .........................................................................
2.2.3 WPA(2) .....................................................................................................
29
2.2.3.1 Encryption ......................................................................................
2.2.3.2 User Authentication ........................................................................
2.2.4 WPA(2)-PSK Application Example ...........................................................
2.2.5 WPA(2) with RADIUS Application Example ..............................................
30
2.3
Encryption Type .................................................................................................
31
2.4
Preamble Type ...................................................................................................
2.5
Introduction to OTIST .....................................................................................
32
2.5.1 Enabling OTIST ........................................................................................
2.5.1.1 AP ...................................................................................................
2.5.1.2 Wireless Client ................................................................................
33
2.5.2 Starting OTIST .........................................................................................
2.5.3 Notes on OTIST ........................................................................................
34
Chapter 3
35
3.1
Wireless Station Mode Overview ......................................................................
3.2
The Link Info Screen ..........................................................................................
3.2.1 Trend Chart ...............................................................................................
36
3.3
The Site Survey Screen .....................................................................................
37
3.3.1 Connecting to a WLAN Network ...............................................................
38
3.3.2 Security Settings .......................................................................................
39
3.3.2.1 WEP Encryption ..............................................................................
3.3.2.2 WPA-PSK/WPA2-PSK .....................................................................
40
3.3.2.3 WPA/WPA2 .....................................................................................
41
3.3.2.4 IEEE 802.1x ....................................................................................
42
3.3.3 Confirm Save Screen ................................................................................
43
3.4
The Profile Screen .............................................................................................
44
3.4.1 Adding a New Profile ................................................................................
46
3.5
The Adapter Screen ...........................................................................................
50
Chapter 4
Access Point Mode Configuration........................................................................
53
4.1
Access Point Mode Introduction ........................................................................
4.1.1 Additional Setup Requirements ................................................................
4.2
The Link Info Screen .........................................................................................
4.3
The Configuration Screen .................................................................................
54
4.4
The MAC Filter Screen ......................................................................................
57
10
Table of Contents