Prestige 2602H/HW Series User’s Guide

 

5.2.3 Restricted Access .....................................................................................

92

 

5.2.4 Hide Prestige Identity ................................................................................

92

 

5.2.5 Configuring Wireless LAN on the Prestige ...............................................

92

5.3

Configuring the Wireless Screen ........................................................................

93

 

5.3.1 WEP Encryption ........................................................................................

93

5.4

Configuring MAC Filters .....................................................................................

95

5.5

Introduction to WPA ...........................................................................................

97

 

5.5.1 WPA-PSK Application Example ................................................................

97

 

5.5.2 WPA with RADIUS Application Example ..................................................

98

 

5.5.3 Wireless Client WPA Supplicants ............................................................

99

5.6

Configuring IEEE 802.1x and WPA ....................................................................

99

 

5.6.1 Authentication Required: 802.1x .............................................................

100

 

5.6.2 Authentication Required: WPA ...............................................................

102

 

5.6.3 Authentication Required: WPA-PSK .......................................................

104

5.7

Configuring Local User Authentication .............................................................

105

5.8

Configuring RADIUS ........................................................................................

106

Chapter 6

 

 

WAN Setup............................................................................................................

109

6.1

WAN Overview .................................................................................................

109

 

6.1.1 Encapsulation .........................................................................................

109

 

6.1.1.1 ENET ENCAP ...............................................................................

109

 

6.1.1.2 PPP over Ethernet ........................................................................

109

 

6.1.1.3 PPPoA ...........................................................................................

109

 

6.1.1.4 RFC 1483 ......................................................................................

110

 

6.1.2 Multiplexing .............................................................................................

110

 

6.1.2.1 VC-based Multiplexing ..................................................................

110

 

6.1.2.2 LLC-based Multiplexing .................................................................

110

 

6.1.3 VPI and VCI ............................................................................................

110

 

6.1.4 IP Address Assignment ..........................................................................

110

 

6.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation ...................

110

 

6.1.4.2 IP Assignment with RFC 1483 Encapsulation ...............................

111

 

6.1.4.3 IP Assignment with ENET ENCAP Encapsulation ........................

111

 

6.1.5 Nailed-Up Connection (PPP) ..................................................................

111

6.2

Metric ..............................................................................................................

111

6.3

PPPoE Encapsulation ......................................................................................

112

6.4

Traffic Shaping .................................................................................................

112

6.5

Zero Configuration Internet Access ..................................................................

113

6.6

Configuring WAN Setup ...................................................................................

113

6.7

Traffic Redirect .................................................................................................

116

6.8

Configuring WAN Backup .................................................................................

117

Table of Contents

13