ZyAIR G-2000 Plus User’s Guide

Chapter 7

 

 

Wireless Security ...................................................................................................

88

7.1

Wireless Security Overview ...............................................................................

88

7.2

Security Parameters Summary ..........................................................................

90

7.3

WEP Overview ...................................................................................................

90

 

7.3.1 Data Encryption .......................................................................................

90

 

7.3.1.1 Authentication .................................................................................

90

7.4

Configuring WEP Encryption ..............................................................................

91

7.5

Introduction to WPA ...........................................................................................

93

 

7.5.1 User Authentication .................................................................................

93

 

7.5.2 Encryption ................................................................................................

94

 

7.5.3 WPA-PSK Application Example ................................................................

94

7.6

Configuring WPA-PSK Authentication ................................................................

95

7.7

Wireless Client WPA Supplicants .......................................................................

97

 

7.7.1 WPA with RADIUS Application Example ..................................................

97

7.8

Configuring WPA Authentication ........................................................................

98

7.9

Introduction to RADIUS ....................................................................................

100

 

7.9.1 Types of RADIUS Messages ..................................................................

100

 

7.9.1.1 Access-Challenge .........................................................................

100

 

7.9.1.2 Accounting-Request ......................................................................

101

 

7.9.1.3 Accounting-Response ...................................................................

101

 

7.9.1.4 EAP Authentication Overview .......................................................

101

7.10 Configuring RADIUS ......................................................................................

102

7.11 802.1x Overview .............................................................................................

104

7.12 Dynamic WEP Key Exchange ........................................................................

104

7.13 Configuring 802.1x and Dynamic WEP Key Exchange ..................................

105

7.14 Configuring 802.1x and Static WEP Key Exchange .......................................

107

7.15 Configuring 802.1x .........................................................................................

110

7.16 MAC Filter ......................................................................................................

112

Chapter 8

 

 

Internal RADIUS Server .......................................................................................

114

8.1

Internal RADIUS Overview ...............................................................................

114

8.2

Internal RADIUS Server Setting .......................................................................

116

8.3

Trusted AP Overview .......................................................................................

118

8.4

Configuring Trusted AP ....................................................................................

119

8.5

Trusted Users Overview ...................................................................................

120

8.6

Configuring Trusted Users ...............................................................................

120

Chapter 9

 

 

WAN.......................................................................................................................

124

9.1

WAN Overview .................................................................................................

124

9.2

Configuring WAN ISP .......................................................................................

124

11

Table of Contents