ZyAIR G-2000 Plus User’s Guide
Chapter 7
88
7.1
Wireless Security Overview ...............................................................................
7.2
Security Parameters Summary ..........................................................................
90
7.3
WEP Overview ...................................................................................................
7.3.1 Data Encryption .......................................................................................
7.3.1.1 Authentication .................................................................................
7.4
Configuring WEP Encryption ..............................................................................
91
7.5
Introduction to WPA ...........................................................................................
93
7.5.1 User Authentication .................................................................................
7.5.2 Encryption ................................................................................................
94
7.5.3 WPA-PSK Application Example ................................................................
7.6
Configuring WPA-PSK Authentication ................................................................
95
7.7
Wireless Client WPA Supplicants .......................................................................
97
7.7.1 WPA with RADIUS Application Example ..................................................
7.8
Configuring WPA Authentication ........................................................................
98
7.9
Introduction to RADIUS ....................................................................................
100
7.9.1 Types of RADIUS Messages ..................................................................
7.9.1.1 Access-Challenge .........................................................................
7.9.1.2 Accounting-Request ......................................................................
101
7.9.1.3 Accounting-Response ...................................................................
7.9.1.4 EAP Authentication Overview .......................................................
7.10 Configuring RADIUS ......................................................................................
102
7.11 802.1x Overview .............................................................................................
104
7.12 Dynamic WEP Key Exchange ........................................................................
7.13 Configuring 802.1x and Dynamic WEP Key Exchange ..................................
105
7.14 Configuring 802.1x and Static WEP Key Exchange .......................................
107
7.15 Configuring 802.1x .........................................................................................
110
7.16 MAC Filter ......................................................................................................
112
Chapter 8
114
8.1
Internal RADIUS Overview ...............................................................................
8.2
Internal RADIUS Server Setting .......................................................................
116
8.3
Trusted AP Overview .......................................................................................
118
8.4
Configuring Trusted AP ....................................................................................
119
8.5
Trusted Users Overview ...................................................................................
120
8.6
Configuring Trusted Users ...............................................................................
Chapter 9
WAN.......................................................................................................................
124
9.1
WAN Overview .................................................................................................
9.2
Configuring WAN ISP .......................................................................................
11
Table of Contents