ZyAIR G-2000 Plus User’s Guide

Figure 37 Wireless: WPA ....................................................................................................

103

Figure 38 Wireless: 802.1x and Dynamic WEP ..................................................................

106

Figure 39 Wireless: 802.1x and Static WEP .......................................................................

108

Figure 40 Wireless: 802.1x .................................................................................................

111

Figure 41 MAC Address Filter .............................................................................................

113

Figure 42 ZyAIR Authenticates Wireless Stations ...............................................................

115

Figure 43 ZyAIR Authenicates other AP’s ...........................................................................

115

Figure 44 Internal RADIUS Server Setting Screen ............................................................

117

Figure 45 Trusted AP Overview ..........................................................................................

118

Figure 46 Trusted AP Screen ..............................................................................................

119

Figure 47 Trusted Users Screen .........................................................................................

121

Figure 48 Ethernet Encapsulation .......................................................................................

125

Figure 49 Ethernet Encapsulation .......................................................................................

126

Figure 50 PPPoE Encapsulation .........................................................................................

128

Figure 51 PPTP Encapsulation ...........................................................................................

130

Figure 52 WAN: IP .............................................................................................................

132

Figure 53 MAC Setup ..........................................................................................................

134

Figure 54 How NAT Works ..................................................................................................

138

Figure 55 NAT Application With IP Alias .............................................................................

139

Figure 56 Multiple Servers Behind NAT Example ...............................................................

143

Figure 57 SUA/NAT Setup ..................................................................................................

144

Figure 58 Address Mapping ................................................................................................

146

Figure 59 Address Mapping Edit .........................................................................................

147

Figure 60 Trigger Port Forwarding Process: Example ........................................................

149

Figure 61 Trigger Port .........................................................................................................

150

Figure 62 Example of Static Routing Topology ...................................................................

152

Figure 63 Static Route .........................................................................................................

153

Figure 64 Static Route: Edit ................................................................................................

154

Figure 65 Remote Management: WWW .............................................................................

158

Figure 66 Telnet Configuration on a TCP/IP Network .........................................................

159

Figure 67 Remote Management: Telnet ..............................................................................

159

Figure 68 Remote Management: FTP .................................................................................

160

Figure 69 SNMP Management Model .................................................................................

161

Figure 70 Remote Management: SNMP .............................................................................

164

Figure 71 Remote Management: DNS ................................................................................

165

Figure 72 Security ...............................................................................................................

167

Figure 73 Configuring UPnP ...............................................................................................

170

Figure 74 ZyAIR Firewall Application ..................................................................................

180

Figure 75 Three-Way Handshake .......................................................................................

182

Figure 76 SYN Flood ...........................................................................................................

183

Figure 77 Smurf Attack .......................................................................................................

184

Figure 78 Stateful Inspection ...............................................................................................

185

Figure 79 LAN to WAN Traffic .............................................................................................

195

23

List of Figures