ZyAIR G-2000 Plus User’s Guide
Figure 37 Wireless: WPA ....................................................................................................
103
Figure 38 Wireless: 802.1x and Dynamic WEP ..................................................................
106
Figure 39 Wireless: 802.1x and Static WEP .......................................................................
108
Figure 40 Wireless: 802.1x .................................................................................................
111
Figure 41 MAC Address Filter .............................................................................................
113
Figure 42 ZyAIR Authenticates Wireless Stations ...............................................................
115
Figure 43 ZyAIR Authenicates other AP’s ...........................................................................
Figure 44 Internal RADIUS Server Setting Screen ............................................................
117
Figure 45 Trusted AP Overview ..........................................................................................
118
Figure 46 Trusted AP Screen ..............................................................................................
119
Figure 47 Trusted Users Screen .........................................................................................
121
Figure 48 Ethernet Encapsulation .......................................................................................
125
Figure 49 Ethernet Encapsulation .......................................................................................
126
Figure 50 PPPoE Encapsulation .........................................................................................
128
Figure 51 PPTP Encapsulation ...........................................................................................
130
Figure 52 WAN: IP .............................................................................................................
132
Figure 53 MAC Setup ..........................................................................................................
134
Figure 54 How NAT Works ..................................................................................................
138
Figure 55 NAT Application With IP Alias .............................................................................
139
Figure 56 Multiple Servers Behind NAT Example ...............................................................
143
Figure 57 SUA/NAT Setup ..................................................................................................
144
Figure 58 Address Mapping ................................................................................................
146
Figure 59 Address Mapping Edit .........................................................................................
147
Figure 60 Trigger Port Forwarding Process: Example ........................................................
149
Figure 61 Trigger Port .........................................................................................................
150
Figure 62 Example of Static Routing Topology ...................................................................
152
Figure 63 Static Route .........................................................................................................
153
Figure 64 Static Route: Edit ................................................................................................
154
Figure 65 Remote Management: WWW .............................................................................
158
Figure 66 Telnet Configuration on a TCP/IP Network .........................................................
159
Figure 67 Remote Management: Telnet ..............................................................................
Figure 68 Remote Management: FTP .................................................................................
160
Figure 69 SNMP Management Model .................................................................................
161
Figure 70 Remote Management: SNMP .............................................................................
164
Figure 71 Remote Management: DNS ................................................................................
165
Figure 72 Security ...............................................................................................................
167
Figure 73 Configuring UPnP ...............................................................................................
170
Figure 74 ZyAIR Firewall Application ..................................................................................
180
Figure 75 Three-Way Handshake .......................................................................................
182
Figure 76 SYN Flood ...........................................................................................................
183
Figure 77 Smurf Attack .......................................................................................................
184
Figure 78 Stateful Inspection ...............................................................................................
185
Figure 79 LAN to WAN Traffic .............................................................................................
195
23
List of Figures