ZyAIR G-2000 Plus User’s Guide
Table 1 IEEE 802.11b .........................................................................................................
37
Table 2 IEEE 802.11g .........................................................................................................
38
Table 3 Wizard 1 : General Setup ......................................................................................
50
Table 4 Wizard 2 : Wireless LAN Setup .............................................................................
51
Table 5 Wizard 3: Wireless LAN Setup: Basic Security .....................................................
52
Table 6 Wizard 3: Wireless LAN Setup: Extend Security ...................................................
53
Table 7 Wizard 4: Ethernet Encapsulation .........................................................................
54
Table 8 Wizard 4: PPPoE Encapsulation ...........................................................................
56
Table 9 Wizard 4: PPTP Encapsulation .............................................................................
57
Table 10 Private IP Address Ranges .................................................................................
58
Table 11 Example of Network Properties for LAN Servers with Fixed IP Addresses .........
60
Table 12 Wizard 5: WAN Setup ..........................................................................................
61
Table 13 System General Setup ........................................................................................
64
Table 14 DDNS ..................................................................................................................
66
Table 15 Password .............................................................................................................
67
Table 16 Time Setting ........................................................................................................
68
Table 17 LAN IP .................................................................................................................
73
Table 18 Static DHCP .........................................................................................................
76
Table 19 IP Alias ................................................................................................................
77
Table 20 Wireless ...............................................................................................................
83
Table 21 Roaming ..............................................................................................................
86
Table 22 Wireless No Security ...........................................................................................
89
Table 23 Wireless Security Relational Matrix .....................................................................
90
Table 24 Wireless: Static WEP Encryption .........................................................................
92
Table 25 Wireless: WPA-PSK ............................................................................................
96
Table 26 Wireless: WPA .....................................................................................................
99
Table 27 RADIUS ...............................................................................................................
103
Table 28 Wireless: 802.1x and Dynamic WEP ...................................................................
106
Table 29 Wireless: 802.1x and Static WEP ........................................................................
108
Table 30 Wireless: 802.1x and No WEP ............................................................................
111
Table 31 MAC Address Filter .............................................................................................
113
Table 32 Internal RADIUS Server ......................................................................................
115
Table 33 My Certificates .....................................................................................................
117
Table 34 Trusted AP ...........................................................................................................
119
Table 35 Trusted Users ......................................................................................................
121
Table 36 Ethernet Encapsulation .......................................................................................
125
List of Tables
28