ZyAIR G-2000 Plus User’s Guide

List of Tables

Table 1 IEEE 802.11b .........................................................................................................

37

Table 2 IEEE 802.11g .........................................................................................................

38

Table 3 Wizard 1 : General Setup ......................................................................................

50

Table 4 Wizard 2 : Wireless LAN Setup .............................................................................

51

Table 5 Wizard 3: Wireless LAN Setup: Basic Security .....................................................

52

Table 6 Wizard 3: Wireless LAN Setup: Extend Security ...................................................

53

Table 7 Wizard 4: Ethernet Encapsulation .........................................................................

54

Table 8 Wizard 4: PPPoE Encapsulation ...........................................................................

56

Table 9 Wizard 4: PPTP Encapsulation .............................................................................

57

Table 10 Private IP Address Ranges .................................................................................

58

Table 11 Example of Network Properties for LAN Servers with Fixed IP Addresses .........

60

Table 12 Wizard 5: WAN Setup ..........................................................................................

61

Table 13 System General Setup ........................................................................................

64

Table 14 DDNS ..................................................................................................................

66

Table 15 Password .............................................................................................................

67

Table 16 Time Setting ........................................................................................................

68

Table 17 LAN IP .................................................................................................................

73

Table 18 Static DHCP .........................................................................................................

76

Table 19 IP Alias ................................................................................................................

77

Table 20 Wireless ...............................................................................................................

83

Table 21 Roaming ..............................................................................................................

86

Table 22 Wireless No Security ...........................................................................................

89

Table 23 Wireless Security Relational Matrix .....................................................................

90

Table 24 Wireless: Static WEP Encryption .........................................................................

92

Table 25 Wireless: WPA-PSK ............................................................................................

96

Table 26 Wireless: WPA .....................................................................................................

99

Table 27 RADIUS ...............................................................................................................

103

Table 28 Wireless: 802.1x and Dynamic WEP ...................................................................

106

Table 29 Wireless: 802.1x and Static WEP ........................................................................

108

Table 30 Wireless: 802.1x and No WEP ............................................................................

111

Table 31 MAC Address Filter .............................................................................................

113

Table 32 Internal RADIUS Server ......................................................................................

115

Table 33 My Certificates .....................................................................................................

117

Table 34 Trusted AP ...........................................................................................................

119

Table 35 Trusted Users ......................................................................................................

121

Table 36 Ethernet Encapsulation .......................................................................................

125

List of Tables

28