G-3000H User’s Guide

 

6.1.2 Authentication ...........................................................................................

73

 

6.1.3 Restricted Access .....................................................................................

73

 

6.1.4 Hide ZyAIR Identity ...................................................................................

74

 

6.1.5 WEP Encryption ........................................................................................

74

6.2

Configuring WEP Encryption ..............................................................................

74

6.3

802.1x Overview ................................................................................................

74

6.4

EAP Authentication Overview ............................................................................

74

6.5 Dynamic WEP Key Exchange ............................................................................

75

6.6

Introduction to WPA ...........................................................................................

75

 

6.6.1 User Authentication .................................................................................

76

 

6.6.2 Encryption ................................................................................................

76

 

6.6.3 WPA(2)-PSK Application Example ...........................................................

76

6.7

WPA(2) with RADIUS Application Example .......................................................

77

6.8

Security Modes ..................................................................................................

78

6.9

Security Modes and Wireless Client Compatibility .............................................

79

6.10 Wireless Client WPA Supplicants .....................................................................

79

6.11 Wireless Security Effectiveness .......................................................................

80

6.12 Configuring Security .........................................................................................

80

 

6.12.1 Security: No Access ................................................................................

81

 

6.12.2 Security: WEP .........................................................................................

82

 

6.12.3 Security: 802.1x Only, 802.1x Static 64-bit WEP, 128-bit WEP ..............

83

 

6.12.4 Security: 802.1x Dynamic 64-bit WEP, 128-bit WEP ..............................

85

 

6.12.5 Security: WPA, WPA-MIX, WPA2, WPA2-MIX ........................................

86

 

6.12.6 Security: WPA-PSK,WPA2-PSK,WPA2-PSK-MIX ................................

87

6.13 Introduction to RADIUS ....................................................................................

89

6.14 Configuring RADIUS ........................................................................................

89

6.15 Configuring Local User Database ....................................................................

91

Chapter 7

 

 

Multiple ESS, SSID and VLAN...............................................................................

93

7.1

Wireless LAN Infrastructures .............................................................................

93

 

7.1.1 Multiple ESS .............................................................................................

93

 

7.1.2 Notes on Multiple-ESS ..............................................................................

93

 

7.1.3 Multiple ESS Example ..............................................................................

94

 

7.1.4 Multi-ESS with VLAN Example .................................................................

94

 

7.1.5 Configuring Multiple ESS ..........................................................................

94

7.2

SSID ...................................................................................................................

97

 

7.2.1 Configuring SSID ......................................................................................

98

 

7.2.2 Second Rx VLAN ID ...............................................................................

100

Chapter 8

 

 

Other Wireless Configurations ...........................................................................

103

8.1

Layer-2 Isolation Introduction ...........................................................................

103

Table of Contents

11