G-3000H User’s Guide
6.1.2 Authentication ...........................................................................................
73
6.1.3 Restricted Access .....................................................................................
6.1.4 Hide ZyAIR Identity ...................................................................................
74
6.1.5 WEP Encryption ........................................................................................
6.2
Configuring WEP Encryption ..............................................................................
6.3
802.1x Overview ................................................................................................
6.4
EAP Authentication Overview ............................................................................
6.5 Dynamic WEP Key Exchange ............................................................................
75
6.6
Introduction to WPA ...........................................................................................
6.6.1 User Authentication .................................................................................
76
6.6.2 Encryption ................................................................................................
6.6.3 WPA(2)-PSK Application Example ...........................................................
6.7
WPA(2) with RADIUS Application Example .......................................................
77
6.8
Security Modes ..................................................................................................
78
6.9
Security Modes and Wireless Client Compatibility .............................................
79
6.10 Wireless Client WPA Supplicants .....................................................................
6.11 Wireless Security Effectiveness .......................................................................
80
6.12 Configuring Security .........................................................................................
6.12.1 Security: No Access ................................................................................
81
6.12.2 Security: WEP .........................................................................................
82
6.12.3 Security: 802.1x Only, 802.1x Static 64-bit WEP, 128-bit WEP ..............
83
6.12.4 Security: 802.1x Dynamic 64-bit WEP, 128-bit WEP ..............................
85
6.12.5 Security: WPA, WPA-MIX, WPA2, WPA2-MIX ........................................
86
6.12.6 Security: WPA-PSK,WPA2-PSK,WPA2-PSK-MIX ................................
87
6.13 Introduction to RADIUS ....................................................................................
89
6.14 Configuring RADIUS ........................................................................................
6.15 Configuring Local User Database ....................................................................
91
Chapter 7
Multiple ESS, SSID and VLAN...............................................................................
93
7.1
Wireless LAN Infrastructures .............................................................................
7.1.1 Multiple ESS .............................................................................................
7.1.2 Notes on Multiple-ESS ..............................................................................
7.1.3 Multiple ESS Example ..............................................................................
94
7.1.4 Multi-ESS with VLAN Example .................................................................
7.1.5 Configuring Multiple ESS ..........................................................................
7.2
SSID ...................................................................................................................
97
7.2.1 Configuring SSID ......................................................................................
98
7.2.2 Second Rx VLAN ID ...............................................................................
100
Chapter 8
103
8.1
Layer-2 Isolation Introduction ...........................................................................
Table of Contents
11