
|
|
| Prestige 334W User’s Guide |
7.4 | Configuring Roaming .................................................................................................................. | ||
7.4.1 | Requirements for Roaming .................................................................................................... | ||
Chapter 8 Wireless Security........................................................................................................................ | |||
8.1 | Wireless Security Overview......................................................................................................... | ||
8.2 | Security Parameters Summary ................................................................................................... | ||
8.3 | WEP Overview ............................................................................................................................. | ||
8.3.1 | Data Encryption ..................................................................................................................... | ||
8.3.2 | Authentication........................................................................................................................ | ||
8.3.3 | Preamble Type ....................................................................................................................... | ||
8.4 | Configuring WEP Encryption..................................................................................................... | ||
8.5 | Introduction to WPA.................................................................................................................... | ||
8.5.1 | User Authentication ............................................................................................................... | ||
8.5.2 | Encryption.............................................................................................................................. | ||
8.5.3 | |||
8.6 | Configuring | ||
8.7 | Wireless Client WPA Supplicants ............................................................................................. | ||
8.7.1 | WPA with RADIUS Application Example .......................................................................... | ||
8.8 | Configuring WPA Authentication............................................................................................. | ||
8.9 | 802.1x Overview ......................................................................................................................... | ||
8.10 |
| Dynamic WEP Key Exchange ............................................................................................... | |
8.11 | Configuring 802.1x and Dynamic WEP Key Exchange .......................................................... | ||
8.12 |
| Configuring 802.1x and Static WEP Key Exchange............................................................ | |
8.13 |
| Configuring 802.1x................................................................................................................. | |
8.14 |
| MAC Filter.............................................................................................................................. | |
8.15 |
| Introduction to Local User Database.................................................................................... | |
8.16 |
| Configuring Local User Database......................................................................................... | |
8.17 |
| Introduction to RADIUS ....................................................................................................... | |
8.17.1 | EAP Authentication Overview............................................................................................. | ||
8.18 |
| Configuring RADIUS............................................................................................................. | |
Chapter 9 WAN Screens .............................................................................................................................. | |||
9.1 | WAN Overview............................................................................................................................. | ||
9.2 | TCP/IP Priority (Metric) ............................................................................................................. | ||
9.3 | Configuring Route........................................................................................................................ | ||
9.4 | Configuring WAN ISP ................................................................................................................. | ||
9.4.1 | Ethernet Encapsulation........................................................................................................... | ||
9.4.2 | PPPoE Encapsulation ............................................................................................................. | ||
9.4.3 | PPTP Encapsulation ............................................................................................................... | ||
9.5 | Configuring WAN IP.................................................................................................................... | ||
9.6 | Configuring WAN MAC ............................................................................................................. | ||
9.7 | Traffic Redirect .......................................................................................................................... | ||
9.8 | Configuring Traffic Redirect..................................................................................................... |
Table of Contents | xi |