Prestige 334W User’s Guide

7.4

Configuring Roaming ..................................................................................................................

7-6

7.4.1

Requirements for Roaming ....................................................................................................

7-8

Chapter 8 Wireless Security........................................................................................................................

8-1

8.1

Wireless Security Overview.........................................................................................................

8-1

8.2

Security Parameters Summary ...................................................................................................

8-3

8.3

WEP Overview .............................................................................................................................

8-4

8.3.1

Data Encryption .....................................................................................................................

8-4

8.3.2

Authentication........................................................................................................................

8-4

8.3.3

Preamble Type .......................................................................................................................

8-6

8.4

Configuring WEP Encryption.....................................................................................................

8-6

8.5

Introduction to WPA....................................................................................................................

8-8

8.5.1

User Authentication ...............................................................................................................

8-9

8.5.2

Encryption..............................................................................................................................

8-9

8.5.3

WPA-PSK Application Example ...........................................................................................

8-9

8.6

Configuring WPA-PSK Authentication....................................................................................

8-10

8.7

Wireless Client WPA Supplicants .............................................................................................

8-13

8.7.1

WPA with RADIUS Application Example ..........................................................................

8-13

8.8

Configuring WPA Authentication.............................................................................................

8-14

8.9

802.1x Overview .........................................................................................................................

8-16

8.10

 

Dynamic WEP Key Exchange ...............................................................................................

8-17

8.11

Configuring 802.1x and Dynamic WEP Key Exchange ..........................................................

8-17

8.12

 

Configuring 802.1x and Static WEP Key Exchange............................................................

8-19

8.13

 

Configuring 802.1x.................................................................................................................

8-23

8.14

 

MAC Filter..............................................................................................................................

8-25

8.15

 

Introduction to Local User Database....................................................................................

8-27

8.16

 

Configuring Local User Database.........................................................................................

8-28

8.17

 

Introduction to RADIUS .......................................................................................................

8-29

8.17.1

EAP Authentication Overview.............................................................................................

8-30

8.18

 

Configuring RADIUS.............................................................................................................

8-31

Chapter 9 WAN Screens ..............................................................................................................................

9-1

9.1

WAN Overview.............................................................................................................................

9-1

9.2

TCP/IP Priority (Metric) .............................................................................................................

9-1

9.3

Configuring Route........................................................................................................................

9-1

9.4

Configuring WAN ISP .................................................................................................................

9-2

9.4.1

Ethernet Encapsulation...........................................................................................................

9-2

9.4.2

PPPoE Encapsulation .............................................................................................................

9-4

9.4.3

PPTP Encapsulation ...............................................................................................................

9-6

9.5

Configuring WAN IP....................................................................................................................

9-7

9.6

Configuring WAN MAC .............................................................................................................

9-11

9.7

Traffic Redirect ..........................................................................................................................

9-12

9.8

Configuring Traffic Redirect.....................................................................................................

9-13

Table of Contents

xi