P-660H/HW/W-T Series User’ Guide

Chapter 3

 

 

Wizard Setup for Internet Access.........................................................................

54

3.1

Introduction ........................................................................................................

54

 

3.1.1 Internet Access Wizard Setup ..................................................................

54

Chapter 4

 

 

LAN Setup...............................................................................................................

62

4.1

LAN Overview ...................................................................................................

62

 

4.1.1 LANs, WANs and the Prestige ..................................................................

62

 

4.1.2 DHCP Setup .............................................................................................

63

 

4.1.2.1 IP Pool Setup ..................................................................................

63

 

4.1.3 DNS Server Address ................................................................................

63

 

4.1.4 DNS Server Address Assignment .............................................................

63

4.2

LAN TCP/IP ........................................................................................................

64

 

4.2.1 IP Address and Subnet Mask ...................................................................

64

 

4.2.1.1 Private IP Addresses .......................................................................

65

 

4.2.2 RIP Setup .................................................................................................

65

 

4.2.3 Multicast ....................................................................................................

66

 

4.2.4 Any IP .......................................................................................................

66

 

4.2.4.1 How Any IP Works ..........................................................................

67

4.3

Configuring LAN ................................................................................................

68

Chapter 5

 

 

Wireless LAN ..........................................................................................................

70

5.1

Wireless LAN Introduction .................................................................................

70

5.2

Wireless Security Overview ...............................................................................

70

 

5.2.1 Encryption .................................................................................................

70

 

5.2.2 Authentication ...........................................................................................

70

 

5.2.3 Restricted Access .....................................................................................

71

 

5.2.4 Hide Prestige Identity ................................................................................

71

5.3

The Main Wireless LAN Screen ........................................................................

71

5.4

Configuring the Wireless Screen .......................................................................

73

 

5.4.1 WEP Encryption ........................................................................................

73

5.5

Configuring MAC Filters ..................................................................................

75

5.6

Introduction to WPA .........................................................................................

77

 

5.6.1 WPA-PSK Application Example ................................................................

77

 

5.6.2 WPA with RADIUS Application Example ..................................................

78

 

5.6.3 Wireless Client WPA Supplicants ............................................................

79

5.7

Configuring IEEE 802.1x and WPA ...................................................................

79

 

5.7.1 No Access Allowed or Authentication .......................................................

80

 

5.7.2 Authentication Required: 802.1x ...............................................................

80

 

5.7.3 Authentication Required: WPA .................................................................

82

 

5.7.4 Authentication Required: WPA-PSK .........................................................

84

11

Table of Contents