ZyWALL 2 Series User’s Guide
Table
FIELD | DESCRIPTION | EXAMPLE |
Frag. | The threshold (number of bytes) for the fragmentation boundary for | 2432 |
Threshold | directed messages. It is the maximum data fragment size that can be | (default) |
| sent. Enter a value between 256 and 2432. |
|
WEP | Select Disable to allow wireless stations to communicate with the access | Disable |
| points without any data encryption. |
|
| Select |
|
Default Key | Enter the key number (1 to 4) in this field. Only one key can be enabled |
|
| at any one time. This key must be the same on the ZyWALL and the |
|
| wireless stations to communicate. |
|
|
|
|
Key 1 to Key 4 | The WEP keys are used to encrypt data. Both the ZyWALL and the | 0x12345abcde |
| wireless stations must use the same WEP key for data transmission. |
|
| If you chose |
|
| ASCII characters or 10 hexadecimal characters |
|
| If you chose |
|
| ASCII characters or 26 hexadecimal characters |
|
| Enter “0x” before the key to denote a hexadecimal key. Don’t |
|
| enter “0x” before the key to denote an ASCII key. |
|
|
|
|
Edit MAC | Press [SPACE BAR] to select Yes and then press [ENTER] to display | No |
Address Filter | menu 3.5.1 |
|
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to save your configuration, or press [ESC] at any time to cancel.
The ZyWALL LAN Ethernet and wireless ports can transparently communicate witheach other (transparent bridge).24.5.1 MAC Address Filter Setup
Your ZyWALL checks the MAC address of the wireless station device against a list of allowed or denied MAC addresses. However, intruders could fake allowed MAC addresses so
Follow the steps below to create the MAC address table on your ZyWALL. Step 1. From the main menu, enter 3 to open Menu 3 – LAN Setup. Step 2. Enter 5 to display Menu 3.5 – Wireless LAN Setup.
LAN Setup |