ZyXEL G-1000 v2 User’s Guide

Note: The G-1000 v2 may be prone to RF (Radio Frequency) interference from other

2.4GHz devices such as microwave ovens, wireless phones, Bluetooth enabled devices, and other wireless LANs.

STP (Spanning Tree Protocol) / RSTP (Rapid STP)

(R)STP detects and breaks network loops and provides backup links between switches, bridges or routers. It allows a bridge to interact with other (R)STP -compliant bridges in your network to ensure that only one path exists between any two stations on the network.

Limit the number of Client Connections

You may set a maximum number of wireless stations that may connect to the G-1000 v2. This may be necessary if for example, there is interference or difficulty with channel assignment due to a high density of APs within a coverage area.

SSL Passthrough

SSL (Secure Sockets Layer) uses a public key to encrypt data that's transmitted over an SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with “https” instead of “http”. The G- 1000 v2 allows SSL connections to take place through the G-1000 v2.

Brute-Force Password Guessing Protection

The G-1000 v2 has a special protection mechanism to discourage brute-force password guessing attacks on the G-1000 v2's management interfaces. You can specify a wait-time that must expire before entering a fourth password after three incorrect passwords have been entered. Please see the appendix for details about this feature.

Wireless LAN MAC Address Filtering

Your G-1000 v2 checks the MAC address of the wireless station against a list of allowed or denied MAC addresses.

WEP Encryption

WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network to help keep network communications private.

IEEE 802.1X Network Security

The G-1000 v2 supports the IEEE 802.1x standard to enhance user authentication. Use the built-in user profile database to authenticate up to 32 users using MD5 encryption. Use an EAP-compatible RADIUS (RFC2138, 2139 - Remote Authentication Dial In User Service) server to authenticate a limitless number of users using EAP (Extensible Authentication Protocol). EAP is an authentication protocol that supports multiple types of authentication.

Chapter 1 Getting to Know Your Device

29