ZyXEL Communications P-335WT User Manual
Page 12

P-335 Series User’s Guide
12
Table of Contents
7.2.1 Encryption .................................................................................................97
7.2.2 Authentication ...........................................................................................97
7.2.3 Restricted Access .....................................................................................98
7.2.4 Hide Prestige Identity ................................................................................98
7.2.5 G-plus .......................................................................................................98
7.2.6 Using OTIST .............................................................................................98
7.3 Configuring Wireless LAN on the Prestige .........................................................98
7.4 Configuring the Wireless Screen ........................................................................99
7.4.1 No Security .............................................................................................101
7.4.2 WEP Encryption ......................................................................................103
7.4.3 Configuring WEP Encryption ..................................................................103
7.4.4 Introduction to WPA ................................................................................105
7.4.5 WPA-PSK Application Example ..............................................................106
7.4.6 Configuring WPA-PSK Authentication ....................................................106
7.4.7 Wireless Client WPA Supplicants ...........................................................108
7.4.8 WPA with RADIUS Application Example ................................................108
7.4.9 Configuring WPA Authentication .............................................................109
7.4.10 802.1x Overview ...................................................................................112
7.4.11 Configuring 802.1x and Dynamic WEP Key Exchange ........................112
7.4.12 Configuring 802.1x and Static WEP Key Exchange .............................115
7.4.13 Configuring 802.1x ................................................................................118
7.5 MAC Filter ........................................................................................................121
7.6 Roaming ...........................................................................................................123
7.7 OTIST ...............................................................................................................124
8.1 WAN Overview .................................................................................................127
8.2 TCP/IP Priority (Metric) ....................................................................................127
8.3 Configuring Route ............................................................................................127
8.4 Configuring WAN ISP .......................................................................................128
8.4.1 Ethernet Encapsulation ...........................................................................128
8.4.2 PPPoE Encapsulation .............................................................................129
8.4.3 PPTP Encapsulation ...............................................................................132