beautypg.com

ZyXEL Communications Prestige 2602H Series User Manual

Page 13

background image

Prestige 2602H/HW Series User’s Guide

Table of Contents

13

5.2.3 Restricted Access .....................................................................................92
5.2.4 Hide Prestige Identity ................................................................................92
5.2.5 Configuring Wireless LAN on the Prestige ...............................................92

5.3 Configuring the Wireless Screen ........................................................................93

5.3.1 WEP Encryption ........................................................................................93

5.4 Configuring MAC Filters .....................................................................................95
5.5 Introduction to WPA ...........................................................................................97

5.5.1 WPA-PSK Application Example ................................................................97
5.5.2 WPA with RADIUS Application Example ..................................................98
5.5.3 Wireless Client WPA Supplicants ............................................................99

5.6 Configuring IEEE 802.1x and WPA ....................................................................99

5.6.1 Authentication Required: 802.1x .............................................................100
5.6.2 Authentication Required: WPA ...............................................................102
5.6.3 Authentication Required: WPA-PSK .......................................................104

5.7 Configuring Local User Authentication .............................................................105
5.8 Configuring RADIUS ........................................................................................106

Chapter 6
WAN Setup............................................................................................................
109

6.1 WAN Overview .................................................................................................109

6.1.1 Encapsulation .........................................................................................109

6.1.1.1 ENET ENCAP ...............................................................................109
6.1.1.2 PPP over Ethernet ........................................................................109
6.1.1.3 PPPoA ...........................................................................................109
6.1.1.4 RFC 1483 ......................................................................................110

6.1.2 Multiplexing .............................................................................................110

6.1.2.1 VC-based Multiplexing ..................................................................110
6.1.2.2 LLC-based Multiplexing .................................................................110

6.1.3 VPI and VCI ............................................................................................110
6.1.4 IP Address Assignment ..........................................................................110

6.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation ...................110
6.1.4.2 IP Assignment with RFC 1483 Encapsulation ............................... 111
6.1.4.3 IP Assignment with ENET ENCAP Encapsulation ........................ 111

6.1.5 Nailed-Up Connection (PPP) .................................................................. 111

6.2 Metric .............................................................................................................. 111
6.3 PPPoE Encapsulation ......................................................................................112
6.4 Traffic Shaping .................................................................................................112
6.5 Zero Configuration Internet Access ..................................................................113
6.6 Configuring WAN Setup ...................................................................................113
6.7 Traffic Redirect .................................................................................................116
6.8 Configuring WAN Backup .................................................................................117