ZyXEL Communications G-2000 Plus User Manual
Page 12

ZyAIR G-2000 Plus User’s Guide
11
Table of Contents
7.1 Wireless Security Overview ...............................................................................88
7.2 Security Parameters Summary ..........................................................................90
7.3 WEP Overview ...................................................................................................90
7.4 Configuring WEP Encryption ..............................................................................91
7.5 Introduction to WPA ...........................................................................................93
7.5.1 User Authentication .................................................................................93
7.5.2 Encryption ................................................................................................94
7.5.3 WPA-PSK Application Example ................................................................94
7.6 Configuring WPA-PSK Authentication ................................................................95
7.7 Wireless Client WPA Supplicants .......................................................................97
7.7.1 WPA with RADIUS Application Example ..................................................97
7.8 Configuring WPA Authentication ........................................................................98
7.9 Introduction to RADIUS ....................................................................................100
7.9.1 Types of RADIUS Messages ..................................................................100
7.9.1.1 Access-Challenge .........................................................................100
7.9.1.2 Accounting-Request ......................................................................101
7.9.1.3 Accounting-Response ...................................................................101
7.9.1.4 EAP Authentication Overview .......................................................101
7.10 Configuring RADIUS ......................................................................................102
7.11 802.1x Overview .............................................................................................104
7.12 Dynamic WEP Key Exchange ........................................................................104
7.13 Configuring 802.1x and Dynamic WEP Key Exchange ..................................105
7.14 Configuring 802.1x and Static WEP Key Exchange .......................................107
7.15 Configuring 802.1x .........................................................................................110
7.16 MAC Filter ......................................................................................................112
8.1 Internal RADIUS Overview ...............................................................................114
8.2 Internal RADIUS Server Setting .......................................................................116
8.3 Trusted AP Overview .......................................................................................118
8.4 Configuring Trusted AP ....................................................................................119
8.5 Trusted Users Overview ...................................................................................120
8.6 Configuring Trusted Users ...............................................................................120