beautypg.com

ZyXEL Communications P-660H-T Series User Manual

Page 12

background image

P-660H/HW-T Series User’ Guide

11

Table of Contents

Chapter 3
Wizard Setup for Internet Access .........................................................................
54

3.1 Introduction ........................................................................................................54

3.1.1 Internet Access Wizard Setup ..................................................................54

Chapter 4
LAN Setup...............................................................................................................
62

4.1 LAN Overview ...................................................................................................62

4.1.1 LANs, WANs and the Prestige ..................................................................62
4.1.2 DHCP Setup .............................................................................................63

4.1.2.1 IP Pool Setup ..................................................................................63

4.1.3 DNS Server Address ................................................................................63
4.1.4 DNS Server Address Assignment .............................................................63

4.2 LAN TCP/IP ........................................................................................................64

4.2.1 IP Address and Subnet Mask ...................................................................64

4.2.1.1 Private IP Addresses .......................................................................65

4.2.2 RIP Setup .................................................................................................65
4.2.3 Multicast ....................................................................................................66
4.2.4 Any IP .......................................................................................................66

4.2.4.1 How Any IP Works ..........................................................................67

4.3 Configuring LAN ................................................................................................68

Chapter 5
Wireless LAN ..........................................................................................................
70

5.1 Wireless LAN Introduction .................................................................................70
5.2 Wireless Security Overview ...............................................................................70

5.2.1 Encryption .................................................................................................70
5.2.2 Authentication ...........................................................................................70
5.2.3 Restricted Access .....................................................................................71
5.2.4 Hide Prestige Identity ................................................................................71

5.3 The Main Wireless LAN Screen ........................................................................71
5.4 Configuring the Wireless Screen .......................................................................73

5.4.1 WEP Encryption ........................................................................................73

5.5 Configuring MAC Filters ..................................................................................75
5.6 Introduction to WPA .........................................................................................77

5.6.1 WPA-PSK Application Example ................................................................77
5.6.2 WPA with RADIUS Application Example ..................................................78
5.6.3 Wireless Client WPA Supplicants ............................................................79

5.7 Configuring IEEE 802.1x and WPA ...................................................................79

5.7.1 No Access Allowed or Authentication .......................................................80
5.7.2 Authentication Required: 802.1x ...............................................................80
5.7.3 Authentication Required: WPA .................................................................82
5.7.4 Authentication Required: WPA-PSK .........................................................84