ZyXEL Communications 802.11g Wireless Firewall Router P-320W User Manual
Page 12
P-320W User’s Guide
12
Table of Contents
3.2 Connection Wizard: STEP 1: System Information .............................................46
3.3.1 Basic(WEP) Security .................................................................................49
3.3.2 Extend(WPA-PSK) Security.......................................................................50
3.3.3 OTIST ........................................................................................................51
3.4 Connection Wizard: STEP 3: Internet Configuration ..........................................52
3.4.1 Ethernet Connection Type ........................................................................53
3.4.2 PPPoE Connection Type ..........................................................................53
3.4.3 PPTP Connection Type ............................................................................55
3.4.4 Your IP Address.........................................................................................56
3.4.5 WAN MAC Address ...................................................................................57
3.4.6 Connection Wizard Complete ....................................................................58
4.2.1 Encryption .................................................................................................61
4.2.2 Authentication ...........................................................................................61
4.2.3 Restricted Access .....................................................................................62
4.2.4 Hide Prestige Identity ................................................................................62
4.2.5 Using OTIST .............................................................................................62
4.3 Configuring Wireless LAN on the Prestige .........................................................62
4.4 General Wireless LAN Screen ..........................................................................63
4.4.1 No Security ...............................................................................................64
4.4.2 WEP Encryption ........................................................................................65
4.4.3 Introduction to WPA .................................................................................67
4.4.4 WPA-PSK Application Example ................................................................67
4.4.5 WPA-PSK Authentication Screen .............................................................68
4.4.6 WPA with RADIUS Application Example ..................................................69
4.4.7 Wireless Client WPA Supplicants .............................................................69
4.4.8 WPA Authentication Screen ......................................................................69
4.4.9 IEEE 802.1x Overview ..............................................................................70
4.4.10 IEEE 802.1x and Dynamic WEP Key Exchange Screen ........................71
4.5.1.1 AP ...................................................................................................72
4.5.1.2 Wireless Client ................................................................................74