beautypg.com

ZyXEL Communications ZyXEL ZyWALL 35 User Manual

Page 10

background image

ZyWALL 35 User’s Guide

8

4.2 DHCP Setup .......................................................................................................97

4.2.1 IP Pool Setup ............................................................................................97
4.2.2 DNS Servers .............................................................................................97

4.3 LAN TCP/IP ........................................................................................................98

4.3.1 Factory LAN Defaults ................................................................................98
4.3.2 IP Address and Subnet Mask ...................................................................98
4.3.3 RIP Setup .................................................................................................98
4.3.4 Multicast ....................................................................................................99

4.4 Configuring LAN .................................................................................................99
4.5 Configuring Static DHCP ..................................................................................101
4.6 Configuring IP Alias ..........................................................................................102
4.7 Configuring Port Roles .....................................................................................104

Chapter 5
Bridge Screens.....................................................................................................
107

5.1 Bridge Loop ......................................................................................................107
5.2 Spanning Tree Protocol (STP) .........................................................................107

5.2.1 Rapid STP ..............................................................................................108
5.2.2 STP Terminology ....................................................................................108
5.2.3 How STP Works .....................................................................................108
5.2.4 STP Port States ......................................................................................109

5.3 Configuring Bridge ...........................................................................................109
5.4 Configuring Port Roles ..................................................................................... 111

Chapter 6
Wireless LAN and Authentication Server .......................................................... 1
13

6.1 Wireless LAN Overview ...................................................................................113

6.1.1 Additional Installation Requirements for Using 802.1x ...........................113

6.2 Wireless LAN Basics ........................................................................................113

6.2.1 Channel ..................................................................................................113
6.2.2 ESS ID ....................................................................................................113
6.2.3 RTS/CTS ...............................................................................................114
6.2.4 Fragmentation Threshold ........................................................................115

6.3 Wireless Security .............................................................................................115
6.4 Security Parameters Summary ........................................................................116
6.5 WEP Encrytion .................................................................................................116
6.6 802.1x Overview ..............................................................................................117
6.7 Dynamic WEP Key Exchange ..........................................................................117
6.8 Introduction to WPA .........................................................................................117

6.8.1 User Authentication ................................................................................117
6.8.2 Encryption ...............................................................................................118

6.9 WPA-PSK Application Example .......................................................................118
6.10 WPA with RADIUS Application Example ........................................................119