ZyXEL Communications 802.11g Wireless ADSL2+ 4-port VoIP IAD P-2602HWNLI User Manual
Page 23

P-2602HWNLI User’s Guide
Table of Contents
23
Ad-hoc Wireless LAN Configuration ................................................................ 393
BSS.................................................................................................................. 393
ESS.................................................................................................................. 394
Channel.................................................................................................................. 395
RTS/CTS................................................................................................................ 395
Fragmentation Threshold ....................................................................................... 396
Preamble Type ....................................................................................................... 397
IEEE 802.11g Wireless LAN .................................................................................. 397
Wireless Security Overview ................................................................................... 398
IEEE 802.1x ........................................................................................................... 398
RADIUS.................................................................................................................. 399
EAP-MD5 (Message-Digest Algorithm 5) ........................................................ 400
EAP-TLS (Transport Layer Security) ............................................................... 400
EAP-TTLS (Tunneled Transport Layer Service) .............................................. 400
PEAP (Protected EAP) .................................................................................... 401
LEAP................................................................................................................ 401
Dynamic WEP Key Exchange................................................................................ 401
WPA and WPA2 ..................................................................................................... 402
Encryption ....................................................................................................... 402
User Authentication ........................................................................................ 403
Wireless Client WPA Supplicants .................................................................... 403
WPA(2) with RADIUS Application Example..................................................... 403
27.5.1 WPA(2)-PSK Application Example .......................................................404