beautypg.com

ZyXEL Communications 802.11g Wireless Access Point ZyXEL G-560 User Manual

Page 13

background image

ZyXEL G-560 User’s Guide

Table of Contents

13

6.4.1 Access Point Mode ...................................................................................58
6.4.2 Access Point + Bridge Mode ....................................................................61

6.4.2.1 Bridge Loop .....................................................................................61
6.4.2.2 Configuring Access Point + Bridge Mode ........................................63

6.5 Wireless Security Overview ...............................................................................66

6.5.1 Encryption .................................................................................................67
6.5.2 Authentication ...........................................................................................67
6.5.3 Restricted Access .....................................................................................67
6.5.4 Hide G-560 Identity ...................................................................................67

6.6 WEP Overview ...................................................................................................67

6.6.1 Data Encryption .......................................................................................67
6.6.2 Authentication ...........................................................................................67

6.7 802.1x Overview ................................................................................................68
6.8 Introduction to RADIUS ......................................................................................69

6.8.1 Types of RADIUS Messages ....................................................................69

6.9 EAP Authentication Overview ............................................................................70
6.10 Dynamic WEP Key Exchange ..........................................................................70
6.11 Introduction to WPA and WPA2 ........................................................................71

6.11.1 Encryption ..............................................................................................71
6.11.2 User Authentication ................................................................................72

6.12 WPA(2)-PSK Application Example ...................................................................72
6.13 WPA(2) with RADIUS Application Example .....................................................72
6.14 Security Parameters Summary ........................................................................73
6.15 Wireless Client WPA Supplicants .....................................................................74
6.16 Configuring Wireless Security ..........................................................................74

6.16.1 Disable ....................................................................................................74
6.16.2 WEP ........................................................................................................75
6.16.3 WPA-PSK/WPA2-PSK/Mixed .................................................................76
6.16.4 WPA/WPA2/Mixed ..................................................................................77
6.16.5 IEEE 802.1x ............................................................................................78

6.17 MAC Filter ........................................................................................................80
6.18 Introduction to OTIST .......................................................................................81

6.18.1 Enabling OTIST ......................................................................................81

6.18.1.1 AP .................................................................................................81
6.18.1.2 Wireless Client ..............................................................................82

6.18.2 Starting OTIST ........................................................................................83
6.18.3 Notes on OTIST ......................................................................................84

Chapter 7
Management Screens ............................................................................................
85

7.1 Maintenance Overview .......................................................................................85
7.2 Configuring Password ........................................................................................85
7.3 Logs ...................................................................................................................86