EasyManua.ls Logo

ZyXEL Communications NWA-3100 - Page 20

ZyXEL Communications NWA-3100
294 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Figures
ZyXEL NWA-3100 User’s Guide
20
Figure 39 Bridging Example ................................................................................................................... 77
Figure 40 Bridge Loop: Two Bridges Connected to Hub ........................................................................ 77
Figure 41 Bridge Loop: Bridge Connected to Wired LAN ....................................................................... 78
Figure 42 Wireless: Bridge/Repeater ..................................................................................................... 78
Figure 43 Wireless: AP+Bridge .............................................................................................................. 80
Figure 44 EAP Authentication ................................................................................................................ 82
Figure 45 WPA(2)-PSK Authentication ................................................................................................... 84
Figure 46 WPA(2) with RADIUS Application Example ........................................................................... 85
Figure 47 Security .................................................................................................................................. 87
Figure 48 Security: WEP ........................................................................................................................ 88
Figure 49 Security: 802.1x Only ............................................................................................................ 89
Figure 50 Security: 802.1x Static 64-bit, 802.1x Static 128-bit .............................................................. 90
Figure 51 Security: WPA ....................................................................................................................... 91
Figure 52 Security:WPA2 or WPA2-MIX ................................................................................................. 92
Figure 53 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................. 94
Figure 54 RADIUS .................................................................................................................................. 95
Figure 55 Multiple BSS with VLAN Example .......................................................................................... 98
Figure 56 Wireless: Multiple BSS ........................................................................................................... 98
Figure 57 SSID ..................................................................................................................................... 101
Figure 58 Configuring SSID .................................................................................................................. 102
Figure 59 Layer-2 Isolation Application ................................................................................................ 106
Figure 60 Layer-2 Isolation Configuration Screen ................................................................................ 107
Figure 61 Layer-2 Isolation Example .................................................................................................... 108
Figure 62 Layer-2 Isolation Example 1 ................................................................................................. 108
Figure 63 Layer-2 Isolation Example 2 ................................................................................................. 109
Figure 64 MAC Address Filter ...............................................................................................................110
Figure 65 Roaming Example .................................................................................................................111
Figure 66 Roaming ................................................................................................................................112
Figure 67 IP Setup .................................................................................................................................114
Figure 68 Rogue AP: Example .............................................................................................................118
Figure 69 “Honeypot” Attack ..................................................................................................................119
Figure 70 ROGUE AP > Configuration ................................................................................................. 120
Figure 71 ROGUE AP > Friendly AP .................................................................................................... 121
Figure 72 ROGUE AP > Rogue AP ...................................................................................................... 122
Figure 73 Secure and Insecure Remote Management ........................................................................ 123
Figure 74 SSH Communication Example ............................................................................................. 124
Figure 75 Remote Management: Telnet ............................................................................................... 125
Figure 76 Remote Management: FTP .................................................................................................. 126
Figure 77 Remote Management: WWW ...............................................................................................127
Figure 78 SNMP Management Model .................................................................................................. 128
Figure 79 Remote Management: SNMP ..............................................................................................131
Figure 80 Certificates on Your Computer ............................................................................................. 134
Figure 81 Certificate Details ................................................................................................................ 135

Table of Contents

Related product manuals