EasyManua.ls Logo

ZyXEL Communications P-320W User Manual

ZyXEL Communications P-320W
215 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
P-320W
802.11g Wireless Firewall Router
Users Guide
Version 1.00
11/2005
Edition 1

Table of Contents

Other manuals for ZyXEL Communications P-320W

Questions and Answers:

ZyXEL Communications P-320W Specifications

General IconGeneral
TypeWireless Router
Connectivity TechnologyWireless
Data Link ProtocolEthernet, Fast Ethernet, IEEE 802.11b, IEEE 802.11g
Frequency Band2.4 GHz
Wireless Protocol802.11b/g
Maximum Wireless Speed54 Mbps
SecurityWEP, WPA, WPA2
Encryption AlgorithmWEP, WPA, WPA2
AntennaExternal
Wireless StandardIEEE 802.11g
Ethernet Ports4
WAN Port1
FeaturesNAT, DHCP, Firewall
Power SupplyExternal

Summary

Copyright

Disclaimer

ZyXEL disclaims liability for product use and reserves the right to make changes.

Trademarks

Lists ZyNOS as a registered trademark and other trademarks.

Federal Communications Commission (FCC) Interference Statement

Caution

Compliance requirements for FCC RF exposure and transmitter co-location.

Notice 1

Modifications can void user authority; apparatus complies with ICES-003.

Certifications

Instructions to find certifications on www.zyxel.com.

Safety Warnings

ZyXEL Limited Warranty

Customer Support

Preface

About This User's Guide

This guide explains how to configure the Prestige using the web configurator.

Related Documentation

Lists supporting documents like the CD, Quick Start Guide, and Online Help.

User Guide Feedback

Provides contact information for submitting comments, questions, or suggestions.

Syntax Conventions

Explains conventions used for text entry and mouse actions in the manual.

Graphics Icons Key

Illustrates common icons used to represent network devices in the manual.

Chapter 1 Getting to Know Your Prestige

1.1 Prestige Overview

Introduces the Prestige as a secure wireless firewall router with NAT, port forwarding, and DHCP features.

1.2 Prestige Features

Describes the main features of the Prestige.

1.2.1 Physical Features

Details physical aspects like auto-negotiating Ethernet interfaces and a 4-port switch.

1.2.2 Non-Physical Features

Covers non-physical features like Firewall, Packet Filtering, Time and Date, UPnP, PPPoE, and PPTP.

Dynamic DNS Support

Explains Dynamic DNS for static hostname alias with dynamic IP addresses.

IP Multicast

Discusses delivering IP packets to groups using IP multicast and IGMP.

SNMP

Explains SNMP for network management information exchange between devices.

Network Address Translation (NAT)

Describes NAT for translating IP addresses between networks.

Traffic Redirect

Forwards WAN traffic to a backup gateway if the primary connection fails.

Port Forwarding

Forwards incoming service requests to a server on the local network.

DHCP (Dynamic Host Configuration Protocol)

Allows clients to obtain TCP/IP configuration from a centralized DHCP server.

Full Network Management

Describes the web configurator and SMT for managing Prestige settings.

Logging and Tracing

Details built-in message logging, packet tracing, firewall logs, and content filtering logs.

Upgrade Prestige Firmware via LAN

Explains how to upgrade firmware using the LAN.

Embedded FTP and TFTP Servers

Notes that embedded FTP/TFTP servers allow firmware upgrades and configuration backup.

1.2.3 Wireless Features

Discusses wireless LAN standards and Wi-Fi Protected Access (WPA).

Antenna

Describes the Prestige's 2dBi fixed antenna for wireless signal provision.

Wireless LAN MAC Address Filtering

Allows checking wireless station MAC addresses against allowed or denied lists.

WEP Encryption

Explains WEP for encrypting data frames for private network communications.

OTIST (One Touch Intelligent Security Technology)

Allows assigning SSID and security settings to wireless clients supporting OTIST.

Association List

Shows the list of wireless stations currently using the Prestige.

1.3 Applications for the Prestige

Provides examples of what the Prestige can be used for.

1.3.1 Secure Broadband Internet Access via Cable or DSL Modem

Explains connecting to the Internet via cable or DSL modems for secure access.

1.3.2 Wireless LAN Application

Describes adding a wireless LAN without cables for mobile access to network resources.

1.3.3 Front Panel LEDs

Explains the status indicated by the Power (PWR), LAN, WAN, WLAN, and OTIST LEDs.

Chapter 2 Introducing the Web Configurator

2.1 Web Configurator Overview

Overview of the HTML-based management interface for setup and management.

2.2 Accessing the Prestige Web Configurator

Step-by-step instructions to access the web configurator using a browser.

2.3 Resetting the Prestige

Procedure to reset the Prestige to factory defaults using the reset button.

2.3.1 Procedure To Use The Reset Button

Detailed steps for using the rear panel reset button to restore factory defaults.

2.4 Navigating the Prestige Web Configurator

Explains how to navigate the web configurator from the Status screen.

2.4.1 Navigation Panel

Describes the sub-menus in the navigation panel for configuring Prestige features.

2.4.2 Summary: DHCP Table

Shows current DHCP client information including IP, Host Name, and MAC Address.

2.4.3 Summary: Association List

Displays the list of wireless stations currently associated with the Prestige.

2.4.4 Summary: Packet Statistics

Shows packet statistics including transmitted and received packets for WAN, LAN, and Wireless.

Chapter 3 Connection Wizard

3.1 Wizard Setup

Guides through configuring the device to access the Internet using a wizard.

3.2 Connection Wizard: STEP 1: System Information

Configuration screen for System Name and Domain Name settings.

3.2.1 System Name

Defines the unique name to identify the Prestige in an Ethernet network.

3.2.2 Domain Name

Specifies the domain name propagated to DHCP clients on the LAN.

3.3 Connection Wizard: STEP 2: Wireless LAN

Screen for configuring the wireless LAN settings, including SSID and security.

3.3.1 Basic(WEP) Security

Configuration for setting up WEP Encryption parameters for wireless security.

3.3.2 Extend(WPA-PSK) Security

Configuration for setting up WPA-PSK security with a Pre-Shared Key.

3.3.3 OTIST

Enables One-Touch Intelligent Security Technology for assigning wireless settings to clients.

3.4 Connection Wizard: STEP 3: Internet Configuration

Screen for selecting the WAN connection type: Ethernet, PPPoE, or PPTP.

3.4.1 Ethernet Connection Type

Configuration for using a regular Ethernet connection on the WAN port.

3.4.2 PPPoE Connection Type

Explains PPPoE for dial-up connections to broadband modems.

3.4.3 PPTP Connection Type

Details PPTP for secure data transfer, creating Virtual Private Networks (VPNs).

3.4.4 Your IP Address

Screen to assign a fixed or automatically assigned IP address for the Prestige.

3.4.5 WAN MAC Address

How to configure the WAN port's MAC address by default or cloning.

3.4.6 Connection Wizard Complete

Indicates the completion of the connection wizard setup.

Chapter 4 Wireless LAN

4.1 Introduction

Discusses wireless LAN configurations, from peer-to-peer to infrastructure networks.

4.2 Wireless Security Overview

Explains the importance of wireless security for network protection.

4.2.1 Encryption

Covers WPA, WPA-PSK, and WEP encryption methods for securing wireless data.

4.2.2 Authentication

Discusses WPA and IEEE 802.1x authentication methods using RADIUS servers.

4.2.3 Restricted Access

Explains MAC Filter for allowing or excluding devices from accessing the AP.

4.2.4 Hide Prestige Identity

Option to hide the ESSID to prevent wireless clients from seeing the Prestige AP.

4.2.5 Using OTIST

Describes using OTIST to transfer SSID and security settings to wireless clients.

4.3 Configuring Wireless LAN on the Prestige

Steps to configure SSID, Security Mode, MAC Filter, and OTIST for wireless setup.

4.4 General Wireless LAN Screen

Screen for enabling wireless LAN, setting SSID, and channel selection.

4.4.1 No Security

Allows wireless stations to connect without any data encryption.

4.4.2 WEP Encryption

Explains WEP encryption for scrambling data and ensuring network privacy.

4.4.3 Introduction to WPA

Discusses WPA as an improvement over WEP with user authentication and better encryption.

4.4.4 WPA-PSK Application Example

Provides an example of how WPA-PSK application works with pre-shared keys.

4.4.5 WPA-PSK Authentication Screen

Screen for configuring and enabling WPA-PSK authentication with a pre-shared key.

4.4.6 WPA with RADIUS Application Example

Example of WPA authentication using an external RADIUS server for security.

4.4.7 Wireless Client WPA Supplicants

Discusses WPA supplicant software for wireless clients, like Windows XP patch.

4.4.8 WPA Authentication Screen

Screen for configuring and enabling WPA authentication with RADIUS server details.

4.4.9 IEEE 802.1x Overview

Introduces IEEE 802.1x authentication requirements for wireless clients.

4.4.10 IEEE 802.1x and Dynamic WEP Key Exchange Screen

Screen for configuring 802.1x and dynamic WEP key exchange with RADIUS server.

4.5 OTIST

OTIST allows setting wireless client settings to match the Prestige's.

4.5.1 Enabling OTIST

Steps to enable OTIST on both the AP and wireless client before transferring settings.

4.5.1.1 AP

How to enable OTIST using the Reset button or the web configurator.

4.5.1.1.1 Reset button

Using the reset button to encrypt settings for transfer to wireless clients.

4.5.1.2 Wireless Client

Steps to configure OTIST on the ZyXEL utility's Adapter tab for wireless clients.

4.5.2 Starting OTIST

Instructions for starting OTIST on both AP and wireless clients within a time limit.

4.5.3 Notes on OTIST

Notes on OTIST behavior, including searching for APs and re-running OTIST after changes.

4.6 MAC Filter

Allows configuring the Prestige to grant or deny access to devices based on MAC address.

4.7 Wireless LAN Advanced Screen

Screen for advanced wireless LAN settings, including RTS/CTS, Fragmentation, and Preamble.

Chapter 5 WAN

5.1 WAN IP Address Assignment

Explains how IP addresses are assigned for WAN connections, including private IP ranges.

5.2 IP Address and Subnet Mask

Discusses the importance of IP addresses and subnet masks for network identification.

5.3 DNS Server Address Assignment

Explains the role of DNS servers in mapping domain names to IP addresses.

5.4 TCP/IP Priority (Metric)

Describes the metric for determining the best route for network transmission.

5.5 WAN MAC Address

How to configure the WAN port's MAC address by default or cloning.

5.6 Internet Connection

Accessing WAN ISP, IP, and MAC settings through the Network menu.

5.6.1 Ethernet Encapsulation

Screen for configuring Ethernet encapsulation for WAN connections.

5.6.2 PPPoE Encapsulation

Explains PPPoE support for dial-up connections and its benefits.

5.6.3 PPTP Encapsulation

Details PPTP encapsulation for secure data transfer and VPNs.

5.7 Advanced WAN Screen

Screen for configuring advanced WAN settings, including DNS servers.

5.8 Traffic Redirect

Forwards WAN traffic to a backup gateway when the primary connection fails.

5.9 Traffic Redirect Screen

Screen for configuring Traffic Redirect settings and parameters.

Chapter 6 LAN

6.1 LAN Overview

Introduces LAN concepts and configuration options for DHCP server and IP addresses.

6.1.1 IP Pool Setup

Describes the pre-configured IP address pool for DHCP clients.

6.1.2 System DNS Servers

Refers to IP Address and Subnet Mask section for DNS server information.

6.2 LAN TCP/IP

Discusses the Prestige's built-in DHCP server capability for assigning IP and DNS.

6.2.1 Factory LAN Defaults

Lists the default LAN parameters set at the factory.

6.2.2 IP Address and Subnet Mask

Refers to Wizard Setup chapter for IP address and subnet mask details.

6.3 IP Screen

Screen to view and configure the Prestige's LAN IP address and subnet mask.

Chapter 7 DHCP Server

7.1 DHCP

Explains DHCP for clients to obtain TCP/IP configuration from a server.

7.2 DHCP Screen

Screen for enabling DHCP server, setting IP pool, and configuring DNS servers.

7.3 Static DHCP Screen

Allows assigning IP addresses to specific computers based on their MAC addresses.

7.4 Client List Screen

Shows current DHCP client information and allows assigning persistent IP addresses.

Chapter 8 Network Address Translation (NAT)

8.1 NAT Overview

Introduces NAT, which translates IP addresses for hosts in packets.

8.1.1 NAT Definitions

Defines terms like Inside/Outside and Global/Local concerning network addresses.

8.1.2 What NAT Does

Explains how NAT changes source IP addresses and provides firewall protection.

8.1.3 How NAT Works

Describes the process of NAT mapping private IP addresses to globally unique ones.

8.1.4 NAT Application

Illustrates a possible NAT application with multiple inside LANs communicating via WANs.

8.1.5 Default Server IP Address

Supports a default server IP address for unspecified ports and remote management.

8.1.6 Port Forwarding: Services and Port Numbers

Lists commonly used services and their port numbers for port forwarding.

8.2 General NAT Screen

Screen to enable Network Address Translation (NAT) for IP address translation.

8.3 Port Forwarding Screen

Screen for setting up port forwarding rules to make internal servers accessible.

8.3.1 Rule Setup Screen

Screen to define parameters for individual port forwarding rules.

8.4 Trigger Port Forwarding

Solves issues with port forwarding by allowing clients to dynamically use services.

8.4.1 Trigger Port Forwarding Example

Example illustrating how trigger port forwarding works with Real Audio server.

8.4.2 Two Points To Remember About Trigger Ports

Key points about trigger events and potential limitations due to continuous data streams.

8.5 Trigger Port Forwarding Screen

Screen for configuring trigger port settings.

Chapter 9 Firewall

9.1 Introduction to Firewall

Provides background on firewalls and their role in network security.

9.1.1 What is a Firewall?

Defines a firewall as a system enforcing access control policies between networks.

9.1.2 Stateful Inspection Firewall.

Explains stateful inspection firewalls that screen packets against access rules.

9.1.3 About the Prestige Firewall

Describes the Prestige firewall as stateful inspection, protecting against DoS attacks.

9.1.4 Guidelines For Enhancing Security With Your Firewall

Provides recommendations for improving firewall security.

9.2 General Firewall Screen

Screen for enabling the firewall and configuring its general settings.

9.3 Services Screen

Screen to enable service blocking, enter, delete, or modify services to block.

9.3.1 Services

Lists commonly used services and their corresponding port numbers and protocols.

Chapter 10 Static Route Screens

10.1 Static Route Overview

Explains static routes for telling the Prestige about networks beyond immediate gateways.

10.2 IP Static Route Screen

Screen for configuring static routes by specifying destination and gateway.

10.2.1 Static Route Setup Screen

Screen for editing existing or creating new static route entries.

Chapter 11 Remote Management Screens

11.1 Remote Management Overview

Allows determining which services/protocols can access Prestige interfaces from which computers.

11.1.1 Remote Management Limitations

Lists conditions under which remote management over LAN or WAN might not work.

11.1.2 Remote Management and NAT

How to configure remote management when NAT is enabled, using WAN or LAN IP addresses.

11.1.3 System Timeout

Default management session idle timeout and how to change it.

11.2 WWW Screen

Screen for changing World Wide Web settings for remote management.

11.3 SNMP

Explains SNMP for exchanging management information between network devices.

11.3.1 Supported MIBs

Prestige supports MIB II defined in RFC-1213 and RFC-1215 for data collection.

11.3.2 SNMP Traps

Lists events that trigger traps to be sent to the SNMP manager.

11.4 SNMP Screen

Screen for configuring SNMP settings, including community strings and service access.

11.5 Security Screen

Security settings for preventing ICMP response packets and probing.

Chapter 12 UPnP

12.1 Universal Plug and Play Overview

Introduces UPnP as a standard for peer-to-peer network connectivity.

12.1.1 How Do I Know If I'm Using UPnP?

Identifies UPnP hardware via icons in the Network Connections folder.

12.1.2 NAT Traversal

Automates applications operating through NAT via dynamic port mapping and IP discovery.

12.1.3 Cautions with UPnP

Warns about potential network security issues due to UPnP's automated nature.

12.2 UPnP and ZyXEL

Discusses ZyXEL's UPnP certification and implementation details.

12.3 UPnP Screen

Screen for enabling or disabling the Universal Plug and Play (UPnP) feature.

12.4 Installing UPnP in Windows Example

Step-by-step guide for installing UPnP in Windows Me.

12.4.1 Installing UPnP in Windows Me

Steps to install UPnP in Windows Me via Add/Remove Programs.

12.4.2 Installing UPnP in Windows XP

Step-by-step guide for installing UPnP in Windows XP.

12.5 Using UPnP in Windows XP Example

How to use the UPnP feature in Windows XP after installation.

12.5.1 Auto-discover Your UPnP-enabled Network Device

How UPnP automatically discovers network devices and creates port mappings.

12.5.2 Web Configurator Easy Access

Accessing the web configurator via UPnP without knowing the device's IP address.

Chapter 13 System

13.1 System Overview

Information on System screens, referring to the Wizard Setup chapter.

13.2 General Screen

Screen for configuring System Name, Domain Name, and Administrator Inactivity Timer.

13.3 Dynamic DNS

Allows updating dynamic IP address with services like DynDNS for consistent access.

13.3.1 DynDNS Wildcard

Explains the DynDNS wildcard feature for aliasing hostnames.

13.4 Dynamic DNS Screen

Screen for configuring Dynamic DNS service provider, hostname, user name, and password.

13.5 Time Setting Screen

Screen for configuring the Prestige’s time and date based on local time zone.

Chapter 14 Logs

14.1 View Log

Allows viewing all of the Prestige’s logs in one location.

14.2 Log Settings

Configure general log settings, including where to send logs and schedules.

Chapter 15 Tools

15.1 Firmware Upload Screen

Screen for uploading new firmware to the Prestige via the web interface.

15.2 Configuration Screen

Accessing backup, restore, and factory default configuration options.

15.2.1 Backup Configuration

Allows backing up the Prestige's current configuration to a file on your computer.

15.2.2 Restore Configuration

Allows uploading a new or previously saved configuration file to your Prestige.

15.2.3 Back to Factory Defaults

Resets all user-entered configuration information to factory defaults.

15.3 Restart Screen

Allows rebooting the Prestige without turning off the power.

Chapter 16 Troubleshooting

16.1 Problems Starting Up the Prestige

Troubleshooting steps for issues related to the Prestige not powering on.

16.2 Problems with the LAN

Troubleshooting steps for LAN connectivity issues, including LEDs and access.

16.3 Problems with the WAN

Troubleshooting steps for WAN connection issues, including LED status and IP address acquisition.

16.4 Problems with the Password

Troubleshooting steps for password-related issues, including forgotten passwords.

16.5 Problems with Remote Management

Troubleshooting remote management access issues over LAN or WAN.

16.6 Problems Accessing the Prestige

Troubleshooting steps for accessing the Prestige or its web configurator.

16.6.1 Pop-up Windows, JavaScripts and Java Permissions

Ensures browser settings allow pop-ups, JavaScripts, and Java for web configurator access.

16.6.1.1 Internet Explorer Pop-up Blockers

How to disable or configure exceptions for Internet Explorer's pop-up blocker.

16.6.1.1.2 Enable pop-up Blockers with Exceptions

Allows pop-up windows from specific sites by adding them to an allowed list.

16.6.1.2 JavaScripts

Checks if JavaScripts are enabled in Internet Explorer for proper web page display.

16.6.1.3 Java Permissions

Ensures Java permissions are set correctly in Internet Explorer for web configurator functionality.

16.6.1.3.1 JAVA (Sun)

Instructions for enabling Java 2 for applets in Internet Explorer's Advanced tab.

16.6.2 ActiveX Controls in Internet Explorer

Ensures ActiveX controls are allowed in Internet Explorer for downloading components.

Appendix A Product Specifications

Appendix B IP Subnetting

IP Addressing

Explains how routers route based on network numbers and host IDs.

IP Classes

Categorizes IP addresses into classes (A, B, C, D) based on the first octet.

Subnet Masks

Explains subnet masks used to determine network and host ID bits.

Subnetting

Discusses subnetting by converting host ID bits into network number bits.

Example: Two Subnets

Example of dividing a class C address into two subnets using subnetting.

Example: Four Subnets

Example of dividing a class C address into four subnets using subnetting.

Example Eight Subnets

Shows class C IP address last octet values for eight subnets using a 27-bit mask.

Subnetting With Class A and Class B Networks.

Explains subnetting for class A and B networks, including subnet planning.

Appendix C Setting up Your Computer’s IP Address

IP Addressing

Explains how routers route based on network numbers and host IDs.

Windows 95/98/Me

Steps to configure TCP/IP settings in Windows 95/98/Me via Control Panel.

Installing Components

Guides on installing necessary network components like adapters and protocols in Windows.

Configuring

Steps to configure TCP/IP settings, including IP address and DNS.

Verifying Settings

How to verify TCP/IP settings using ipconfig or network connection status.

Windows 2000/NT/XP

Steps to configure TCP/IP settings in Windows 2000/NT/XP via Control Panel.

Verifying Settings

How to verify TCP/IP settings using ipconfig or network connection status.

Macintosh OS 8/9

Steps to configure TCP/IP settings in Mac OS 8/9 via Control Panel.

Macintosh OS X

Steps to configure TCP/IP settings in Mac OS X via System Preferences.

Linux

Instructions for configuring TCP/IP settings in Red Hat Linux 9.0.

Using the K Desktop Environment (KDE)

How to configure IP addresses using the KDE in Red Hat Linux.

Appendix D PPPoE

PPPoE in Action

Describes how PPPoE works with ADSL modems and DSL Access Concentrators.

Benefits of PPPoE

Lists advantages of PPPoE, including familiar DUN interface and ISP authentication.

Traditional Dial-up Scenario

Depicts a typical hardware configuration for computers using dial-up networking.

How PPPoE Works

Explains the PPPoE driver's role and the interaction between computer, modem, and ISP.

ZyWALL as a PPPoE Client

How ZyWALL functions as a PPPoE client, simplifying management for LAN computers.

Appendix E PPTP

What is PPTP?

Defines PPTP as a Microsoft proprietary protocol for tunneling PPP frames.

How can we transport PPP frames from a computer to a broadband modem over Ethernet?

Explains transporting PPP frames via PPTP and ATM VC connections.

PPTP and the ZyWALL

How ZyWALL interacts with ANT in PPTP setups and the need for port forwarding.

PPTP Protocol Overview

Overview of PPTP parties (PNS, PAC, User) and their roles in tunnel establishment.

PPP Data Connection

Explains how PPP frames are tunneled over GRE between PNS and PAC.

Appendix F Wireless LANs

Wireless LAN Topologies

Discusses ad-hoc and infrastructure wireless LAN topologies.

Ad-hoc Wireless LAN Configuration

Explains how to set up an ad-hoc WLAN connecting computers directly.

BSS

Defines a Basic Service Set (BSS) where all communications go through an access point.

ESS

Defines an Extended Service Set (ESS) as overlapping BSSs connected by a wired network.

Channel

Discusses radio frequencies (channels) used by wireless devices and interference avoidance.

RTS/CTS

Explains RTS/CTS to prevent collisions due to hidden nodes in wireless networks.

Fragmentation Threshold

Sets the maximum data fragment size before the AP fragments packets.

Preamble Type

Discusses preamble modes (Long, Short, Dynamic) for synchronizing wireless transmission timing.

IEEE 802.11g Wireless LAN

Details IEEE 802.11g compliance, frequency, data rates, and modulation.

IEEE 802.1x

Discusses IEEE 802.1x for extended authentication, roaming, and RADIUS support.

RADIUS

Explains RADIUS as a client-server model for authentication, authorization, and accounting.

Types of RADIUS Messages

Lists the types of RADIUS messages exchanged for user authentication and accounting.

EAP Authentication

Explains EAP as an authentication protocol supporting various user authentication types with RADIUS.

Types of Authentication

Discusses popular EAP authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP, LEAP.

EAP-MD5 (Message-Digest Algorithm 5)

Describes EAP-MD5 as a simple one-way authentication method with weaknesses.

EAP-TLS (Transport Layer Security)

Explains EAP-TLS requiring digital certificates for mutual authentication.

EAP-TTLS (Tunneled Transport Layer Service)

Describes EAP-TTLS using server-side certificates for secure connections.

PEAP (Protected EAP)

Explains PEAP for secure connections using simple username/password after certificate authentication.

LEAP

LEAP is a Cisco implementation of IEEE 802.1x.

WEP Encryption

WEP encryption scrambles data for private network communications.

WEP Authentication Steps

Illustrates three methods for authenticating wireless stations: Open System, Shared Key, Auto.

Dynamic WEP Key Exchange

Dynamic WEP keys generated by RADIUS server expire on connection timeout or reauthentication.

WPA

Discusses WPA's user authentication using IEEE 802.1x and EAP with RADIUS.

User Authentication

WPA uses IEEE 802.1x and EAP to authenticate wireless stations via RADIUS.

Encryption

WPA improves data encryption using TKIP or AES, MIC, and IEEE 802.1x.

Security Parameters Summary

Summary of security parameters for different authentication methods, including MAC filters.

Roaming

Describes how wireless stations switch between access points in a network.

Requirements for Roaming

Lists requirements for wireless stations to roam between coverage areas.

Appendix G Antenna Selection and Positioning Recommendation

Antenna Characteristics

Discusses antenna characteristics like frequency, radiation pattern, and gain.

Frequency

Antenna frequency requirements for wireless LAN communication (2.4GHz or 5GHz).

Radiation Pattern

A diagram illustrating the shape of an antenna's coverage area.

Antenna Gain

Explains antenna gain in dB and its effect on signal coverage and range.

Types of Antennas For WLAN

Describes two types of antennas: Omni-directional and Directional.

Positioning Antennas

Provides guidelines on mounting and positioning antennas for optimal wireless performance.

Related product manuals