Network Management
5-21
5.
Click
Apply
to save any changes to the WAN screen. Navigating away from the screen
without clicking the Apply button results in all changes to the screen being lost.
6.
Click
Undo Changes
(if necessary) to undo any changes made. Undo Changes reverts the
settings displayed on the WAN screen to the last saved configuration.
7.
Click
Logout
to securely exit the Access Point applet. A prompt displays confirming the
logout before the applet is closed.
5.2.1 Configuring Network Address Translation (NAT) Settings
Network Address Translation (NAT)
converts an IP address in one network to a different IP address or
set of IP addresses in another network. The access point router maps its local (inside) network
addresses to WAN (outside) IP addresses, and translates the WAN IP addresses on incoming packets
to local IP addresses. NAT is useful because it allows the authentication of incoming and outgoing
Idle Time (seconds)
Specify an idle time in seconds to limit how long the access point’s
WAN connection remains active after outbound and inbound traffic
is not detected. The Idle Time field is grayed out if
Keep-Alive
is
enabled.
Authentication Type
Use the
Authentication Type
menu to specify the authentication
protocol(s) for the WAN connection. Choices include
None,
PAP or
CHAP, PAP,
or
CHAP.
Password Authentication Protocol (PAP)
and
Challenge Handshake
Authentication Protocol (CHAP)
are competing identify-verification
methods.
PAP
sends a username and password over a network to a server
that compares the username and password to a table of authorized
users. If the username and password are matched in the table,
server access is authorized. WatchGuard products do not support
the PAP protocol because the username and password are sent as
clear text that a hacker can read.
CHAP
uses secret information and mathematical algorithms to
send a derived numeric value for login. The login server knows the
secret information and performs the same mathematical
operations to derive a numeric value. If the results match, server
access is authorized. After login, one of the numbers in the
mathematical operation is changed to secure the connection. This
prevents any intruder from trying to copy a valid authentication
session and replaying it later to log in.
Summary of Contents for AP-51 Series
Page 1: ...AP 51xx Access Point Product Reference Guide ...
Page 3: ...AP 51xx Access Point Product Reference Guide 72E 124688 01 May 2009 ...
Page 4: ......
Page 16: ...AP 51xx Access Point Product Reference Guide xiv ...
Page 80: ...AP 51xx Access Point Product Reference Guide 2 32 ...
Page 96: ...AP 51xx Access Point Product Reference Guide 3 16 ...
Page 158: ...AP 51xx Access Point Product Reference Guide 4 62 ...
Page 238: ...AP 51xx Access Point Product Reference Guide 5 80 ...
Page 318: ...AP 51xx Access Point Product Reference Guide 6 80 ...
Page 636: ...AP 51xx Access Point Product Reference Guide 9 22 3 Define a mesh supported WLAN ...
Page 649: ...Configuring Mesh Networking 9 35 3 Determine the Radio MAC Address and BSSID MAC Addresses ...
Page 679: ...Adaptive AP 10 25 line con 0 line vty 0 24 end ...
Page 680: ...AP 51xx Access Point Product Reference Guide 10 26 ...
Page 692: ...AP 51xx Access Point Product Reference Guide A 12 ...
Page 716: ...AP 51xx Access Point Product Reference Guide C 4 ...
Page 722: ...AP 51xx Access Point Product Reference Guide IN 10 ...
Page 723: ......