
ZyXEL G-560 User’s Guide
viii Table of Contents
5.2.2
IP Address and Subnet Mask .............................................................................................5-2
5.3
Configuring System Settings .....................................................................................................5-2
5.4
Time Settings .............................................................................................................................5-4
Chapter 6 Wireless Screens.........................................................................................................................6-1
6.1
Wireless LAN Overview............................................................................................................6-1
6.1.1
IBSS...................................................................................................................................6-1
6.1.2
BSS ....................................................................................................................................6-1
6.1.3
ESS ....................................................................................................................................6-2
6.2
Wireless LAN Basics.................................................................................................................6-3
6.2.1
Channel ..............................................................................................................................6-3
6.2.2
SSID...................................................................................................................................6-3
6.2.3
RTS/CTS............................................................................................................................6-4
6.2.4
Fragmentation Threshold ...................................................................................................6-5
6.3
Configuring Wireless .................................................................................................................6-5
6.4
Wireless Security Overview.......................................................................................................6-8
6.5
WEP Overview ..........................................................................................................................6-9
6.5.1
Data Encryption .................................................................................................................6-9
6.5.2
Authentication....................................................................................................................6-9
6.6
802.1x Overview......................................................................................................................6-11
6.7
Introduction to RADIUS..........................................................................................................6-11
6.7.1
EAP Authentication Overview.........................................................................................6-12
6.8
Dynamic WEP Key Exchange .................................................................................................6-13
6.9
Introduction to WPA................................................................................................................6-13
6.9.1
User Authentication .........................................................................................................6-13
6.9.2
Encryption........................................................................................................................6-13
6.10
WPA-PSK Application Example .............................................................................................6-14
6.11
WPA with RADIUS Application Example..............................................................................6-15
6.12
Security Parameters Summary .................................................................................................6-15
6.13
Wireless Client WPA Supplicants ...........................................................................................6-16
6.14
Configuring Wireless Security.................................................................................................6-16
6.14.1
Disable .............................................................................................................................6-16
6.14.2
WEP.................................................................................................................................6-17
6.14.3
WPA-PSK........................................................................................................................6-19
6.14.4
WPA ................................................................................................................................6-20
6.14.5
802.1x ..............................................................................................................................6-22
6.15
MAC Filter...............................................................................................................................6-23
6.16
OTIST (One-Touch Intelligent Security Technology).............................................................6-25
Chapter 7 Management Screens.................................................................................................................7-1
7.1
Maintenance Overview ..............................................................................................................7-1
7.2
Configuring Password................................................................................................................7-1
7.3
Logs ...........................................................................................................................................7-2