ZyAIR B-2000 v.
2
Broadband Wireless Sharing Router
22
Table 4 Wireless 802.1x Authentication
LABEL DESCRIPTION
Dynamic WEP
Key Exchange
This field is activated only when you select
Authentication Required
in the
Wireless Port Control
field. Also set the
Authentication Databases
field to
RADIUS Only
. Local user database may not be used.
Select
Disable
to allow wireless stations to communicate with the access points
without using Dynamic WEP Key Exchange.
Select
64-bit WEP
or
128-bit WEP
to enable data encryption.
Up to 32 stations can access the ZyAIR when you configure Dynamic WEP Key
Exchange.
5.5 Local User Database and RADIUS Overview
EAP is an authentication protocol designed originally to run over PPP (Point-to-Point Protocol) frame in
order to support multiple types of user authentication. RADIUS is based on a client-sever model that
supports authentication, authorization and accounting. The access point (ZyAIR) is the client and the server
is the RADIUS server. RADIUS is a simple package exchange in which your ZyAIR acts as a message
relay between the wireless station and the network RADIUS server. In order to ensure network security, the
access point and the RADIUS server use a shared secret key, which is a password, they both know. The key
is not sent over the network. In addition to the shared key, password information exchanged is also
encrypted to protect the network from unauthorized access. By using EAP to interact with an EAP-
compatible RADIUS server, the access point helps a wireless station and a RADIUS server to perform
mutual authentication.
To authenticate wireless users without interacting with a network RADIUS server, you can store user
profiles locally. To change your ZyAIR’s local user list, click
ADVANCED
,
WIRELESS
and then the
Local User Database
tab.
If you do enable the EAP authentication, you need to specify the local user database or the external sever
for remote user authentication. To set up your ZyAIR’s local user database, click
ADVANCED
,
WIRELESS
and then the
Local User Database
tab. To set up your ZyAIR’s RADIUS server settings,
click
WIRELESS
, then the
RADIUS
tab.
5.6 Enabling Firewall
The ZyAIR contains a stateful inspection firewall designed to protect against Denial of Service (DoS)
attacks. Stateful inspection means the ZyAIR records packet information, such as port number and
source/destination addresses and then allows or denies the response depending on your firewall rules.
The default rules allow LAN-to-WAN traffic and deny traffic initiated from WAN-to-LAN. You may block
traffic initiated from the LAN by configuring blocked services in the
Services
screen. You may allow
Summary of Contents for ZYAIR B-2000
Page 2: ......