![ZyXEL Communications NWA-3100 Скачать руководство пользователя страница 20](http://html1.mh-extra.com/html/zyxel-communications/nwa-3100/nwa-3100_user-manual_945913020.webp)
List of Figures
ZyXEL NWA-3100 User’s Guide
20
Figure 39 Bridging Example ................................................................................................................... 77
Figure 40 Bridge Loop: Two Bridges Connected to Hub ........................................................................ 77
Figure 41 Bridge Loop: Bridge Connected to Wired LAN ....................................................................... 78
Figure 42 Wireless: Bridge/Repeater ..................................................................................................... 78
Figure 43 Wireless: AP+Bridge .............................................................................................................. 80
Figure 44 EAP Authentication ................................................................................................................ 82
Figure 45 WPA(2)-PSK Authentication ................................................................................................... 84
Figure 46 WPA(2) with RADIUS Application Example ........................................................................... 85
Figure 47 Security .................................................................................................................................. 87
Figure 48 Security: WEP ........................................................................................................................ 88
Figure 49 Security: 802.1x Only ............................................................................................................ 89
Figure 50 Security: 802.1x Static 64-bit, 802.1x Static 128-bit .............................................................. 90
Figure 51 Security: WPA ....................................................................................................................... 91
Figure 52 Security:WPA2 or WPA2-MIX ................................................................................................. 92
Figure 53 Security: WPA-PSK, WPA2-PSK or WPA2-PSK-MIX ............................................................. 94
Figure 54 RADIUS .................................................................................................................................. 95
Figure 55 Multiple BSS with VLAN Example .......................................................................................... 98
Figure 56 Wireless: Multiple BSS ........................................................................................................... 98
Figure 57 SSID ..................................................................................................................................... 101
Figure 58 Configuring SSID .................................................................................................................. 102
Figure 59 Layer-2 Isolation Application ................................................................................................ 106
Figure 60 Layer-2 Isolation Configuration Screen ................................................................................ 107
Figure 61 Layer-2 Isolation Example .................................................................................................... 108
Figure 62 Layer-2 Isolation Example 1 ................................................................................................. 108
Figure 63 Layer-2 Isolation Example 2 ................................................................................................. 109
Figure 64 MAC Address Filter ...............................................................................................................110
Figure 65 Roaming Example .................................................................................................................111
Figure 66 Roaming ................................................................................................................................112
Figure 67 IP Setup .................................................................................................................................114
Figure 68 Rogue AP: Example .............................................................................................................118
Figure 69 “Honeypot” Attack ..................................................................................................................119
Figure 70 ROGUE AP > Configuration ................................................................................................. 120
Figure 71 ROGUE AP > Friendly AP .................................................................................................... 121
Figure 72 ROGUE AP > Rogue AP ...................................................................................................... 122
Figure 73 Secure and Insecure Remote Management ........................................................................ 123
Figure 74 SSH Communication Example ............................................................................................. 124
Figure 75 Remote Management: Telnet ............................................................................................... 125
Figure 76 Remote Management: FTP .................................................................................................. 126
Figure 77 Remote Management: WWW ............................................................................................... 127
Figure 78 SNMP Management Model .................................................................................................. 128
Figure 79 Remote Management: SNMP .............................................................................................. 131
Figure 80 Certificates on Your Computer ............................................................................................. 134
Figure 81 Certificate Details ................................................................................................................ 135
Содержание NWA-3100
Страница 1: ...www zyxel com NWA 3100 802 11a b g Wireless Access Point User s Guide Version 3 60 10 2006 Edition 1...
Страница 2: ......
Страница 7: ...Safety Warnings ZyXEL NWA 3100 User s Guide 7...
Страница 8: ...Safety Warnings ZyXEL NWA 3100 User s Guide 8...
Страница 10: ...Contents Overview ZyXEL NWA 3100 User s Guide 10...
Страница 24: ...List of Figures ZyXEL NWA 3100 User s Guide 24...
Страница 28: ...List of Tables ZyXEL NWA 3100 User s Guide 28...
Страница 29: ...29 PART I Introduction Introducing the ZyXEL Device 31 Introducing the Web Configurator 39 Tutorial 43...
Страница 30: ...30...
Страница 60: ...Chapter 3 Tutorial ZyXEL NWA 3100 User s Guide 60...
Страница 62: ...62...
Страница 104: ...Chapter 7 MBSSID and SSID ZyXEL NWA 3100 User s Guide 104...
Страница 116: ...Chapter 9 IP Screen ZyXEL NWA 3100 User s Guide 116...
Страница 132: ...Chapter 11 Remote Management ZyXEL NWA 3100 User s Guide 132...
Страница 150: ...Chapter 12 Certificates ZyXEL NWA 3100 User s Guide 150...
Страница 174: ...Chapter 14 VLAN ZyXEL NWA 3100 User s Guide 174...
Страница 184: ...Chapter 15 Maintenance ZyXEL NWA 3100 User s Guide 184...
Страница 186: ...186...
Страница 198: ...Chapter 20 System Password ZyXEL NWA 3100 User s Guide 198...
Страница 228: ...228...
Страница 232: ...Appendix A Product Specifications ZyXEL NWA 3100 User s Guide 232...
Страница 244: ...Appendix B Setting up Your Computer s IP Address ZyXEL NWA 3100 User s Guide 244...
Страница 248: ...Appendix C IP Address Assignment Conflicts ZyXEL NWA 3100 User s Guide 248...
Страница 258: ...Appendix D Wireless LANs ZyXEL NWA 3100 User s Guide 258...
Страница 282: ...Appendix H Text File Based Auto Configuration ZyXEL NWA 3100 User s Guide 282...
Страница 286: ...Appendix I Legal Information ZyXEL NWA 3100 User s Guide 286...