ZyXEL 91-005-124003B Datasheet Page 51

  • Download
  • Add to my manuals
  • Print
  • Page
    / 192
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 50
G-1000 User’s Guide
Chapter 6 Wireless LAN 51
Use the Local User Database if you have less than 32 wireless clients in your network.
The G-1000 uses MD5 encryption when a client authenticates with the Local User
Database
6.2.3 Restricted Access
The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).
6.2.4 Hide G-1000 Identity
If you hide the ESSID, then the G-1000 cannot be seen when a wireless client scans for local
APs. The trade-off for the extra security of “hiding” the G-1000 may be inconvenience for
some valid WLAN clients.
6.2.5 Configuring Wireless LAN on the G-1000
1 Configure the
ESSID and WEP in
the Wireless screen. If you configure WEP, you can’t configure WPA(2) or WPA(2)-
PSK.
2 Use the MAC Filter screen to restrict access to your wireless network by MAC address.
3 Use the Roaming screen to configure the G-1000 so that in a network environment with
multiple access points, wireless stations are able to switch from one access point to
another as they move between the coverage areas.
4 Configure WPA(2) or WPA(2)-PSK in the 802.1x/WPA screen. Configure 802.1x
wireless client authentication in the 802.1x/WPA screen.
5 Configure the built-in authentication database in the Local User Database screen.
6 Configure the authentication and accounting servers for RADIUS in the RADIUS screen.
The following figure shows the relative effectiveness of these wireless security methods
available on your G-1000.
Page view 50
1 2 ... 46 47 48 49 50 51 52 53 54 55 56 ... 191 192

Comments to this Manuals

No comments