ZyXEL P-330W User Guide - Page 8

Wireless, Advanced Options - port forward

Page 8 highlights

ZyXEL P-330W User's Guide Chapter 5 Wireless ...46 5.1 Wireless LAN Overview 46 5.1.1 IBSS ...46 5.1.2 BSS ...46 5.1.3 ESS ...47 5.1.4 RTS/CTS 48 5.2 Configuring Wireless 49 5.3 Basic Settings ...49 5.4 Wireless Advanced Settings 51 5.4.1 Authentication 51 5.4.2 Preamble Type 52 5.5 Site Survey ...53 5.6 Wireless Security Overview 53 5.7 Security Parameters Summary 56 5.7.1 WEP Overview 56 5.7.2 Data Encryption 56 5.7.3 Configuring WEP Encryption 56 5.7.4 Introduction to WPA 59 5.7.4.1 User Authentication 59 5.7.4.2 Encryption 59 5.7.4.3 WPA-PSK Application Example 60 5.7.5 Introduction to WPA2 60 5.7.6 Configuring WPA-PSK Authentication 60 5.7.7 Introduction to RADIUS 62 5.7.7.1 Types of RADIUS Messages 62 5.7.7.2 Access-Challenge 62 5.7.7.3 Accounting-Request 62 5.7.7.4 Accounting-Response 62 5.7.7.5 EAP Authentication Overview 63 5.7.7.6 WPA with RADIUS Application Example 63 5.7.8 Configuring WPA Authentication 64 5.8 WDS Settings ...66 5.9 Wireless Trusted Stations 67 Chapter 6 Advanced Options 70 6.1 Access Control 70 6.2 Dynamic DNS ...71 6.3 Configuring Dynamic DNS 72 6.4 DMZ ...73 6.5 Virtual Servers (Port Forwarding 73 6.5.0.1 Configuring Servers Behind SUA (Example 74 Table of Contents 8

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141

ZyXEL P-330W User’s Guide
Table of Contents
8
Chapter 5
Wireless
..................................................................................................................
46
5.1 Wireless LAN Overview
.....................................................................................
46
5.1.1 IBSS
..........................................................................................................
46
5.1.2 BSS
...........................................................................................................
46
5.1.3 ESS
...........................................................................................................
47
5.1.4 RTS/CTS
.................................................................................................
48
5.2 Configuring Wireless
..........................................................................................
49
5.3 Basic Settings
....................................................................................................
49
5.4 Wireless Advanced Settings
..............................................................................
51
5.4.1 Authentication
...........................................................................................
51
5.4.2 Preamble Type
..........................................................................................
52
5.5 Site Survey
.........................................................................................................
53
5.6 Wireless Security Overview
...............................................................................
53
5.7 Security Parameters Summary
..........................................................................
56
5.7.1 WEP Overview
..........................................................................................
56
5.7.2 Data Encryption
.......................................................................................
56
5.7.3 Configuring WEP Encryption
....................................................................
56
5.7.4 Introduction to WPA
..................................................................................
59
5.7.4.1 User Authentication
........................................................................
59
5.7.4.2 Encryption
......................................................................................
59
5.7.4.3 WPA-PSK Application Example
......................................................
60
5.7.5 Introduction to WPA2
................................................................................
60
5.7.6 Configuring WPA-PSK Authentication
......................................................
60
5.7.7 Introduction to RADIUS
...........................................................................
62
5.7.7.1 Types of RADIUS Messages
...........................................................
62
5.7.7.2 Access-Challenge
...........................................................................
62
5.7.7.3 Accounting-Request
........................................................................
62
5.7.7.4 Accounting-Response
.....................................................................
62
5.7.7.5 EAP Authentication Overview
.........................................................
63
5.7.7.6 WPA with RADIUS Application Example
.........................................
63
5.7.8 Configuring WPA Authentication
...............................................................
64
5.8 WDS Settings
.....................................................................................................
66
5.9 Wireless Trusted Stations
...................................................................................
67
Chapter 6
Advanced Options
.................................................................................................
70
6.1 Access Control
...................................................................................................
70
6.2 Dynamic DNS
.....................................................................................................
71
6.3 Configuring Dynamic DNS
.................................................................................
72
6.4 DMZ
...................................................................................................................
73
6.5 Virtual Servers (Port Forwarding)
.......................................................................
73
6.5.0.1 Configuring Servers Behind SUA (Example)
..................................
74