2
TABLE OF CONTENTS
NOTICE..................................................................................................................................................4
PREFACE ...............................................................................................................................................6
CH 1. ZWA-G880 INSTALLATION....................................................................................................7
PACKING LIST.......................................................................................................................................7
BACK PANEL CONNECTIONS .................................................................................................................7
HARDWARE INSTALLATION..................................................................................................................8
CH 2. FIRST TIME CONFIGURATION ............................................................................................9
BEFORE START TO CONFIGURE .............................................................................................................9
KNOWING THE NETWORK APPLICATION ...............................................................................................9
BASIC SETTINGS.................................................................................................................................29
ADVANCED SETTINGS.........................................................................................................................32
CONFIGURING WIRELESS SECURITY...................................................................................................35
CONFIGURING AS WLAN CLIENT ADAPTER.......................................................................................38
QUICK START TO CONFIGURE ..............................................................................................................38
MAC CLONE FOR SINGLE ETHERNET CLIENT ....................................................................................40
EXTEND THE REMOTE AP(BSS).........................................................................................................41
CH 3. CONFIGURINGWDS..............................................................................................................43
WDS NETWORK TOPOLOGY................................................................................................................43
WDSAPPLICATION.............................................................................................................................45
CH 4.ADVANCED CONFIGURATIONS .........................................................................................47
CONFIGURING LAN TO WAN FIREWALL ............................................................................................47
PORT FILTERING .................................................................................................................................47
IPFILTERING ......................................................................................................................................48
MAC FILTERING.................................................................................................................................49
NAT(NETWORK ADDRESS TRANSLATION).........................................................................................50
CONFIGURING PORT FORWARDING (VIRTUALSERVER)..............................................................................51
MULTIPLE SERVERS BEHIND NATEXAMPLE: .....................................................................................51
CONFIGURING DMZ...........................................................................................................................52
CONFIGURING VPN............................................................................................................................53
CONFIGURING WAN INTERFACE.........................................................................................................55
STATIC IP............................................................................................................................................55
DHCPCLIENT (DYNAMIC IP).............................................................................................................56
PPPOE................................................................................................................................................57
PPTP..................................................................................................................................................58
CONFIGURING CLONE MACADDRESS ...............................................................................................60