
ZyXEL G-560 User’s Guide
viii Table of Contents
5.2.2 IP Address and Subnet Mask .............................................................................................5-2
5.3 Configuring System Settings .....................................................................................................5-2
5.4 Time Settings .............................................................................................................................5-4
Chapter 6 Wireless Screens.........................................................................................................................6-1
6.1 Wireless LAN Overview............................................................................................................6-1
6.1.1 IBSS...................................................................................................................................6-1
6.1.2 BSS ....................................................................................................................................6-1
6.1.3 ESS ....................................................................................................................................6-2
6.2 Wireless LAN Basics.................................................................................................................6-3
6.2.1 Channel ..............................................................................................................................6-3
6.2.2 SSID...................................................................................................................................6-3
6.2.3 RTS/CTS............................................................................................................................6-4
6.2.4 Fragmentation Threshold ...................................................................................................6-5
6.3 Configuring Wireless.................................................................................................................6-5
6.4 Wireless Security Overview.......................................................................................................6-8
6.5 WEP Overview ..........................................................................................................................6-9
6.5.1 Data Encryption .................................................................................................................6-9
6.5.2 Authentication....................................................................................................................6-9
6.6 802.1x Overview......................................................................................................................6-11
6.7 Introduction to RADIUS..........................................................................................................6-11
6.7.1 EAP Authentication Overview.........................................................................................6-12
6.8 Dynamic WEP Key Exchange .................................................................................................6-13
6.9 Introduction to WPA................................................................................................................6-13
6.9.1 User Authentication .........................................................................................................6-13
6.9.2 Encryption........................................................................................................................6-13
6.10 WPA-PSK Application Example .............................................................................................6-14
6.11 WPA with RADIUS Application Example..............................................................................6-15
6.12 Security Parameters Summary.................................................................................................6-15
6.13 Wireless Client WPA Supplicants ...........................................................................................6-16
6.14 Configuring Wireless Security.................................................................................................6-16
6.14.1 Disable .............................................................................................................................6-16
6.14.2 WEP.................................................................................................................................6-17
6.14.3 WPA-PSK........................................................................................................................6-19
6.14.4 WPA ................................................................................................................................6-20
6.14.5 802.1x ..............................................................................................................................6-22
6.15 MAC Filter...............................................................................................................................6-23
6.16 OTIST (One-Touch Intelligent Security Technology).............................................................6-25
Chapter 7 Management Screens.................................................................................................................7-1
7.1 Maintenance Overview ..............................................................................................................7-1
7.2 Configuring Password................................................................................................................7-1
7.3 Logs ...........................................................................................................................................7-2