
ZyAIR G-3000 User’s Guide
Table of Contents 10
5.2 Wireless LAN Basics ..........................................................................................58
5.2.1 RTS/CTS .................................................................................................58
5.2.2 Fragmentation Threshold ..........................................................................59
5.3 Spanning Tree Protocol (STP) ...........................................................................60
5.3.1 Rapid STP ................................................................................................60
5.3.2 STP Terminology ......................................................................................60
5.3.3 How STP Works .......................................................................................61
5.3.4 STP Port States ........................................................................................61
5.4 Preamble ...........................................................................................................61
5.5 Configuring Wireless ..........................................................................................62
5.5.1 Access Point Mode ...................................................................................62
5.5.2 Bridge/Repeater Mode ..............................................................................65
5.5.3 AP+Bridge Mode ......................................................................................69
5.6 Configuring Roaming .........................................................................................71
5.6.1 Requirements for Roaming .......................................................................72
Chapter 6
Wireless Security ................................................................................................... 74
6.1 Wireless Security Overview ...............................................................................74
6.2 WEP Overview ...................................................................................................74
6.2.1 Data Encryption .......................................................................................75
6.2.2 Authentication ...........................................................................................75
6.3 Configuring WEP Encryption ..............................................................................76
6.4 MAC Filter ..........................................................................................................78
6.5 802.1x Overview ................................................................................................80
6.6 Introduction to Local User Database ..................................................................80
6.7 Introduction to RADIUS ......................................................................................80
6.7.1 Types of RADIUS Messages ....................................................................80
6.8 EAP Authentication Overview ............................................................................81
6.9 Dynamic WEP Key Exchange ............................................................................82
6.10 Introduction to WPA .........................................................................................83
6.10.1 User Authentication ...............................................................................83
6.10.2 Encryption ..............................................................................................83
6.11 WPA-PSK Application Example ........................................................................84
6.12 WPA with RADIUS Application Example ..........................................................84
6.13 Security Parameters Summary ........................................................................86
6.14 Wireless Client WPA Supplicants .....................................................................87
6.15 Configuring 802.1x and WPA ...........................................................................87
6.16 Authentication Required : 802.1x .....................................................................88
6.17 Authentication Required : WPA ........................................................................90
6.18 Authentication Required: WPA-PSK ................................................................91
6.19 Configuring Local User Database ....................................................................92
6.20 Configuring RADIUS ........................................................................................94