
ZyAIR G-5100 User’s Guide
7Table of Contents
Chapter 4
System Screens ..................................................................................................... 48
4.1 System Overview ...............................................................................................48
4.2 Configuring General Setup .................................................................................48
4.3 Configuring Password ........................................................................................49
4.4 Configuring Time Setting ...................................................................................50
Chapter 5
Wireless Configuration and Roaming ................................................................. 54
5.1 Wireless LAN Overview .....................................................................................54
5.1.1 IBSS ..........................................................................................................54
5.1.2 BSS ...........................................................................................................54
5.1.3 ESS ...........................................................................................................55
5.2 Wireless LAN Basics ..........................................................................................56
5.2.1 RTS/CTS .................................................................................................56
5.2.2 Fragmentation Threshold ..........................................................................57
5.3 Spanning Tree Protocol (STP) ...........................................................................58
5.3.1 Rapid STP ................................................................................................58
5.3.2 STP Terminology ......................................................................................58
5.3.3 How STP Works .......................................................................................59
5.3.4 STP Port States ........................................................................................59
5.4 Configuring Wireless ..........................................................................................59
5.4.1 Access Point Mode ...................................................................................60
5.4.2 Bridge/Repeater Mode ..............................................................................62
5.4.3 AP+Bridge Mode ......................................................................................66
5.5 Configuring Roaming .........................................................................................68
5.5.1 Requirements for Roaming .......................................................................69
Chapter 6
Wireless Security ................................................................................................... 72
6.1 Wireless Security Overview ...............................................................................72
6.2 WEP Overview ...................................................................................................72
6.2.1 Data Encryption .......................................................................................73
6.2.2 Authentication ...........................................................................................73
6.3 Configuring WEP Encryption ..............................................................................74
6.4 MAC Filter ..........................................................................................................76
6.5 IEEE 802.1x Overview .......................................................................................78
6.6 Introduction to Internal RADIUS Server .............................................................78
6.7 Introduction to RADIUS ......................................................................................78
6.7.1 Types of RADIUS Messages ....................................................................78
6.8 EAP Authentication Overview ............................................................................79
6.9 Dynamic WEP Key Exchange ............................................................................80
6.10 Introduction to WPA .........................................................................................81