
ZyXEL G-2000 Plus v2 User’s Guide
Table of Contents 13
6.2 Wireless Security Overview ...............................................................................82
6.2.1 SSID .........................................................................................................82
6.2.2 MAC Address Filter ...................................................................................82
6.2.3 User Authentication ..................................................................................82
6.2.4 Encryption .................................................................................................83
6.3 Additional Wireless Terms ..................................................................................84
6.4 Configuring Wireless .........................................................................................84
6.5 Wireless Security - No Security ..........................................................................86
6.6 Configuring WEP Encryption ..............................................................................87
6.7 Configuring WPA(2)-PSK Authentication ...........................................................89
6.8 Configuring WPA(2) Authentication ....................................................................91
6.9 Configuring RADIUS ..........................................................................................93
6.10 Configuring 802.1x ...........................................................................................95
6.11 MAC Filter ......................................................................................................97
6.12 Configuring Roaming .....................................................................................99
Chapter 7
WAN....................................................................................................................... 101
7.1 WAN Overview .................................................................................................101
7.2 Configuring WAN ISP ......................................................................................101
7.2.1 Ethernet Encapsulation............................................................................101
7.2.1.1 Service Type .................................................................................102
7.2.2 PPPoE Encapsulation .............................................................................103
7.2.3 PPTP Encapsulation ...............................................................................105
7.3 Configuring WAN IP ........................................................................................107
7.4 Configuring WAN MAC ....................................................................................110
Chapter 8
Single User Account (SUA) / Network Address Translation (NAT).................. 113
8.1 NAT Overview ..................................................................................................113
8.1.1 NAT Definitions .......................................................................................113
8.1.2 What NAT Does ...................................................................................... 114
8.1.3 How NAT Works .....................................................................................114
8.1.4 NAT Application ......................................................................................115
8.1.5 NAT Mapping Types ...............................................................................116
8.2 Using NAT ........................................................................................................117
8.2.1 SUA (Single User Account) Versus NAT ................................................117
8.3 SUA Server ......................................................................................................117
8.3.1 Default Server IP Address ...................................................................... 118
8.3.2 Port Forwarding: Services and Port Numbers ........................................118
8.3.3 Configuring Servers Behind SUA (Example) ..........................................119
8.4 Configuring SUA Server .................................................................................. 119
8.5 Configuring Address Mapping .........................................................................121