
Prestige 334W User’s Guide
Table of Contents xi
7.4 Configuring Roaming .................................................................................................................. 7-6
7.4.1 Requirements for Roaming .................................................................................................... 7-8
Chapter 8 Wireless Security........................................................................................................................ 8-1
8.1 Wireless Security Overview......................................................................................................... 8-1
8.2 Security Parameters Summary ................................................................................................... 8-3
8.3 WEP Overview ............................................................................................................................. 8-4
8.3.1 Data Encryption ..................................................................................................................... 8-4
8.3.2 Authentication........................................................................................................................ 8-4
8.3.3 Preamble Type ....................................................................................................................... 8-6
8.4 Configuring WEP Encryption..................................................................................................... 8-6
8.5 Introduction to WPA.................................................................................................................... 8-8
8.5.1 User Authentication ............................................................................................................... 8-9
8.5.2 Encryption.............................................................................................................................. 8-9
8.5.3 WPA-PSK Application Example ........................................................................................... 8-9
8.6 Configuring WPA-PSK Authentication.................................................................................... 8-10
8.7 Wireless Client WPA Supplicants ............................................................................................. 8-13
8.7.1 WPA with RADIUS Application Example .......................................................................... 8-13
8.8 Configuring WPA Authentication ............................................................................................. 8-14
8.9 802.1x Overview ......................................................................................................................... 8-16
8.10 Dynamic WEP Key Exchange ............................................................................................... 8-17
8.11 Configuring 802.1x and Dynamic WEP Key Exchange .......................................................... 8-17
8.12 Configuring 802.1x and Static WEP Key Exchange............................................................ 8-19
8.13 Configuring 802.1x................................................................................................................. 8-23
8.14 MAC Filter.............................................................................................................................. 8-25
8.15 Introduction to Local User Database.................................................................................... 8-27
8.16 Configuring Local User Database......................................................................................... 8-28
8.17 Introduction to RADIUS ....................................................................................................... 8-29
8.17.1 EAP Authentication Overview............................................................................................. 8-30
8.18 Configuring RADIUS............................................................................................................. 8-31
Chapter 9 WAN Screens .............................................................................................................................. 9-1
9.1 WAN Overview............................................................................................................................. 9-1
9.2 TCP/IP Priority (Metric) ............................................................................................................. 9-1
9.3 Configuring Route........................................................................................................................ 9-1
9.4 Configuring WAN ISP ................................................................................................................. 9-2
9.4.1 Ethernet Encapsulation........................................................................................................... 9-2
9.4.2 PPPoE Encapsulation .............................................................................................................9-4
9.4.3 PPTP Encapsulation............................................................................................................... 9-6
9.5 Configuring WAN IP.................................................................................................................... 9-7
9.6 Configuring WAN MAC .............................................................................................................9-11
9.7 Traffic Redirect .......................................................................................................................... 9-12
9.8 Configuring Traffic Redirect..................................................................................................... 9-13
Kommentare zu diesen Handbüchern