802.11g Wireless 4-port Router User's Guide
Table Of Contents
- User’s Guide
- Copyright
- Federal Communications Commission (FCC) Interference Statement
- ZyXEL Limited Warranty
- Customer Support
- Table of Contents
- List of Figures
- List of Tables
- Preface
- Getting to Know Your ZyAIR
- 1.1 Introducing the ZyAIR
- 1.2 ZyAIR Features
- 1.2.1 Physical Features
- 1.2.2 Firmware Features
- 1.2.2.1 Internal RADIUS Server
- 1.2.2.2 Wi-Fi Protected Access
- 1.2.2.3 802.11b Wireless LAN Standard
- 1.2.2.4 802.11g Wireless LAN Standard
- 1.2.2.5 STP (Spanning Tree Protocol) / RSTP (Rapid STP)
- 1.2.2.6 Certificates
- 1.2.2.7 Limit the number of Client Connections
- 1.2.2.8 SSL Passthrough
- 1.2.2.9 Firewall
- 1.2.2.10 Brute-Force Password Guessing Protection
- 1.2.2.11 Wireless LAN MAC Address Filtering
- 1.2.2.12 WEP Encryption
- 1.2.2.13 IEEE 802.1X Network Security
- 1.2.2.14 Universal Plug and Play (UPnP)
- 1.2.2.15 Dynamic DNS Support
- 1.2.2.16 PPPoE Support (RFC2516)
- 1.2.2.17 PPTP Encapsulation
- 1.2.2.18 Network Address Translation (NAT)
- 1.2.2.19 Traffic Redirect
- 1.2.2.20 NAT for Single-IP-address Internet Access
- 1.2.2.21 DHCP (Dynamic Host Configuration Protocol)
- 1.2.2.22 Multicast
- 1.2.2.23 IP Alias
- 1.2.2.24 IP Policy Routing
- 1.2.2.25 SNMP
- 1.2.2.26 Full Network Management
- 1.2.2.27 Logging and Tracing
- 1.2.2.28 Diagnostics Capabilities
- 1.2.2.29 Embedded FTP and TFTP Servers
- 1.2.2.30 Wireless Association List
- 1.2.2.31 Wireless LAN Channel Usage
- 1.3 Applications for the ZyAIR
- Introducing the Web Configurator
- Wizard Setup
- System Screens
- LAN Screens
- Wireless Configuration and Roaming
- Wireless Security
- 7.1 Wireless Security Overview
- 7.2 Security Parameters Summary
- 7.3 WEP Overview
- 7.4 Configuring WEP Encryption
- 7.5 Introduction to WPA
- 7.6 Configuring WPA-PSK Authentication
- 7.7 Wireless Client WPA Supplicants
- 7.8 Configuring WPA Authentication
- 7.9 Introduction to RADIUS
- 7.10 Configuring RADIUS
- 7.11 802.1x Overview
- 7.12 Dynamic WEP Key Exchange
- 7.13 Configuring 802.1x and Dynamic WEP Key Exchange
- 7.14 Configuring 802.1x and Static WEP Key Exchange
- 7.15 Configuring 802.1x
- 7.16 MAC Filter
- Internal RADIUS Server
- WAN
- Single User Account (SUA) / Network Address Translation (NAT)
- Static Route Screens
- Remote Management Screens
- UPnP
- Firewalls
- Firewall Screens
- Content Filtering
- Certificates
- 17.1 Certificates Overview
- 17.2 Self-signed Certificates
- 17.3 Configuration Summary
- 17.4 My Certificates
- 17.5 Certificate File Formats
- 17.6 Importing a Certificate
- 17.7 Creating a Certificate
- 17.8 My Certificate Details
- 17.9 Trusted CAs
- 17.10 Importing a Trusted CA’s Certificate
- 17.11 Trusted CA Certificate Details
- Log Screens
- Maintenance
- Introducing the SMT
- General Setup
- Menu 2 WAN Setup
- LAN Setup
- Internet Access
- Remote Node Configuration
- Static Route Setup
- Dial-in User Setup
- Network Address Translation (NAT)
- Filter Configuration
- Enabling the Firewall
- SNMP Configuration
- System Security
- System Information and Diagnosis
- Firmware and Configuration File Maintenance
- System Maintenance and Information
- Remote Management
- Call Scheduling
- Appendix A
- Appendix B
- Appendix C
- Appendix D
- Appendix E
- Appendix F
- Appendix G
- Appendix H
- Appendix I
- Appendix J
- Appendix K
- Appendix L
- Index

ZyAIR G-2000 Plus User’s Guide
23 List of Figures
Figure 37 Wireless: WPA .................................................................................................... 103
Figure 38 Wireless: 802.1x and Dynamic WEP .................................................................. 106
Figure 39 Wireless: 802.1x and Static WEP ....................................................................... 108
Figure 40 Wireless: 802.1x ................................................................................................. 111
Figure 41 MAC Address Filter ............................................................................................. 113
Figure 42 ZyAIR Authenticates Wireless Stations ............................................................... 115
Figure 43 ZyAIR Authenicates other AP’s ........................................................................... 115
Figure 44 Internal RADIUS Server Setting Screen ............................................................ 117
Figure 45 Trusted AP Overview .......................................................................................... 118
Figure 46 Trusted AP Screen .............................................................................................. 119
Figure 47 Trusted Users Screen ......................................................................................... 121
Figure 48 Ethernet Encapsulation ....................................................................................... 125
Figure 49 Ethernet Encapsulation ....................................................................................... 126
Figure 50 PPPoE Encapsulation ......................................................................................... 128
Figure 51 PPTP Encapsulation ........................................................................................... 130
Figure 52 WAN: IP .............................................................................................................132
Figure 53 MAC Setup .......................................................................................................... 134
Figure 54 How NAT Works .................................................................................................. 138
Figure 55 NAT Application With IP Alias ............................................................................. 139
Figure 56 Multiple Servers Behind NAT Example ............................................................... 143
Figure 57 SUA/NAT Setup .................................................................................................. 144
Figure 58 Address Mapping ................................................................................................ 146
Figure 59 Address Mapping Edit ......................................................................................... 147
Figure 60 Trigger Port Forwarding Process: Example ........................................................ 149
Figure 61 Trigger Port .........................................................................................................150
Figure 62 Example of Static Routing Topology ................................................................... 152
Figure 63 Static Route .........................................................................................................153
Figure 64 Static Route: Edit ................................................................................................ 154
Figure 65 Remote Management: WWW ............................................................................. 158
Figure 66 Telnet Configuration on a TCP/IP Network ......................................................... 159
Figure 67 Remote Management: Telnet .............................................................................. 159
Figure 68 Remote Management: FTP ................................................................................. 160
Figure 69 SNMP Management Model ................................................................................. 161
Figure 70 Remote Management: SNMP ............................................................................. 164
Figure 71 Remote Management: DNS ................................................................................ 165
Figure 72 Security ............................................................................................................... 167
Figure 73 Configuring UPnP ............................................................................................... 170
Figure 74 ZyAIR Firewall Application .................................................................................. 180
Figure 75 Three-Way Handshake ....................................................................................... 182
Figure 76 SYN Flood ........................................................................................................... 183
Figure 77 Smurf Attack ....................................................................................................... 184
Figure 78 Stateful Inspection ............................................................................................... 185
Figure 79 LAN to WAN Traffic ............................................................................................. 195