User`s guide

G-3000H User’s Guide
Table of Contents 11
6.1.2 Authentication ...........................................................................................73
6.1.3 Restricted Access .....................................................................................73
6.1.4 Hide ZyAIR Identity ...................................................................................74
6.1.5 WEP Encryption ........................................................................................74
6.2 Configuring WEP Encryption ..............................................................................74
6.3 802.1x Overview ................................................................................................74
6.4 EAP Authentication Overview ............................................................................74
6.5 Dynamic WEP Key Exchange ............................................................................75
6.6 Introduction to WPA ...........................................................................................75
6.6.1 User Authentication .................................................................................76
6.6.2 Encryption ................................................................................................76
6.6.3 WPA(2)-PSK Application Example ...........................................................76
6.7 WPA(2) with RADIUS Application Example .......................................................77
6.8 Security Modes ..................................................................................................78
6.9 Security Modes and Wireless Client Compatibility .............................................79
6.10 Wireless Client WPA Supplicants .....................................................................79
6.11 Wireless Security Effectiveness .......................................................................80
6.12 Configuring Security .........................................................................................80
6.12.1 Security: No Access ................................................................................81
6.12.2 Security: WEP .........................................................................................82
6.12.3 Security: 802.1x Only, 802.1x Static 64-bit WEP, 128-bit WEP ..............83
6.12.4 Security: 802.1x Dynamic 64-bit WEP, 128-bit WEP ..............................85
6.12.5 Security: WPA, WPA-MIX, WPA2, WPA2-MIX ........................................86
6.12.6 Security: WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ................................87
6.13 Introduction to RADIUS ....................................................................................89
6.14 Configuring RADIUS ........................................................................................89
6.15 Configuring Local User Database ....................................................................91
Chapter 7
Multiple ESS, SSID and VLAN............................................................................... 93
7.1 Wireless LAN Infrastructures .............................................................................93
7.1.1 Multiple ESS .............................................................................................93
7.1.2 Notes on Multiple-ESS ..............................................................................93
7.1.3 Multiple ESS Example ..............................................................................94
7.1.4 Multi-ESS with VLAN Example .................................................................94
7.1.5 Configuring Multiple ESS ..........................................................................94
7.2 SSID ...................................................................................................................97
7.2.1 Configuring SSID ......................................................................................98
7.2.2 Second Rx VLAN ID ...............................................................................100
Chapter 8
Other Wireless Configurations ........................................................................... 103
8.1 Layer-2 Isolation Introduction ...........................................................................103