
ZyXEL P-330W User’s Guide
Table of Contents 8
Chapter 5
Wireless .................................................................................................................. 44
5.1 Wireless LAN Overview .....................................................................................44
5.1.1 IBSS ..........................................................................................................44
5.1.2 BSS ...........................................................................................................44
5.1.3 ESS ...........................................................................................................45
5.1.4 RTS/CTS .................................................................................................46
5.2 Configuring Wireless ..........................................................................................47
5.3 Basic Settings ....................................................................................................47
5.4 Wireless Advanced Settings ..............................................................................49
5.4.1 Authentication ...........................................................................................49
5.4.2 Preamble Type ..........................................................................................50
5.5 Wireless Security Overview ...............................................................................51
5.6 Security Parameters Summary ..........................................................................53
5.6.1 WEP Overview ..........................................................................................53
5.6.2 Data Encryption .......................................................................................53
5.6.3 Configuring WEP Encryption ....................................................................53
5.6.4 Introduction to WPA ..................................................................................56
5.6.4.1 User Authentication ........................................................................56
5.6.4.2 Encryption ......................................................................................56
5.6.4.3 WPA-PSK Application Example ......................................................57
5.6.5 Introduction to WPA2 ................................................................................57
5.6.6 Configuring WPA-PSK Authentication ......................................................57
5.6.7 Introduction to RADIUS ...........................................................................59
5.6.7.1 Types of RADIUS Messages ...........................................................59
5.6.7.2 Access-Challenge ...........................................................................59
5.6.7.3 Accounting-Request ........................................................................59
5.6.7.4 Accounting-Response .....................................................................59
5.6.7.5 EAP Authentication Overview .........................................................60
5.6.7.6 WPA with RADIUS Application Example .........................................60
5.6.8 Configuring WPA Authentication ...............................................................61
5.7 Wireless Trusted Stations ...................................................................................63
Chapter 6
Advanced Options .................................................................................................66
6.1 Access Control ...................................................................................................66
6.2 Dynamic DNS .....................................................................................................67
6.3 Configuring Dynamic DNS .................................................................................68
6.4 DMZ ...................................................................................................................69
6.5 Virtual Servers (Port Forwarding) .......................................................................69
6.5.0.1 Configuring Servers Behind SUA (Example) ..................................70
6.5.1 Configuring Virtual Servers .......................................................................71
6.6 ALG ....................................................................................................................72