ZyXEL Communications G-1000 Benutzerhandbuch
G-1000 User’s Guide
62
Chapter 6 Wireless LAN
Figure 20 Wireless LAN: 802.1x/WPA
The following table describes the labels in this screen.
6.7.1 Authentication Required: 802.1x
You need the following for IEEE 802.1x authentication.
• A computer with an IEEE 802.11 b/g wireless LAN adapter and equipped with a web
browser (with JavaScript enabled) and/or Telnet.
• A wireless station computer must be running IEEE 802.1x-compliant software. Not all
Windows operating systems support IEEE 802.1x (see the Microsoft web site for details).
For other operating systems, see their documentation. If your operating system does not
support IEEE 802.1x, then you may need to install IEEE 802.1x client software.
For other operating systems, see their documentation. If your operating system does not
support IEEE 802.1x, then you may need to install IEEE 802.1x client software.
• An optional network RADIUS server for remote user authentication and accounting.
Select Authentication Required in the Wireless Port Control field and 802.1x in the Key
Management Protocol field to display the next screen.
Management Protocol field to display the next screen.
Table 16 Wireless LAN: 802.1x/WPA
LABEL
DESCRIPTION
Wireless Port
Control
To control wireless stations access to the wired network, select a control method
from the drop-down list box. Choose from No Access Allowed, No
Authentication Required and Authentication Required.
No Access Allowed blocks all wireless stations access to the wired network.
No Authentication Required allows all wireless stations access to the wired
No Access Allowed blocks all wireless stations access to the wired network.
No Authentication Required allows all wireless stations access to the wired
network without entering usernames and passwords. This is the default setting.
Authentication Required means that all wireless stations have to enter
Authentication Required means that all wireless stations have to enter
usernames and passwords before access to the wired network is allowed.
Select Authentication Required to configure Key Management Protocol and
Select Authentication Required to configure Key Management Protocol and
other related fields.
Apply
Click Apply to save your changes back to the G-1000.
Reset
Click Reset to begin configuring this screen afresh.