ZyXEL g-2000 plusv2 Mode D'Emploi
ZyXEL G-2000 Plus v2 User’s Guide
Table of Contents
13
6.2.1 SSID .........................................................................................................82
6.2.2 MAC Address Filter ...................................................................................82
6.2.3 User Authentication ..................................................................................82
6.2.4 Encryption .................................................................................................83
6.2.2 MAC Address Filter ...................................................................................82
6.2.3 User Authentication ..................................................................................82
6.2.4 Encryption .................................................................................................83
6.3 Additional Wireless Terms ..................................................................................84
6.4 Configuring Wireless .........................................................................................84
6.5 Wireless Security - No Security ..........................................................................86
6.6 Configuring WEP Encryption ..............................................................................87
6.7 Configuring WPA(2)-PSK Authentication ...........................................................89
6.8 Configuring WPA(2) Authentication ....................................................................91
6.9 Configuring RADIUS ..........................................................................................93
6.10 Configuring 802.1x ...........................................................................................95
6.11 MAC Filter ......................................................................................................97
6.12 Configuring Roaming .....................................................................................99
6.4 Configuring Wireless .........................................................................................84
6.5 Wireless Security - No Security ..........................................................................86
6.6 Configuring WEP Encryption ..............................................................................87
6.7 Configuring WPA(2)-PSK Authentication ...........................................................89
6.8 Configuring WPA(2) Authentication ....................................................................91
6.9 Configuring RADIUS ..........................................................................................93
6.10 Configuring 802.1x ...........................................................................................95
6.11 MAC Filter ......................................................................................................97
6.12 Configuring Roaming .....................................................................................99
7.2.2 PPPoE Encapsulation .............................................................................103
7.2.3 PPTP Encapsulation ...............................................................................105
7.2.3 PPTP Encapsulation ...............................................................................105
7.3 Configuring WAN IP ........................................................................................107
7.4 Configuring WAN MAC ....................................................................................110
7.4 Configuring WAN MAC ....................................................................................110
8.1.1 NAT Definitions .......................................................................................113
8.1.2 What NAT Does ......................................................................................114
8.1.3 How NAT Works .....................................................................................114
8.1.4 NAT Application ......................................................................................115
8.1.5 NAT Mapping Types ...............................................................................116
8.1.2 What NAT Does ......................................................................................114
8.1.3 How NAT Works .....................................................................................114
8.1.4 NAT Application ......................................................................................115
8.1.5 NAT Mapping Types ...............................................................................116