ZyXEL Access Point G1000 v2 91-005-124001B 사용자 설명서

제품 코드
91-005-124001B
다운로드
페이지 198
ZyXEL G-1000 v2 User’s Guide
Chapter 1 Getting to Know Your Device
29
Note: The G-1000 v2 may be prone to RF (Radio Frequency) interference from other 
2.4 GHz devices such as microwave ovens, wireless phones, Bluetooth 
enabled devices, and other wireless LANs.
STP (Spanning Tree Protocol) / RSTP (Rapid STP)
(R)STP detects and breaks network loops and provides backup links between switches, 
bridges or routers. It allows a bridge to interact with other (R)STP -compliant bridges in your 
network to ensure that only one path exists between any two stations on the network.
Limit the number of Client Connections
You may set a maximum number of wireless stations that may connect to the G-1000 v2. This 
may be necessary if for example, there is interference or difficulty with channel assignment 
due to a high density of APs within a coverage area. 
SSL Passthrough
SSL (Secure Sockets Layer) uses a public key to encrypt data that's transmitted over an SSL 
connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites 
use the protocol to obtain confidential user information, such as credit card numbers. By 
convention, URLs that require an SSL connection start with “https” instead of “http”. The G-
1000 v2 allows SSL connections to take place through the G-1000 v2.
Brute-Force Password Guessing Protection 
The G-1000 v2 has a special protection mechanism to discourage brute-force password 
guessing attacks on the G-1000 v2's management interfaces. You can specify a wait-time that 
must expire before entering a fourth password after three incorrect passwords have been 
entered. Please see the appendix for details about this feature.
Wireless LAN MAC Address Filtering
Your G-1000 v2 checks the MAC address of the wireless station against a list of allowed or 
denied MAC addresses.
WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless 
network to help keep network communications private.
IEEE 802.1X Network Security
The G-1000 v2 supports the IEEE 802.1x standard to enhance user authentication. Use the 
built-in user profile database to authenticate up to 32 users using MD5 encryption. Use an 
EAP-compatible RADIUS (RFC2138, 2139 - Remote Authentication Dial In User Service) 
server to authenticate a limitless number of users using EAP (Extensible Authentication 
Protocol). EAP is an authentication protocol that supports multiple types of authentication.