ZyXEL Access Point G1000 v2 91-005-124001B 사용자 설명서
제품 코드
91-005-124001B
ZyXEL G-1000 v2 User’s Guide
Chapter 1 Getting to Know Your Device
29
Note: The G-1000 v2 may be prone to RF (Radio Frequency) interference from other
2.4 GHz devices such as microwave ovens, wireless phones, Bluetooth
enabled devices, and other wireless LANs.
enabled devices, and other wireless LANs.
STP (Spanning Tree Protocol) / RSTP (Rapid STP)
(R)STP detects and breaks network loops and provides backup links between switches,
bridges or routers. It allows a bridge to interact with other (R)STP -compliant bridges in your
network to ensure that only one path exists between any two stations on the network.
bridges or routers. It allows a bridge to interact with other (R)STP -compliant bridges in your
network to ensure that only one path exists between any two stations on the network.
Limit the number of Client Connections
You may set a maximum number of wireless stations that may connect to the G-1000 v2. This
may be necessary if for example, there is interference or difficulty with channel assignment
due to a high density of APs within a coverage area.
may be necessary if for example, there is interference or difficulty with channel assignment
due to a high density of APs within a coverage area.
SSL Passthrough
SSL (Secure Sockets Layer) uses a public key to encrypt data that's transmitted over an SSL
connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites
use the protocol to obtain confidential user information, such as credit card numbers. By
convention, URLs that require an SSL connection start with “https” instead of “http”. The G-
1000 v2 allows SSL connections to take place through the G-1000 v2.
connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites
use the protocol to obtain confidential user information, such as credit card numbers. By
convention, URLs that require an SSL connection start with “https” instead of “http”. The G-
1000 v2 allows SSL connections to take place through the G-1000 v2.
Brute-Force Password Guessing Protection
The G-1000 v2 has a special protection mechanism to discourage brute-force password
guessing attacks on the G-1000 v2's management interfaces. You can specify a wait-time that
must expire before entering a fourth password after three incorrect passwords have been
entered. Please see the appendix for details about this feature.
guessing attacks on the G-1000 v2's management interfaces. You can specify a wait-time that
must expire before entering a fourth password after three incorrect passwords have been
entered. Please see the appendix for details about this feature.
Wireless LAN MAC Address Filtering
Your G-1000 v2 checks the MAC address of the wireless station against a list of allowed or
denied MAC addresses.
denied MAC addresses.
WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless
network to help keep network communications private.
network to help keep network communications private.
IEEE 802.1X Network Security
The G-1000 v2 supports the IEEE 802.1x standard to enhance user authentication. Use the
built-in user profile database to authenticate up to 32 users using MD5 encryption. Use an
EAP-compatible RADIUS (RFC2138, 2139 - Remote Authentication Dial In User Service)
server to authenticate a limitless number of users using EAP (Extensible Authentication
Protocol). EAP is an authentication protocol that supports multiple types of authentication.
built-in user profile database to authenticate up to 32 users using MD5 encryption. Use an
EAP-compatible RADIUS (RFC2138, 2139 - Remote Authentication Dial In User Service)
server to authenticate a limitless number of users using EAP (Extensible Authentication
Protocol). EAP is an authentication protocol that supports multiple types of authentication.