ZyXEL Prestige 660HW-61 External 91-004-370001 Manual Do Utilizador

Códigos do produto
91-004-370001
Página de 450
Prestige 660H/HW Series User’s Guide
87 
Chapter 7 Wireless LAN Setup
The following table describes the fields in this menu.
Table 17   MAC Address Filter 
LABEL
DESCRIPTION
Active
Select Yes from the drop down list box to enable MAC address filtering. 
Action 
Define the filter action for the list of MAC addresses in the MAC Address table. 
Select Deny Association to block access to the router, MAC addresses not listed will 
be allowed to access the Prestige. Select Allow Association to permit access to the 
router, MAC addresses not listed will be denied access to the Prestige. 
MAC Address  Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal 
character pairs, for example, 12:34:56:78:9a:bc of the wireless stations that are 
allowed or denied access to the Prestige in these address fields.
Back 
Click Back to go to the main wireless LAN setup screen.
Apply
Click Apply to save your changes back to the Prestige. 
Cancel
Click Cancel to begin configuring this screen afresh.
7.6  Network Authentication 
You can set the Prestige and your network to authenticate a wireless station before the wireless 
station can communicate with the Prestige and the wired network to which the Prestige is 
connected. 
7.6.1  EAP 
EAP is an authentication protocol designed originally to run over PPP (Point-to-Point 
Protocol) frame in order to support multiple types of user authentication. By using EAP to 
interact with an EAP-compatible RADIUS server, the access point helps a wireless station and 
a RADIUS server to perform mutual authentication. 
7.6.1.1  RADIUS
RADIUS is based on a client-sever model that supports authentication, authorization and 
accounting. The access point is the client and the server is the RADIUS server. The RADIUS 
server handles the following tasks:
• Authentication 
Determines the identity of the users.
• Authorization
Determines the network services available to authenticated users once they are connected 
to the network.
• Accounting
Keeps track of the client’s network activity.