Краткое Руководство По Установке для ZyXEL p-662h

Скачать
Страница из 39
Prestige 662H/HW Series Quick Start Guide 
27
 
Table 4 Wireless LAN: MAC Address Filter 
LABEL
 
DESCRIPTION
 
Active
 
Select Yes from the drop down list box to enable MAC address filtering. 
 
Action  
Define the filter action for the list of MAC addresses in the MAC Address 
table.  
Select Deny Association to block access to the Prestige, MAC addresses 
not listed will be allowed to access the Prestige  
Select Allow Association to permit access to the Prestige, MAC addresses 
not listed will be denied access to the Prestige.  
MAC 
Address
 
Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless 
station that are allowed or denied access to the Prestige.
 
6.3 802.1x and WPA Overview 
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification 
draft. Key differences between WPA and WEP are user authentication and improved 
data encryption. WPA applies IEEE 802.1x and Extensible Authentication Protocol 
(EAP) to authenticate wireless clients using an external RADIUS database. You can’t 
use the Prestige’s local user database for WPA authentication purposes since the local 
user database uses MD5 EAP which cannot be used to generate keys.  
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), 
Message Integrity Check (MIC) and IEEE 802.1x. Temporal Key Integrity Protocol 
(TKIP) uses 128-bit keys that are dynamically generated and distributed by the 
authentication server. It includes a per-packet key mixing function, a Message Integrity 
Check (MIC) named Michael, an extended initialization vector (IV) with sequencing 
rules, and a re-keying mechanism. 
To change your Prestige’s authentication settings, click the Wireless LAN link under 
Advanced Setup 
and then the 802.1x/WPA tab. 
The screen varies by the wireless 
port control and key management protocol 
you select
6.4 Network Address Translation Overview 
NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP 
address of a host in a packet. For example, the source address of an outgoing packet, 
used within one network is changed to a different IP address known within another 
network.