Краткое Руководство По Установке для ZyXEL p-662h
Prestige 662H/HW Series Quick Start Guide
27
Table 4 Wireless LAN: MAC Address Filter
LABEL
DESCRIPTION
Active
Select Yes from the drop down list box to enable MAC address filtering.
Action
Define the filter action for the list of MAC addresses in the MAC Address
table.
table.
Select Deny Association to block access to the Prestige, MAC addresses
not listed will be allowed to access the Prestige
not listed will be allowed to access the Prestige
Select Allow Association to permit access to the Prestige, MAC addresses
not listed will be denied access to the Prestige.
not listed will be denied access to the Prestige.
MAC
Address
Address
Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless
station that are allowed or denied access to the Prestige.
station that are allowed or denied access to the Prestige.
6.3 802.1x and WPA Overview
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification
draft. Key differences between WPA and WEP are user authentication and improved
data encryption. WPA applies IEEE 802.1x and Extensible Authentication Protocol
(EAP) to authenticate wireless clients using an external RADIUS database. You can’t
use the Prestige’s local user database for WPA authentication purposes since the local
user database uses MD5 EAP which cannot be used to generate keys.
draft. Key differences between WPA and WEP are user authentication and improved
data encryption. WPA applies IEEE 802.1x and Extensible Authentication Protocol
(EAP) to authenticate wireless clients using an external RADIUS database. You can’t
use the Prestige’s local user database for WPA authentication purposes since the local
user database uses MD5 EAP which cannot be used to generate keys.
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP),
Message Integrity Check (MIC) and IEEE 802.1x. Temporal Key Integrity Protocol
(TKIP) uses 128-bit keys that are dynamically generated and distributed by the
authentication server. It includes a per-packet key mixing function, a Message Integrity
Check (MIC) named Michael, an extended initialization vector (IV) with sequencing
rules, and a re-keying mechanism.
Message Integrity Check (MIC) and IEEE 802.1x. Temporal Key Integrity Protocol
(TKIP) uses 128-bit keys that are dynamically generated and distributed by the
authentication server. It includes a per-packet key mixing function, a Message Integrity
Check (MIC) named Michael, an extended initialization vector (IV) with sequencing
rules, and a re-keying mechanism.
To change your Prestige’s authentication settings, click the Wireless LAN link under
Advanced Setup and then the 802.1x/WPA tab.
Advanced Setup and then the 802.1x/WPA tab.
The screen varies by the wireless
port control and key management protocol
you select
.
6.4 Network Address Translation Overview
NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP
address of a host in a packet. For example, the source address of an outgoing packet,
used within one network is changed to a different IP address known within another
network.
address of a host in a packet. For example, the source address of an outgoing packet,
used within one network is changed to a different IP address known within another
network.