Справочник ПользователяСодержаниеUser’s Guide1Copyright3Interference Statements and Certifications4Safety Warnings6ZyXEL Limited Warranty7Customer Support8Table of Contents11List of Figures17List of Tables21Preface25Getting to Know Your Device271.1 Introducing the ZyXEL G-1000 v2271.2 Features271.2.1 Physical Features271.2.2 Firmware Features281.3 Applications for the G-1000 v2301.3.1 Internet Access Application311.3.2 Corporation Network Application311.4 Front Panel of the G-100031Introducing the Web Configurator332.1 Web Configurator Overview332.2 Accessing the G-1000 v2 Web Configurator332.3 Resetting the G-1000 v2342.3.1 .Procedure To Use The Reset Button342.4 Navigating the Web Configurator352.4.1 Navigation Panel352.4.3 Status: Packet Statistics382.4.4 Status: WLAN Association List39Wizard Setup413.1 Wizard Setup Overview413.2 General Setup413.3 Wizard Setup Wireless LAN423.3.1 Name (SSID), Channel ID and Security423.3.2 Configuring WEP or WPA(2) PSK Security433.3.3 IP Address Assignment463.3.4 Apply Settings47Wireless LAN494.1 Wireless Network Overview494.2 Wireless Security Overview504.2.1 SSID504.2.2 MAC Address Filter504.2.3 User Authentication504.2.4 Encryption514.3 Additional Wireless Terms524.4.1 No Security544.4.2 WEP Encryption554.4.3 WEP Encryption Screen554.4.4 WPA(2)-PSK564.4.5 WPA(2) Authentication Screen58IP and DNS Screens635.1 Configuring IP635.2 Configuring DNS64Remote Management Configuration676.1.1 Remote Management Limitations676.1.2 System Timeout686.3 Telnet696.6 SNMP716.6.1 Supported MIBs726.6.2 SNMP Traps73System757.1 General Setup757.1.1 General Setup and System Name75Logs818.1.1 Alerts and Logs818.4 SMTP Error Messages84Tools879.2.1 Backup Configuration899.2.2 Restore Configuration899.2.3 Back to Factory Defaults90Introducing the SMT9310.1 Connect to your G-1000 v2 Using Telnet9310.2 Changing the System Password9310.3 G-1000 v2 SMT Menus Overview9410.4 Navigating the SMT Interface95General Setup97LAN Setup9912.1 LAN Setup9912.2 TCP/IP Ethernet Setup9912.3 Wireless LAN Setup10012.3.1 Configuring MAC Address Filter10212.3.2 Configuring Roaming103SNMP Configuration105System Security10714.1 System Password10714.2 Configuring External RADIUS Server10714.3 802.1x109System Information and Diagnosis11315.1 System Status11315.2 System Information11515.2.1 System Information11515.2.2 Console Port Speed11615.3 Log and Trace11615.3.1 Syslog Logging11715.4 Diagnostic117Firmware and Configuration File Maintenance11916.1 Filename Conventions11916.2 Backup Configuration12016.2.1 Backup Configuration Using FTP12016.2.2 Using the FTP command from the DOS Prompt12116.2.3 Backup Configuration Using TFTP12216.2.4 Example: TFTP Command12316.2.5 Backup Via Console Port123System Maintenance and Information12517.1 Command Interpreter Mode12517.2 Time and Date Setting12617.3 Remote Management Setup12717.3.1 Telnet12717.3.2 FTP12717.3.3 Web12717.3.4 Remote Management Setup12817.3.5 Remote Management Limitations12917.4 Remote Management and NAT12917.5 System Timeout130Troubleshooting131Problems Starting Up the G-1000 v2131Problems with the Ethernet Interface131Problems with the Password132Problems with the WLAN Interface132Product Specifications133Brute-Force Password Guessing Protection135Example135Setting up Your Computer’s IP Address137Windows 95/98/Me137Installing Components138Configuring139Verifying Settings140Windows 2000/NT/XP140Verifying Settings144Macintosh OS 8/9144Verifying Settings146Macintosh OS X146Verifying Settings147IP Address Assignment Conflicts149Case A: The G-1000 v2 is using the same LAN and WAN IP addresses149Case B: The G-1000 v2 LAN IP address conflicts with the DHCP client IP address149Case C: The Subscriber IP address is the same as the IP address of a network device150Case D: Two or more subscribers have the same IP address.150IP Subnetting153IP Addressing153IP Classes153Subnet Masks154Subnetting154Example: Two Subnets155Example: Four Subnets157Example Eight Subnets158Subnetting With Class A and Class B Networks.159Command Interpreter161Command Syntax161Command Usage161Log Descriptions163Log Commands164Configuring What You Want the G-1000 v2 to Log165Displaying Logs165Log Command Example166Wireless LAN and IEEE 802.11167Benefits of a Wireless LAN167IBSS167BSS168ESS169Wireless LAN Basics170RTS/CTS170Fragmentation Threshold171IEEE 802.11172Wireless LAN Security173IEEE 802.11g Wireless LAN173IEEE 802.1x173RADIUS174Types of RADIUS Messages174Types of Authentication175EAP-MD5 (Message-Digest Algorithm 5)175EAP-TLS (Transport Layer Security)175EAP-TTLS (Tunneled Transport Layer Service)175PEAP (Protected EAP)176LEAP176Dynamic WEP Key Exchange176WEP Authentication176WPA(2)178Encryption178User Authentication179Wireless Client WPA Supplicants179WPA with RADIUS Application Example179Security Parameters Summary181RADIUS Server Authentication Sequence181Mutual Authentication with Internal RADIUS server.182Types of EAP Authentication185EAP-MD5 (Message-Digest Algorithm 5)185EAP-TLS (Transport Layer Security)185EAP-TTLS (Tunneled Transport Layer Service)185PEAP (Protected EAP)186LEAP186Antenna Selection and Positioning Recommendation187Antenna Characteristics187Frequency187Radiation Pattern187Antenna Gain187Types of Antennas For WLAN188Positioning Antennas188Connector Type188Index189Numerics189A189B189C190D190E191F191G192H192I192L192M193N193O193P194Q194R194S195T196U197V197W197Z198Размер: 5,9 МБСтраницы: 198Язык: EnglishПросмотреть