
P-2602HWNLI User’s Guide
Table of Contents 23
ADSL Overview...................................................................................................... 389
Advantages of ADSL.............................................................................................. 389
Appendix E
Virtual Circuit Topology ...................................................................................... 391
Appendix F
Wireless LANs ...................................................................................................... 393
Wireless LAN Topologies ....................................................................................... 393
Ad-hoc Wireless LAN Configuration ................................................................ 393
BSS.................................................................................................................. 393
ESS.................................................................................................................. 394
Channel.................................................................................................................. 395
RTS/CTS................................................................................................................ 395
Fragmentation Threshold ....................................................................................... 396
Preamble Type ....................................................................................................... 397
IEEE 802.11g Wireless LAN .................................................................................. 397
Wireless Security Overview ................................................................................... 398
IEEE 802.1x ........................................................................................................... 398
RADIUS.................................................................................................................. 399
Types of RADIUS Messages ........................................................................... 399
Types of Authentication.......................................................................................... 400
EAP-MD5 (Message-Digest Algorithm 5) ........................................................ 400
EAP-TLS (Transport Layer Security) ............................................................... 400
EAP-TTLS (Tunneled Transport Layer Service) .............................................. 400
PEAP (Protected EAP) .................................................................................... 401
LEAP................................................................................................................ 401
Dynamic WEP Key Exchange................................................................................ 401
WPA and WPA2 ..................................................................................................... 402
Encryption ....................................................................................................... 402
User Authentication ........................................................................................ 403
Wireless Client WPA Supplicants .................................................................... 403
WPA(2) with RADIUS Application Example..................................................... 403
27.5.1 WPA(2)-PSK Application Example .......................................................404
Security Parameters Summary .............................................................................. 405
Appendix G
Common Services............................................................................................... 407
Appendix H
Internal SPTGEN .................................................................................................. 411
Internal SPTGEN Overview ................................................................................... 411
The Configuration Text File Format........................................................................ 411
Komentarze do niniejszej Instrukcji