
ZyXEL M-102 User’s Guide
2.2.5 WPA-PSK/WPA2-PSK Application Example.....................................................................2-7
2.2.6 WPA/WPA2 with RADIUS Application Example..............................................................2-8
2.3 Fragmentation Threshold.............................................................................................................2-9
2.4 RTS/CTS Threshold......................................................................................................................2-9
2.5 Authentication Type ...................................................................................................................2-10
Chapter 3 Maintenance.............................................................................................................................3-1
3.1 The Version Screen ......................................................................................................................3-1
3.2 Uninstalling the ZyXEL Utility.....................................................................................................3-2
3.3 Upgrading the ZyXEL Utility.......................................................................................................3-3
Chapter 4 Configuring Wireless Security................................................................................................4-1
4.1 Configuring Security....................................................................................................................4-1
4.2 Configuring WEP.........................................................................................................................4-1
4.3 Configuring WPA-PSK/WPA2-PSK.............................................................................................4-3
4.4 Configuring WPA/WPA................................................................................................................4-4
4.5 Configuring 802.1x ......................................................................................................................4-4
4.5.1 Configuring 802.1x – EAP-LEAP........................................................................................4-4
4.5.2 Configuring 802.1x – EAP-PEAP........................................................................................4-5
4.5.3 Configuring 802.1x – EAP-TLS ..........................................................................................4-7
4.5.4 Configuring 802.1x – EAP-TTLS........................................................................................4-9
Chapter 5 Troubleshooting.......................................................................................................................5-1
5.1 Problems Starting the ZyXEL Utility Program............................................................................5-1
5.2 Problem with the Link Status .......................................................................................................5-1
5.3 Problems Communicating With Other Computers.......................................................................5-2
Appendix A Types of EAP Authentication..................................................................................................i
Table Of Contents vii
Komentarze do niniejszej Instrukcji