1. Home
  2. /
  3. Manuals
  4. /
  5. Zoom
  6. /
  7. 4402
  8. /
  9. 18
Page 86 / 108 Scroll up to view Page 81 - 85
Table 29. WMM Menu Option
Option
Description
WMM Support
Select On to include the WME Information Element in beacon frame.
No-Acknowledgement
Select On to not transmit acknowledgments for data.
Power Save Support
Select On to allow the AP (cable modem/router) queuing packets for
stations/clients in power-save mode. Queued packets are transmitted
when the station/client notifies AP that it has left power-save mode.
EDCA AP Parameters
Enter the transmit parameters for traffic transmitted from the AP to
the STA (station) for the four Access Categories (AC): Best Effort
(AC_BE), Background (AC_BK), Video (AC_VI) and Voice (AC_VO).
Transmit parameters include Contention Window (CWmin and
CWmax), Arbitration Inter Frame Spacing Number (AIFSN), and
Transmit Opportunity Limit (TXOP Limit).
There are also two AP-specific settings:
y
Admission Control: Specify if admission control is enforced for
the Access Categories.
y
Discard Oldest First. Specify the discard policy for the queues.
On
discards the oldest first and
Off
discards the newest first.
EDCA STA Parameters
Specifies the transmit parameters for traffic transmitted from the STA
(station) to the AP for the four Access Categories (AC): Best Effort
(AC_BE), Background (AC_BK), Video (AC_VI), and Voice (AC_VO).
Transmit parameters include Contention Window (CWmin and
CWmax), Arbitration Inter Frame Spacing Number (AIFSN) and
Transmit Opportunity Limit (TXOP Limit).
Bridging
The Bridging page allows you to configure WDS (Wireless Distribution System) feature.
Only those bridges listed in the Remote Bridges table will be granted access. APs must operate in
the same channel to be bridged together.
To access the
Bridging
page:
1
Click
Wireless
in the menu bar.
2
Then click the
Bridging
submenu.
Figure 40 shows an example of the menu and Table 30 describes the items you can select.
86
Page 87 / 108
Figure 40. Example of Bridging Page
Table 30. Bridging Menu Option
Option
Description
Wireless Bridging
Select to enable or disable wireless bridging.
Remote Bridges
Table of remote bridge MAC addresses authorized to establish a wireless
bridge. Up to 4 remote bridges may be connected. Typically, you will also
have to enter your AP’s MAC address on the remote bridge.
87
Page 88 / 108
9
VPN (Virtual Private Network) Menu Options
The VPN Menu lets you:
¾
Configure a VPN tunnel
¾
View VPN event logs
Basic Setting
This page allows you to enable VPN protocols and manage VPN tunnels. A virtual private network
(VPN) is a computer network in which some of the links between nodes are carried by open
connections or virtual circuits within some larger network (e.g., the Internet) as opposed to by
physical wires, as in a traditional private network. A VPN can be used to separate the traffic of
different user communities over an underlying network with strong security features.
To access the
Basic
page:
1
Click
VPN
in the menu bar.
2
Then click the
Basic
submenu.
Figure 41 shows an example of the menu and Table 31 describes the items you can select.
Figure 41. Example of Basic Page
88
Page 89 / 108
Table 31. Basic Menu Option
Option
Description
L2TP Server
Select Enable to enable L2TP (Layer 2 Tunneling Protocol) server.
PPTP Server
Select Enable to enable PPTP (Point-to-Point Tunneling Protocol) server.
IPSec Endpoint
Select Enable to enable IPSec endpoint.
IPSec
The IPSec page allows you to configure IPSec tunnel and endpoint settings. A VPN tunnel is usually
established in two phases. Each phase establishes a security association (SA), a contract indicating
what security parameters cable modem/router and the remote IPSec cable modem/router will use.
The
first phase
establishes an Internet Key Exchange (IKE) SA between the cable
modem/router and the remote IPSec cable modem/router.
The
second phase
uses the IKE SA to securely establish an IPSec SA through which the
cable modem/router and remote IPSec cable modem/router can send data between
computers on the local network and remote network.
Before IPSec VPN configuration, try to familiarize yourself with terms like IPSec Algorithms,
Authentication Header and ESP protocol.
IPSec Algorithms
The ESP and AH protocols are necessary to create a Security Association (SA), the foundation of an
IPSec VPN. An SA is built from the authentication provided by the AH and ESP protocols. The
primary function of key management is to establish and maintain the SA between systems. Once the
SA is established, the transport of data may commence.
AH (Authentication Header) Protocol
The AH protocol (RFC 2402) was designed for integrity, authentication, sequence integrity (replay
resistance), and non-repudiation but not for confidentiality, for which the ESP was designed.
In applications where confidentiality is not required or not sanctioned by government encryption
restrictions, an AH can be employed to ensure integrity. This type of implementation does not
protect the information from dissemination but will allow for verification of the integrity of the
information and authentication of the originator.
ESP (Encapsulating Security Payload) Protocol
The ESP protocol (RFC 2406) provides encryption as well as the services offered by AH. ESP
authenticating properties are limited compared to the AH due to the non-inclusion of the IP header
information during the authentication process. However, ESP is sufficient if only the upper layer
protocols need to be authenticated. An added feature of the ESP is payload padding, which further
protects communications by concealing the size of the packet being transmitted.
89
Page 90 / 108
To access the
IPSec
page:
1
Click
VPN
in the menu bar.
2
Then click the
IPSec
submenu.
Figure 42 shows an example of the menu and Table 32 describes the items you can select.
Figure 42. Example of IPSec Page
90

Rate

4 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top