1. Home
  2. /
  3. Manuals
  4. /
  5. Zoom
  6. /
  7. 5352
  8. /
  9. 20
Page 96 / 115 Scroll up to view Page 91 - 95
96
Figure 32. Example of WMM Page
Page 97 / 115
97
Table 28. WMM Menu Option
Option
Description
WMM Support
Select On to include the WME Information Element in beacon
frame.
No-Acknowledgement
Select On to not transmit acknowledgments for data.
Power Save Support
Select On to allow the AP (Cable Modem/Router) queuing
packets for stations/clients in power-save mode. Queued
packets are transmitted when the station/client notifies AP that
it has left power-save mode.
EDCA AP Parameters
Enter the transmit parameters for traffic transmitted from the
AP to the STA (station) for the four Access Categories (AC):
Best Effort (AC_BE), Background (AC_BK), Video (AC_VI)
and Voice (AC_VO). Transmit parameters include Contention
Window (CWmin and CWmax), Arbitration Inter Frame
Spacing Number (AIFSN), and Transmit Opportunity Limit
(TXOP Limit).
There are also two AP-specific settings:
Admission Control: Specify if admission control is
enforced for the Access Categories.
Discard Oldest First. Specify the discard policy for the
queues.
On
discards the oldest first and
Off
discards the
newest first.
EDCA STA
Parameters
Specifies the transmit parameters for traffic transmitted from
the STA (station) to the AP for the four Access Categories
(AC): Best Effort (AC_BE), Background (AC_BK), Video
(AC_VI), and Voice (AC_VO). Transmit parameters include
Contention Window (CWmin and CWmax), Arbitration Inter
Frame Spacing Number (AIFSN) and Transmit Opportunity
Limit (TXOP Limit).
Bridging
The Bridging page allows you to configure WDS (Wireless Distribution System) feature.
Only those bridges listed in the Remote Bridges table will be granted access. APs must
operate in the same channel to be bridged together.
To access the
Bridging
page:
1
Click
Wireless
in the menu bar.
2
Then click the
Bridging
submenu.
Figure 33 shows an example of the menu and Table 29 describes the items you can
Page 98 / 115
98
select.
Figure 33. Example of Bridging Page
Table 29. Bridging Menu Option
Option
Description
Wireless
Bridging
Select to enable or disable wireless bridging.
Remote Bridges
Table of remote bridge MAC addresses authorized to establish a
wireless bridge. Up to 4 remote bridges may be connected.
Typically, you will also have to enter your AP’s MAC address on the
remote bridge. The Cable Modem/Router’s wireless MAC address
can be found on the Wireless Interfaces page.
Page 99 / 115
99
13
VPN (Virtual Private Network) Menu Options
The VPN Menu lets you:
Configure a VPN tunnel
View VPN event logs
Basic Setting
This page allows you to enable VPN protocols and manage VPN tunnels. A virtual
private network (VPN) is a computer network in which some of the links between nodes
are carried by open connections or virtual circuits within some larger network (e.g., the
Internet) as opposed to by physical wires, as in a traditional private network. A VPN can
be used to separate the traffic of different user communities over an underlying network
with strong security features.
To access the
Basic
page:
1
Click
VPN
in the menu bar.
2
Then click the
Basic
submenu.
Figure 34 shows an example of the menu and Table 30 describes the items you can
select.
Page 100 / 115
100
Figure 34. Example of Basic Page
Table 30. Basic Menu Option
Option
Description
L2TP Server
Select Enable to enable L2TP (Layer 2 Tunneling Protocol) server.
PPTP Server
Select Enable to enable PPTP (Point-to-Point Tunneling Protocol)
server.
Configure
Select
Configure
to set up L2TP or PPTP.
IPSec Endpoint
Select Enable to enable IPSec endpoint.
IPSec
The IPSec page allows you to configure IPSec tunnel and endpoint settings. A VPN
tunnel is usually established in two phases. Each phase establishes a security
association (SA), a contract indicating what security parameters Cable Modem/Router
and the remote IPSec Cable Modem/Router will use.
The
first phase
establishes an Internet Key Exchange (IKE) SA between the
Cable Modem/Router and the remote IPSec Cable Modem/Router.
The
second phase
uses the IKE SA to securely establish an IPSec SA through
which the Cable Modem/Router and remote IPSec Cable Modem/Router can
send data between computers on the local network and remote network.
Before IPSec VPN configuration, try to familiarize yourself with terms like IPSec
Algorithms, Authentication Header and ESP protocol.
IPSec Algorithms

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top