Chapter 6 Wireless Lan; Introduction; Wireless Security Overview; Encryption - ZyXEL Communications ZyXEL ZyAIR G-1000 User Manual

802.11g wireless access point
Hide thumbs Also See for ZyXEL ZyAIR G-1000:
Table of Contents

Advertisement

G-1000 User's Guide
This chapter discusses how to configure Wireless LAN.

6.1 Introduction

A wireless LAN (WLAN) can be as simple as two computers with WLAN adapters
communicating in a peer-to-peer network or as complex as a number of computers with
WLAN adapters communicating through access points which bridge network traffic to the
wired LAN.
Note: See the WLAN appendix for more detailed information on WLANs.

6.2 Wireless Security Overview

Wireless security is vital to your network to protect wireless communication between wireless
stations, access points and the wired network.
Wireless security methods available on the G-1000 are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the G-1000 identity.

6.2.1 Encryption

• Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server.
WPA(2) has user authentication and improved data encryption over WEP.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• If you don't have WPA(2)-aware wireless clients, then use WEP key encrypting. A
higher bit key offers better security at a throughput trade-off. You can enter 64-bit or 128-
bit WEP keys.

6.2.2 Authentication

WPA has user authentication and you can also configure IEEE 802.1x to use the built-in
database (Local User Database) or a RADIUS server to authenticate wireless clients before
joining your network.
• Use RADIUS authentication if you have a RADIUS server. See the appendices for
information on protocols used when a client authenticates with a RADIUS server via the
G-1000.
50
C
H A P T E R
Wireless LAN

Chapter 6 Wireless LAN

6

Advertisement

Table of Contents
loading

Table of Contents