Wireless Lan Security; User Authentication And Encryption; Certificates - ZyXEL Communications ZyXEL ZyAIR G-470 User Manual

802.11g wireless ethernet adapter
Hide thumbs Also See for ZyXEL ZyAIR G-470:
Table of Contents

Advertisement

G-470 User's Guide
• Every device in the same wireless network must use security compatible with the AP or
peer computer.
Security stops unauthorized devices from using the wireless network. It can also protect
the information that is sent in the wireless network.

3.2 Wireless LAN Security

Wireless LAN security is vital to your network to protect wireless communications.
If you do not enable any wireless security on your ZyXEL Device, the ZyXEL Device's
wireless communications are accessible to any wireless networking device that is in the
coverage area. See
security for your device.

3.2.1 User Authentication and Encryption

User authentication is when every user must log in to the wireless network before they can use
it. However, every wireless client in the wireless network has to support IEEE 802.1x to do
this.
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.

3.2.1.1 Certificates

Your ZyXEL Device can use certificates (also called digital IDs) for user authentication.
Certificates are based on public-private key pairs. A certificate contains the certificate owner's
identity and public key. Certificates provide a way to exchange public keys for use in
authentication.
A Certification Authority (CA) issues certificates and guarantees the identity of each
certificate owner. There are commercial certification authorities like CyberTrust or VeriSign
and government certification authorities.
In public-key encryption and decryption, each host has two keys. One key is public and can be
made openly available; the other key is private and must be kept secure. Public-key encryption
in general works as follows.
1 Tim wants to send a private message to Jenny. Tim generates a public key pair. What is
encrypted with one key can only be decrypted using the other.
2 Tim keeps the private key and makes the public key openly available.
3 Tim uses his private key to encrypt the message and sends it to Jenny.
4 Jenny receives the message and uses Tim's public key to decrypt it.
32
Section 6.4 on page 61
for more information on configuring wireless
Chapter 3 Wireless LAN Network

Advertisement

Table of Contents
loading

Table of Contents