Wireless Security Configuration; Wireless Security Overview; Encryption; Restricted Access - ZyXEL Communications NWA-3100 User Manual

802.11a/b/g wireless access point
Hide thumbs Also See for NWA-3100:
Table of Contents

Advertisement

C
H A P T E R

Wireless Security Configuration

This chapter describes how to use the Security and RADIUS screens to configure wireless
security on your ZyXEL Device.

6.1 Wireless Security Overview

Wireless security is vital to your network to protect wireless communication between wireless
stations, access points and the wired network.
Wireless security methods available on the ZyXEL Device are data encryption, wireless client
authentication, restricting access by MAC address and hiding the ZyXEL Device's identity.

6.1.1 Encryption

• Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server.
WPA has user authentication and improved data encryption over WEP.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• If you don't have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher
bit key offers better security at a throughput trade-off. You can manually enter 64-bit, 128-
bit or 152-bit WEP keys.

6.1.2 Restricted Access

The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).

6.1.3 Hide Identity

If you hide the SSID, then the ZyXEL Device cannot be seen when a wireless client scans for
local APs. The trade-off for the extra security of "hiding" the ZyXEL Device may be
inconvenience for some valid WLAN clients.

6.1.4 WEP Encryption

WEP encryption scrambles the data transmitted between the wireless stations and the access
points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key.
ZyXEL NWA-3100 User's Guide
6
81

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents