ZyXEL Communications ZYAIR G-4100 User Manual page 157

802.11g wireless hotspot gateway
Hide thumbs Also See for ZYAIR G-4100:
Table of Contents

Advertisement

LABEL
Authentication
Select Open System to allow any device to authenticate and then attempt to communicate
Method
with the ZyAIR. Using open authentication, any wireless device can authenticate with the
ZyAIR, but the device can only communicate if its WEP keys match the ZyAIR. Devices not
using WEP do not attempt to authenticate with a ZyAIR that is using WEP. Open
authentication does not rely on a RADIUS server on your network.
Select Shared Key to have the ZyAIR use shared key authentication. The ZyAIR sends an
unencrypted challenge text string to any device attempting to communicate with the ZyAIR.
The device-requesting authentication encrypts the challenge text and sends it back to the
ZyAIR. If the challenge text is encrypted correctly, the ZyAIR allows the requesting device to
authenticate. However, both the unencrypted challenge and the encrypted challenge can be
monitored; thus leaving the ZyAIR open to attack from an intruder who calculates the WEP
key by comparing the unencrypted and encrypted text strings. Because of this weakness,
shared key authentication can be less secure than open authentication. Like open
authentication, shared key authentication does not rely on a RADIUS server on your network.
Select Both to allow subscribers to communicate with or without data encryption.
Default
Click this button to load the factory default wireless LAN settings.
Apply
Click Apply to save the settings.
Wireless LAN
Table 21-4 WIRELESS
DESCRIPTION
ZyAIR G-4100 User's Guide
21-9

Advertisement

Table of Contents
loading

Table of Contents