Security Parameters Summary - ZyXEL Communications NBG-4600N User Manual

Wireless n gigabit router
Table of Contents

Advertisement

Appendix D Wireless LANs

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for
each Authentication Method/ key management protocol type. MAC address filters
are not dependent on how you configure these security features.
Table 135 Wireless Security Relational Matrix
AUTHENTICATION
METHOD/ KEY
MANAGEMENT
PROTOCOL
Open
Open
Shared
WPA
WPA-PSK
WPA2
WPA2-PSK
368
ENCRYPTIO
ENTER
N METHOD
MANUAL KEY
None
No
WEP
No
Yes
Yes
WEP
No
Yes
Yes
TKIP
No
TKIP
Yes
AES
No
AES
Yes
IEEE 802.1X
Disable
Enable without Dynamic WEP
Key
Enable with Dynamic WEP
Key
Enable without Dynamic WEP
Key
Disable
Enable with Dynamic WEP
Key
Enable without Dynamic WEP
Key
Disable
Enable
Enable
Enable
Enable
NBG-460N User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nbg-460n

Table of Contents