Security Faq; How Do I Secure The Data Across The P-661Hw-D Access Point's Radio Link; What Is Wep; What Is Wpa - ZyXEL Communications P-661HW-D Series Support Note

802.11g wireless adsl2+ 4-port security gateway
Hide thumbs Also See for P-661HW-D Series:
Table of Contents

Advertisement

P-661HW-D Series Support Notes
communicate with the AP. The ESSID is a 32-character maximum string and is
case-sensitive.

Security FAQ

1. How do I secure the data across the P-661HW-D Access Point's radio
link?
To secure the date across the P-661HW-D Access Point's radio link, we could
select any one of the security mode: Static 64/128/256 bit WEP, WPA-PSK,
WPA, WPA2-PSK, WPA2.

2. What is WEP?

Wired Equivalent Privacy. WEP is a security mechanism defined within the
802.11 standard and designed to make the security of the wireless medium
equal to that of a cable (wire). WEP data encryption was designed to prevent
access to the network by "intruders" and to prevent the capture of wireless
LAN traffic through eavesdropping. WEP allows the administrator to define a
set of respective "Keys" for each wireless network user based on a "Key
String" passed through the WEP encryption algorithm. Access is denied by
anyone who does not have an assigned key. Note, WEP has shown to have
fundamental flaws in its key generation processing.

3. What is WPA?

Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security
specification draft. Key differences between WAP and WEP are user
authentication and improved data encryption. WAP applies IEEE 802.1x
Extensible Authentication Protocol (EAP) to authenticate wireless clients using
an external RADIUS database. You can not use the P-661HW-D's local user
database for WPA authentication purpose since the local user database uses
MD5 EAP which can not to generate keys.
WPA improves data encryption by using Temporal Key Integrity Protocol
(TKIP), Message Integrity Check and IEEE 802.1x. Temporal Key Integrity
Protocol uses 128-bits keys that are dynamically generated and distributed by
the authentication server. It includes a per-packet key mixing function, a
Message Integrity Check (MIC) named Michael, an extend initialization vector
(IV) with sequencing rules and a re-keying mechanism.
If you do not have an external RADIUS server, you should use WPA-PSK
(WPA Pre-Share Key) that only requires a single (identical) password entered
into each access point, wireless gateway and wireless client. As long as the
passwords match, a client will be granted access to a WLAN. You can refer to
the User Guide for more information about it.
44
All contents copyright © 2006 ZyXEL Communications Corporation.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents