Hide Zyair Identity; Wep Encryption; Configuring Wep Encryption; Overview - ZyXEL Communications G-3000H User Manual

802.11g wireless access point
Hide thumbs Also See for G-3000H:
Table of Contents

Advertisement

G-3000H User's Guide

6.1.4 Hide ZyAIR Identity

If you hide the ESSID, then the ZyAIR cannot be seen when a wireless client scans for local
APs. The trade-off for the extra security of "hiding" the ZyAIR may be inconvenience for
some valid WLAN clients.

6.1.5 WEP Encryption

WEP encryption scrambles the data transmitted between the wireless stations and the access
points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key.
Your ZyAIR allows you to configure up to four 64-bit or 128-bit WEP keys but only one key
can be enabled at any one time.

6.2 Configuring WEP Encryption

In order to configure and enable WEP encryption; click the WIRELESS link under
ADVANCED to display the Wireless screen.
Note: The WEP Encryption, Authentication Method and the WEP key fields are not
visible when you enable Dynamic WEP Key, WPA or WPA-PSK in the Security
screen.
6.3 802.1x Overview
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management. Authentication can be done using the local
user database internal to the ZyAIR (authenticate up to 32 users) or an external RADIUS
server for an unlimited number of users.

6.4 EAP Authentication Overview

EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE802.1x transport mechanism in order to support multiple types of user authentication. By
using EAP to interact with an EAP-compatible RADIUS server, the access point helps a
wireless station and a RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server or the AP. The ZyAIR
supports EAP-TLS, EAP-TTLS, EAP-MD5 and PEAP with RADIUS. Refer to the Types of
EAP Authentication appendix for descriptions on the common types.
68
Chapter 6 Wireless Security Configuration

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents