Encryption; Authentication; Restricted Access; Table 15 Wireless Security Levels - ZyXEL Communications ZyXEL ZyAIR G-570S User Manual

802.11g wireless access point
Hide thumbs Also See for ZyXEL ZyAIR G-570S:
Table of Contents

Advertisement

ZyXEL G-570S User's Guide
The figure below shows the possible wireless security levels on your G-570S. EAP
(Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key
exchange. It requires interaction with a RADIUS (Remote Authentication Dial-In User
Service) server either on the WAN or your LAN to provide authentication service for wireless
stations.

Table 15 Wireless Security Levels

SECURITY LEVEL
Least Secure
Most Secure
If you do not enable any wireless security on your G-570S, your network is accessible to any
wireless networking device that is within range.

6.4.1 Encryption

• Use WPA(2) security if you have WP(2)A-aware wireless clients and a RADIUS server.
WPA(2) has user authentication and improved data encryption over WEP.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• If you don't have WPA(2)-aware wireless clients, then use WEP key encrypting. A
higher bit key offers better security at a throughput trade-off. You can use the passphrase
feature to automatically generate WEP keys or manually enter WEP keys.

6.4.2 Authentication

Use a RADIUS server with WPA or IEEE 802.1x key management protocol.
See the appendix for information on protocols used when a client authenticates with a
RADIUS server via the G-570S.

6.4.3 Restricted Access

The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).
74
SECURITY TYPE
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
WPA2
Chapter 6 Wireless Screens

Advertisement

Table of Contents
loading

Table of Contents