Encryption; Authentication; Figure 76 Zywall Wireless Security Levels - ZyXEL Communications 35 Series User Manual

Internet security appliance
Table of Contents

Advertisement

ZyWALL 5/35/70 Series User's Guide

Figure 76 ZyWALL Wireless Security Levels

If you do not enable any wireless security on your ZyWALL, your network is accessible to any
wireless networking device that is within range.
Use the ZyWALL web configurator to set up your wireless LAN security settings. Refer to the
chapter on using the ZyWALL web configurator to see how to access the web configurator.

9.6.1 Encryption

• Use WPA security if you have WPA-aware wireless clients and a RADIUS server. WPA
has user authentication and improved data encryption over WEP.
• Use WPA-PSK if you have WPA-aware wireless clients but no RADIUS server.
• If you don't have WPA-aware wireless clients, then use WEP key encrypting. A higher
bit key offers better security at a throughput trade-off. You can use Passphrase to
automatically generate 64-bit or 128-bit WEP keys or manually enter 64-bit, 128-bit or
256-bit WEP keys.

9.6.2 Authentication

Use a RADIUS server with WPA or IEEE 802.1x key management protocol. You can also
configure IEEE 802.1x to use the built-in database (Local User Database) to authenticate
wireless clients before joining your network.
• Use RADIUS authentication if you have a RADIUS server. See the appendices for
information on protocols used when a client authenticates with a RADIUS server via the
ZyWALL.
• Use the Local User Database if you have less than 32 wireless clients in your network.
The ZyWALL uses MD5 encryption when a client authenticates with the Local User
Database
183
Chapter 9 Wireless LAN

Advertisement

Table of Contents
loading

Table of Contents