Authentication; Restricted Access; Hide Zywall Identity; Security Parameters Summary - ZyXEL Communications ZYWALL 35 User Manual

Internet security appliance
Hide thumbs Also See for ZYWALL 35:
Table of Contents

Advertisement

Chapter 10 WLAN
• If you don't have WPA-aware wireless clients, then use WEP key encrypting. A higher bit
key offers better security at a throughput trade-off. You can use Passphrase to
automatically generate 64-bit or 128-bit WEP keys or manually enter 64-bit, 128-bit or
256-bit WEP keys.

10.6.2 Authentication

Use a RADIUS server with WPA or IEEE 802.1x key management protocol. You can also
configure IEEE 802.1x to use the built-in database (Local User Database) to authenticate
wireless clients before joining your network.
• Use RADIUS authentication if you have a RADIUS server. See the appendices for
information on protocols used when a client authenticates with a RADIUS server via the
ZyWALL.
• Use the Local User Database if you have less than 32 wireless clients in your network. The
ZyWALL uses MD5 encryption when a client authenticates with the Local User Database

10.6.3 Restricted Access

The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).

10.6.4 Hide ZyWALL Identity

If you hide the ESSID, then the ZyWALL cannot be seen when a wireless client scans for local
APs. The trade-off for the extra security of "hiding" the ZyWALL may be inconvenience for
some valid WLAN clients.

10.7 Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each
authentication method/ key management protocol type. You enter manual keys when using
WEP encryption or WPA-PSK. MAC address filters are not dependent on how you configure
these security features.

Table 57 Wireless Security Relational Matrix

AUTHENTICATION
METHOD/ KEY
MANAGEMENT
PROTOCOL
Open
Open
Shared
222
ENTER
ENCRYPTION
MANUAL
METHOD
KEY
None
No
WEP
No
Yes
Yes
WEP
No
Yes
Yes
IEEE 802.1X
Disable
Enable without Dynamic WEP Key
Enable with Dynamic WEP Key
Enable without Dynamic WEP Key
Disable
Enable with Dynamic WEP Key
Enable without Dynamic WEP Key
Disable
ZyWALL 5/35/70 Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents