Wireless Lan Security; User Authentication And Encryption - ZyXEL Communications G-210H User Manual

802.11b/g wireless usb adapter
Hide thumbs Also See for G-210H:
Table of Contents

Advertisement

Chapter 3 Wireless LAN Network
• Every device in the same wireless network must use security compatible with the AP or
peer computer.
Security stops unauthorized devices from using the wireless network. It can also protect
the information that is sent in the wireless network.

3.2 Wireless LAN Security

Wireless LAN security is vital to your network to protect wireless communications.
Configure the wireless LAN security using the Security Setting screen. If you do not enable
any wireless security on your G-210H, the G-210H's wireless communications are accessible
to any wireless networking device that is in the coverage area.
You can only use WEP or DISABLE if you set the G-210H to Ad-hoc mode.
See the appendices for more detailed information about wireless security.

3.2.1 User Authentication and Encryption

You can make every user log in to the wireless network before they can use it. This is called
user authentication. However, every wireless client in the wireless network has to support
IEEE 802.1x to do this.
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
3.2.1.1 WEP
3.2.1.1.1 Data Encryption
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between
the G-210H and the AP or other wireless stations to keep network communications private.
Both the wireless stations and the access points must use the same WEP key for data
encryption and decryption.
Your G-210H allows you to configure up to four 64-bit or 128-bit WEP keys and only one key
is used as the default key at any one time.
3.2.1.1.2 Authentication Method
The IEEE 802.11 b/g standard describes a simple authentication method between the wireless
stations and AP or peer computer. The authentication types are defined: Open system and
Shared key.
26
G-210H User's Guide

Advertisement

Table of Contents
loading

Table of Contents