About Essid Security Settings; Table 9 Security Modes - ZyXEL Communications NXC-8160 User Manual

Business wlan controller
Hide thumbs Also See for NXC-8160:
Table of Contents

Advertisement

4.2.1 About ESSID Security Settings

Use the Encryption section of the WLAN > ESSID Definition > ESSID Settings screen to
configure the wireless security settings of the specified ESSID. The screen varies according to
the security modes you select.
The following table describes the security modes you can configure.

Table 9 Security Modes

SECURITY MODE
None
WEP64
WEP128
WEP64 + 802.1x
Authentication
WEP128 + 802.1x
Authentication
WPA-Personal/WPA2-
Personal
WPA-Enterrpise/WPA2-
Enterprise
4.2.1.1 User Authentication
You can make every user log in to the wireless network before they can use it. This is called
"user authentication." For wireless networks, there are typically two places to store the user
names and passwords for each person:
• In the AP or WLAN controller: this feature is called a local user database or a local
database.
• In a RADIUS server: this is a server used in businesses more than in homes.
If your AP or WLAN controller (in this case it is the NXC-8160) does not provide a local user
database and if you do not have a RADIUS server, you cannot set up user names and
passwords for your users.
Unauthorized devices can still see the information that is sent in the wireless network, even if
they cannot use the wireless network. Furthermore, there are ways for unauthorized wireless
users to get a valid user name and password. Then, they can use that user name and password
to use the wireless network.
NXC-8160 User's Guide
DESCRIPTION
Select this to use no data encryption.
Select this to use WEP encryption with a static 64-bit WEP key.
Select this to use WEP encryption with a static 128-bit WEP key.
Select this to use 802.1x authentication with a static 64-bit WEP key and an
authentication server.
Select this to use 802.1x authentication with a static 128-bit WEP key and an
authentication server.
Select this to use WPA Personal encryption.
Select this to use WPA Enterprise encryption.
Chapter 4 WLAN Settings
47

Advertisement

Table of Contents
loading

Table of Contents