ZyXEL ZyAIR G-570S User Manual Page 74

  • Download
  • Add to my manuals
  • Print
  • Page
    / 162
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 73
ZyXEL G-570S User’s Guide
74 Chapter 6 Wireless Screens
The figure below shows the possible wireless security levels on your G-570S. EAP
(Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key
exchange. It requires interaction with a RADIUS (Remote Authentication Dial-In User
Service) server either on the WAN or your LAN to provide authentication service for wireless
stations.
If you do not enable any wireless security on your G-570S, your network is accessible to any
wireless networking device that is within range.
6.4.1 Encryption
Use WPA(2) security if you have WP(2)A-aware wireless clients and a RADIUS server.
WPA(2) has user authentication and improved data encryption over WEP.
Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A
higher bit key offers better security at a throughput trade-off. You can use the passphrase
feature to automatically generate WEP keys or manually enter WEP keys.
6.4.2 Authentication
Use a RADIUS server with WPA or IEEE 802.1x key management protocol.
See the appendix for information on protocols used when a client authenticates with a
RADIUS server via the G-570S.
6.4.3 Restricted Access
The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).
Table 15 Wireless Security Levels
SECURITY LEVEL SECURITY TYPE
L e a s t S e c u r e
Most Secure
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
WPA2
Page view 73
1 2 ... 69 70 71 72 73 74 75 76 77 78 79 ... 161 162

Comments to this Manuals

No comments