93
802.11a/n ZAC Access Point provides you with rock solid security settings.
Network Authentication
Open System
: It allows any device to join the network without performing any security check.
Shared Key
: Data encryption and key are required for wireless authentication (Not available in
Bridge/AP Repeater mode).
Legacy 802.1x
: It provides the rights to access the wireless network and wired Ethernet. With
User and PC identity, centralized authentication as well as dynamic key management, it controls
the security risk of wireless network to the lowest. To serve the 802.1x, at least one EAP type
should be supported by the RADIUS Server, AP and wireless client.
WPA with RADIUS
: Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard.
With warrant (username, password and etc.) offered by user, this kind of authentication can be
realized with specific RADIUS server. This is the common way to be adopted in large enterprise
network.
WPA2 with RADIUS
: W PA2 (IEEE 802.11i) is a wireless security standard that defines stronger
encryption, authentication and key management than WPA. If it is selected, AES encryption and
RADIUS server are required.
WPA&WPA2 with RADIUS
: It provides options of WPA (TKIP) or W PA2 (AES) for the client. If it is
selected, the data encryption type must be TKIP + AES and the RADIUS server must be set.
If Radius relevant authentication type is selected, please go to
Wireless
Radius
Settings
for further radius server configuration.
WPA-PSK
: It is a simplified WPA mode with no need for specific authentication server. In this
so-called WPA Pre-Shared Key, all you have to do is just pre-enter a key in each WLAN node and
this is the common way to be adopted in large and middle enterprise as well as residential
network.
WPA2-PSK
: As a new version of W PA, only all the clients support WPA2, can it be available. If it is
selected, the data encryption can only be AES and the passphrase is required.
WPA-PSK&WPA2-PSK
: Available in AP mode, it provides options of WPA (TKIP) or W PA2 (AES)
Note: