![Zhone zNID-GPON-2402 Configuration Manual Download Page 110](http://html2.mh-extra.com/html/zhone/znid-gpon-2402/znid-gpon-2402_configuration-manual_3626256110.webp)
Configuration
110
zNID 24xx Series Configuration Guide
Security
The main items for wireless security are authentication and encryption.
Authentication methods which are secure allow the clients (also called
stations or STA) you want onto the network, while keeping others off of the
network. Encryption is used, both in some of the authentication methods and
in the regular transmission of data once the client has successfully completed
the authentication process.
Figure 80: Some WiFi authentication and encryption examples
Wireless security basic options, Table 40 on page 111
describes an overview
of the security method and pointers to more detailed information for each
security option.
Network Authentication parameters (part 1), Table 41 on
Network Authentication parameters (part 2), Table 42 on page
provide a matrix showing the options for each type of authentication and
encryption.
Summary of Contents for zNID-GPON-2402
Page 12: ...About This Guide 12 zNID 24xx Series Configuration Guide...
Page 18: ...zNID 24xx Series 18 zNID 24xx Series Configuration Guide...
Page 84: ...Management 84 zNID 24xx Series Configuration Guide Figure 57 View audit log...
Page 199: ...VLANS zNID 24xx Series Configuration Guide 199 Figure 157 Configuration of VLAN settings...
Page 208: ...Configuration 208 zNID 24xx Series Configuration Guide...
Page 220: ...Troubleshooting tests 220 zNID 24xx Series Configuration Guide...
Page 223: ...Voice zNID 24xx Series Configuration Guide 223 Voice Figure 175...
Page 226: ...Index 226 zNID 24xx Series Configuration Guide...