ZyXEL G-302 v3 User’s Guide
30
Chapter 2 Wireless LAN Network
2.2.1 Data Encryption with WEP
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between
the G-302 v3 and the AP or other wireless stations to keep network communications private.
Both the wireless stations and the access points must use the same WEP key for data
encryption and decryption.
There are two ways to create WEP keys in your G-302 v3.
• Automatic WEP key generation based on a “password phrase” called a passphrase. The
passphrase is case sensitive. You must use the same passphrase for all WLAN adapters
with this feature in the same WLAN.
For WLAN adapters without the passphrase feature, you can still take advantage of this
feature by writing down the four automatically generated WEP keys from the
Security
Settings
screen of the ZyXEL utility and entering them manually as the WEP keys in the
other WLAN adapter(s).
• Enter the WEP keys manually.
Your G-302 v3 allows you to configure up to four 64-bit or 128-bit WEP keys and only
one key is used as the default key at any one time.
2.2.2 IEEE 802.1x
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management. Authentication can be done using an
external RADIUS server.
2.2.2.1 EAP Authentication
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By
using EAP to interact with an EAP-compatible RADIUS server, an access point helps a
wireless station and a RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server and an intermediary AP(s)
that supports IEEE 802.1x. The G-302 v3 supports EAP-TLS, EAP-TTLS and EAP-PEAP.
Refer to
For EAP-TLS authentication type, you must first have a wired connection to the network and
obtain the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs)
can be used to authenticate users and a CA issues certificates and guarantees the identity of
each certificate owner.
Summary of Contents for G-302 V3
Page 1: ...ZyXEL G 302 v3 802 11g Wireless PCI Adapter User s Guide Version 4 00 Edition 1 10 2008...
Page 2: ......
Page 6: ...ZyXEL G 302 v3 User s Guide 6 Preface...
Page 19: ...ZyXEL G 302 v3 User s Guide Table of Contents 15 Index 75...
Page 20: ...ZyXEL G 302 v3 User s Guide 16 Table of Contents...
Page 24: ...ZyXEL G 302 v3 User s Guide 20 List of Tables...
Page 31: ...ZyXEL G 302 v3 User s Guide Chapter 1 Getting Started 27 Figure 9 ZyXEL Utility Link Info...
Page 32: ...ZyXEL G 302 v3 User s Guide 28 Chapter 1 Getting Started...
Page 38: ...ZyXEL G 302 v3 User s Guide 34 Chapter 2 Wireless LAN Network...
Page 72: ...ZyXEL G 302 v3 User s Guide 68 Appendix B Management with Wireless Zero Configuration...