G-470 User’s Guide
32
Chapter 3 Wireless LAN Network
• Every device in the same wireless network must use security compatible with the AP or
peer computer.
Security stops unauthorized devices from using the wireless network. It can also protect
the information that is sent in the wireless network.
3.2 Wireless LAN Security
Wireless LAN security is vital to your network to protect wireless communications.
If you do not enable any wireless security on your ZyXEL Device, the ZyXEL Device’s
wireless communications are accessible to any wireless networking device that is in the
coverage area. See
for more information on configuring wireless
security for your device.
3.2.1 User Authentication and Encryption
User authentication is when every user must log in to the wireless network before they can use
it. However, every wireless client in the wireless network has to support IEEE 802.1x to do
this.
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
3.2.1.1 Certificates
Your ZyXEL Device can use certificates (also called digital IDs) for user authentication.
Certificates are based on public-private key pairs. A certificate contains the certificate owner’s
identity and public key. Certificates provide a way to exchange public keys for use in
authentication.
A Certification Authority (CA) issues certificates and guarantees the identity of each
certificate owner. There are commercial certification authorities like CyberTrust or VeriSign
and government certification authorities.
In public-key encryption and decryption, each host has two keys. One key is public and can be
made openly available; the other key is private and must be kept secure. Public-key encryption
in general works as follows.
1
Tim wants to send a private message to Jenny. Tim generates a public key pair. What is
encrypted with one key can only be decrypted using the other.
2
Tim keeps the private key and makes the public key openly available.
3
Tim uses his private key to encrypt the message and sends it to Jenny.
4
Jenny receives the message and uses Tim’s public key to decrypt it.
Summary of Contents for G-470
Page 1: ...G 470 802 11g Wireless Ethernet Adapter User s Guide Version 1 00 Edition 1 6 2006...
Page 2: ......
Page 10: ...G 470 User s Guide 10 Customer Support...
Page 14: ...G 470 User s Guide 14 Table of Contents...
Page 18: ...G 470 User s Guide 18 List of Tables...
Page 25: ...G 470 User s Guide Chapter 1 Getting Started 25 Figure 6 Roaming Example...
Page 26: ...G 470 User s Guide 26 Chapter 1 Getting Started...
Page 54: ...G 470 User s Guide 54 Chapter 5 System Screen...
Page 74: ...G 470 User s Guide 74 Chapter 7 Management Screens...
Page 86: ...G 470 User s Guide 86 Chapter 8 Troubleshooting...
Page 88: ...G 470 User s Guide 88 Appendix A...
Page 106: ...G 470 User s Guide 106 Appendix C...