![ZyXEL Communications G-570S User Manual Download Page 134](http://html1.mh-extra.com/html/zyxel-communications/g-570s/g-570s_user-manual_945883134.webp)
Appendix D Wireless LANs
ZyXEL G-570S User’s Guide
134
Wireless security methods available on the ZyXEL Device are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the ZyXEL Device
identity.
The following figure shows the relative effectiveness of these wireless security methods
available on your ZyXEL Device.
"
You must enable the same wireless security settings on the ZyXEL Device and
on all wireless clients that you want to associate with it.
IEEE 802.1x
In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to
support extended authentication as well as providing additional accounting and control
features. It is supported by Windows XP and a number of network devices. Some advantages
of IEEE 802.1x are:
• User based identification that allows for roaming.
• Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for
centralized user profile and accounting management on a network RADIUS server.
• Support for EAP (Extensible Authentication Protocol, RFC 2486) that allows additional
authentication methods to be deployed with no changes to the access point or the wireless
clients.
RADIUS
RADIUS is based on a client-server model that supports authentication, authorization and
accounting. The access point is the client and the server is the RADIUS server. The RADIUS
server handles the following tasks:
• Authentication
Determines the identity of the users.
• Authorization
Table 36
Wireless Security Levels
SECURITY
LEVEL
SECURITY TYPE
Least
Secure
Most Secure
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
WPA2
Summary of Contents for G-570S
Page 1: ...www zyxel com G 570S 802 11g Wireless Access Point User s Guide Version 1 00 12 2006 Edition 2...
Page 2: ......
Page 7: ...Safety Warnings ZyXEL G 570S User s Guide 7...
Page 8: ...Safety Warnings ZyXEL G 570S User s Guide 8...
Page 10: ...Contents Overview ZyXEL G 570S User s Guide 10...
Page 18: ...List of Figures ZyXEL G 570S User s Guide 18...
Page 20: ...List of Tables ZyXEL G 570S User s Guide 20...
Page 22: ...22...
Page 30: ...Chapter 1 ZyXEL G 570S User s Guide 30...
Page 34: ...Chapter 2 Introducing the Web Configurator ZyXEL G 570S User s Guide 34...
Page 42: ...Chapter 3 Wizards ZyXEL G 570S User s Guide 42...
Page 44: ...44...
Page 54: ...Chapter 6 System Screen ZyXEL G 570S User s Guide 54...
Page 86: ...Chapter 7 Wireless Screens ZyXEL G 570S User s Guide 86...
Page 87: ...87 PART III Management and Troubleshooting Management Screens 89 Troubleshooting 95...
Page 88: ...88...
Page 100: ...100...
Page 150: ...Appendix F Legal Information ZyXEL G 570S User s Guide 150...