![ZyXEL Communications P-660HN-F1 User Manual Download Page 121](http://html1.mh-extra.com/html/zyxel-communications/p-660hn-f1/p-660hn-f1_user-manual_944063121.webp)
Chapter 6 Wireless
ADSL Series User’s Guide
121
6.7.2.3 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before using it. However, every
device in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS
server. This is a server used in businesses more than in homes. If you do not have a RADIUS server,
you cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network,
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized
wireless users to get a valid user name and password. Then, they can use that user name and
password to use the wireless network.
6.7.2.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
The types of encryption you can choose depend on the type of authentication. (See
For example, if the wireless network has a RADIUS server, you can choose WPA or WPA2. If users
do not log in to the wireless network, you can choose no encryption, Static WEP, WPA-PSK, or
WPA2-PSK.
Usually, you should set up the strongest encryption that every device in the wireless network
supports. For example, suppose you have a wireless network with the ZyXEL Device and you do not
have a RADIUS server. Therefore, there is no authentication. Suppose the wireless network has two
devices. Device A only supports WEP, and device B supports WEP and WPA. Therefore, you should
set up Static WEP in the wireless network.
Note: It is recommended that wireless networks use WPA-PSK, WPA, or stronger
encryption. The other types of encryption are better than none at all, but it is still
possible for unauthorized wireless devices to figure out the original information
pretty quickly.
When you select WPA2 or WPA2-PSK in your ZyXEL Device, you can also select an option (WPA
compatible) to support WPA as well. In this case, if some of the devices support WPA and some
support WPA2, you should set up WPA2-PSK or WPA2 (depending on the type of wireless network
login) and select the WPA compatible option in the ZyXEL Device.
Table 26
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION
RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Summary of Contents for P-660HN-F1
Page 2: ...Videos ADSL Series User s Guide 2 Videos File Sharing Video Example 55 QoS Video Example 76...
Page 6: ...Document Conventions ADSL Series User s Guide 6 Server Firewall Router Switch...
Page 8: ...Safety Warnings ADSL Series User s Guide 8...
Page 10: ...Contents Overview ADSL Series User s Guide 10...
Page 19: ...19 PART I User s Guide...
Page 20: ...20...
Page 26: ...Chapter 1 Introduction ADSL Series User s Guide 26...
Page 40: ...Chapter 2 Introducing the Web Configurator ADSL Series User s Guide 40...
Page 80: ...Chapter 3 Tutorials ADSL Series User s Guide 80...
Page 81: ...81 PART II Technical Reference...
Page 82: ...82...
Page 130: ...Chapter 6 Wireless ADSL Series User s Guide 130...
Page 160: ...Chapter 8 Routing ADSL Series User s Guide 160...
Page 164: ...Chapter 9 DNS Route ADSL Series User s Guide 164...
Page 182: ...Chapter 11 Network Address Translation NAT ADSL Series User s Guide 182...
Page 190: ...Chapter 13 Firewall ADSL Series User s Guide 190...
Page 202: ...Chapter 15 Certificates ADSL Series User s Guide 202...
Page 222: ...Chapter 16 VPN ADSL Series User s Guide 222...
Page 226: ...Chapter 17 System Monitor ADSL Series User s Guide 226...
Page 228: ...Chapter 18 User Account ADSL Series User s Guide 228...
Page 242: ...Chapter 24 Backup Restore ADSL Series User s Guide 242...
Page 246: ...Chapter 25 Diagnostic ADSL Series User s Guide 246...
Page 254: ...Chapter 26 Troubleshooting ADSL Series User s Guide 254...
Page 262: ...Chapter 27 Product Specifications ADSL Series User s Guide 262...
Page 302: ...Appendix B Setting Up Your Computer s IP Address ADSL Series User s Guide 302...
Page 310: ...Appendix C Pop up Windows Java Script and Java Permissions ADSL Series User s Guide 310...
Page 334: ...Appendix E Common Services ADSL Series User s Guide 334...
Page 355: ...Appendix F Open Software Announcements ADSL Series User s Guide 355...
Page 356: ...Appendix F Open Software Announcements ADSL Series User s Guide 356...
Page 360: ...Appendix G Legal Information ADSL Series User s Guide 360...