
P-661H/HW Series User’s Guide
Chapter 6 Wireless LAN
111
For wireless networks, user names and passwords can be stored in a RADIUS server. This is a
server used in businesses more than in homes. If you do not have a RADIUS server, you
cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network,
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized
wireless users to get a valid user name and password. Then, they can use that user name and
password to use the wireless network.
Local user databases also have an additional limitation that is explained in the next section.
6.2.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
The types of encryption you can choose depend on the type of authentication. (See
for information about this.)
For example, if the wireless network has a RADIUS server, you can choose
WPA
or
WPA2
. If
users do not log in to the wireless network, you can choose no encryption,
Static WEP
,
WPA-
PSK
, or
WPA2-PSK
.
Usually, you should set up the strongest encryption that every device in the wireless network
supports. For example, suppose you have a wireless network with the ZyXEL Device. The
ZyXEL Device does not have a local user database, and you do not have a RADIUS server.
Therefore, there is no authentication. Suppose the wireless network has two devices. Device A
only supports WEP, and device B supports WEP and WPA. Therefore, you should set up
Static WEP
in the wireless network.
Note:
It is recommended that wireless networks use
WPA-PSK
,
WPA
, or stronger
encryption. IEEE 802.1x and WEP encryption are better than none at all, but it
is still possible for unauthorized wireless devices to figure out the original
information pretty quickly.
It is not possible to use WPA-PSK, WPA or stronger encryption with a local user
database. In this case, it is better to set up stronger encryption with no
authentication than to set up weaker encryption with the local user database.
Table 35
Types of Encryption for Each Type of Authentication
No Authentication
RADIUS Server
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Summary of Contents for P-661H Series
Page 2: ......
Page 5: ...P 661H HW Series User s Guide Certifications 5...
Page 10: ...P 661H HW Series User s Guide 10 Customer Support...
Page 44: ...P 661H HW Series User s Guide 44 Chapter 1 Getting To Know Your ZyXEL Device...
Page 76: ...P 661H HW Series User s Guide 76 Chapter 3 Wizards...
Page 108: ...P 661H HW Series User s Guide 108 Chapter 5 LAN Setup...
Page 132: ...P 661H HW Series User s Guide 132 Chapter 6 Wireless LAN...
Page 192: ...P 661H HW Series User s Guide 192 Chapter 10 Trend Micro Security Services...
Page 196: ...P 661H HW Series User s Guide 196 Chapter 11 Content Filtering...
Page 202: ...P 661H HW Series User s Guide 202 Chapter 12 Introduction to IPSec...
Page 230: ...P 661H HW Series User s Guide 230 Chapter 13 VPN Screens...
Page 234: ...P 661H HW Series User s Guide 234 Chapter 14 Static Route...
Page 246: ...P 661H HW Series User s Guide 246 Chapter 15 Bandwidth Management...
Page 250: ...P 661H HW Series User s Guide 250 Chapter 16 Dynamic DNS Setup...
Page 280: ...P 661H HW Series User s Guide 280 Chapter 19 System...
Page 290: ...P 661H HW Series User s Guide 290 Chapter 21 Tools...
Page 296: ...P 661H HW Series User s Guide 296 Chapter 23 Troubleshooting...
Page 300: ...P 661H HW Series User s Guide 300 Appendix A...
Page 304: ...P 661H HW Series User s Guide 304 Appendix C...
Page 326: ...P 661H HW Series User s Guide 326 Appendix E...
Page 328: ...P 661H HW Series User s Guide 328 Appendix F...
Page 334: ...P 661H HW Series User s Guide 334 Appendix G...
Page 368: ...P 661H HW Series User s Guide 368 Appendix K...
Page 376: ...P 661H HW Series User s Guide 376 Figure 219 Java Sun...