![background image](http://html1.mh-extra.com/html/zyxel-communications/p-661h-series/p-661h-series_user-manual_944127360.webp)
P-661H/HW Series User’s Guide
360
Appendix K
Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless
clients, access points and the wired network.
Wireless security methods available on the ZyXEL Device are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the ZyXEL Device
identity.
The following figure shows the relative effectiveness of these wireless security methods
available on your ZyXEL Device.
Note:
You must enable the same wireless security settings on the
ZyXEL Device
and
on all wireless clients that you want to associate with it.
IEEE 802.1x
In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to
support extended authentication as well as providing additional accounting and control
features. It is supported by Windows XP and a number of network devices. Some advantages
of IEEE 802.1x are:
• User based identification that allows for roaming.
• Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for
centralized user profile and accounting management on a network RADIUS server.
• Support for EAP (Extensible Authentication Protocol, RFC 2486) that allows additional
authentication methods to be deployed with no changes to the access point or the wireless
clients.
Table 165
Wireless Security Levels
Security Level
Security Type
Least Secure
Most Secure
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
WPA2
Summary of Contents for P-661H Series
Page 2: ......
Page 5: ...P 661H HW Series User s Guide Certifications 5...
Page 10: ...P 661H HW Series User s Guide 10 Customer Support...
Page 44: ...P 661H HW Series User s Guide 44 Chapter 1 Getting To Know Your ZyXEL Device...
Page 76: ...P 661H HW Series User s Guide 76 Chapter 3 Wizards...
Page 108: ...P 661H HW Series User s Guide 108 Chapter 5 LAN Setup...
Page 132: ...P 661H HW Series User s Guide 132 Chapter 6 Wireless LAN...
Page 192: ...P 661H HW Series User s Guide 192 Chapter 10 Trend Micro Security Services...
Page 196: ...P 661H HW Series User s Guide 196 Chapter 11 Content Filtering...
Page 202: ...P 661H HW Series User s Guide 202 Chapter 12 Introduction to IPSec...
Page 230: ...P 661H HW Series User s Guide 230 Chapter 13 VPN Screens...
Page 234: ...P 661H HW Series User s Guide 234 Chapter 14 Static Route...
Page 246: ...P 661H HW Series User s Guide 246 Chapter 15 Bandwidth Management...
Page 250: ...P 661H HW Series User s Guide 250 Chapter 16 Dynamic DNS Setup...
Page 280: ...P 661H HW Series User s Guide 280 Chapter 19 System...
Page 290: ...P 661H HW Series User s Guide 290 Chapter 21 Tools...
Page 296: ...P 661H HW Series User s Guide 296 Chapter 23 Troubleshooting...
Page 300: ...P 661H HW Series User s Guide 300 Appendix A...
Page 304: ...P 661H HW Series User s Guide 304 Appendix C...
Page 326: ...P 661H HW Series User s Guide 326 Appendix E...
Page 328: ...P 661H HW Series User s Guide 328 Appendix F...
Page 334: ...P 661H HW Series User s Guide 334 Appendix G...
Page 368: ...P 661H HW Series User s Guide 368 Appendix K...
Page 376: ...P 661H HW Series User s Guide 376 Figure 219 Java Sun...