![ZyXEL Communications P-873HNU-51B User Manual Download Page 319](http://html1.mh-extra.com/html/zyxel-communications/p-873hnu-51b/p-873hnu-51b_user-manual_944211319.webp)
Appendix D Wireless LANs
P-873HNU(P)-51B User’s Guide
319
If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use
WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use
WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical) password entered into
each access point, wireless gateway and wireless client. As long as the passwords match, a wireless
client will be granted access to a WLAN.
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on
whether you have an external RADIUS server or not.
Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less
secure than WPA or WPA2.
Encryption
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity
Check (MIC) and IEEE 802.1x. WPA2 also uses TKIP when required for compatibility reasons, but
offers stronger encryption than TKIP with Advanced Encryption Standard (AES) in the Counter
mode with Cipher block chaining Message authentication code Protocol (CCMP).
TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server.
AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit mathematical algorithm
called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check
(MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying
mechanism.
WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is
never used twice.
The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key
hierarchy and management system, using the PMK to dynamically generate unique data encryption
keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless
clients. This all happens in the background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets,
altering them and resending them. The MIC provides a strong mathematical function in which the
receiver and the transmitter each compute and then compare the MIC. If they do not match, it is
assumed that the data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating an integrity
checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi
network than WEP and difficult for an intruder to break into the network.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference
between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific
credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force
password-guessing attacks but it’s still an improvement over WEP as it employs a consistent,
single, alphanumeric password to derive a PMK which is used to generate unique temporal
encryption keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of
WEP)
User Authentication
WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate
wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange
Summary of Contents for P-873HNU-51B
Page 4: ...Contents Overview P 873HNU P 51B User s Guide 4...
Page 13: ...Table of Contents P 873HNU P 51B User s Guide 13 Appendix F Legal Information 329 Index 333...
Page 14: ...Table of Contents P 873HNU P 51B User s Guide 14...
Page 15: ...15 PART I User s Guide...
Page 16: ...16...
Page 32: ...Chapter 2 The Web Configurator P 873HNU P 51B User s Guide 32...
Page 57: ...57 PART II Technical Reference...
Page 58: ...58...
Page 64: ...Chapter 5 Network Map and Status Screens P 873HNU P 51B User s Guide 64...
Page 108: ...Chapter 7 Wireless P 873HNU P 51B User s Guide 108...
Page 132: ...Chapter 9 Static Routing P 873HNU P 51B User s Guide 132...
Page 152: ...Chapter 10 Quality of Service QoS P 873HNU P 51B User s Guide 152...
Page 168: ...Chapter 11 Network Address Translation NAT P 873HNU P 51B User s Guide 168...
Page 182: ...Chapter 13 IGMP P 873HNU P 51B User s Guide 182...
Page 188: ...Chapter 14 Interface Group P 873HNU P 51B User s Guide 188...
Page 202: ...Chapter 17 Parental Control P 873HNU P 51B User s Guide 202...
Page 224: ...Chapter 22 Logs P 873HNU P 51B User s Guide 224...
Page 234: ...Chapter 25 xDSL Statistics P 873HNU P 51B User s Guide 234...
Page 238: ...Chapter 26 Users Configuration P 873HNU P 51B User s Guide 238...
Page 244: ...Chapter 27 Remote Management P 873HNU P 51B User s Guide 244...
Page 250: ...Chapter 29 Logs Setting P 873HNU P 51B User s Guide 250...
Page 256: ...Chapter 31 Configuration P 873HNU P 51B User s Guide 256...
Page 262: ...Chapter 32 Diagnostic P 873HNU P 51B User s Guide 262...
Page 274: ...Chapter 34 Product Specifications P 873HNU P 51B User s Guide 274...
Page 310: ...Appendix C Pop up Windows JavaScript and Java Permissions P 873HNU P 51B User s Guide 310...
Page 324: ...Appendix D Wireless LANs P 873HNU P 51B User s Guide 324...