Configuration
110
zNID 24xx Series Configuration Guide
Security
The main items for wireless security are authentication and encryption.
Authentication methods which are secure allow the clients (also called
stations or STA) you want onto the network, while keeping others off of the
network. Encryption is used, both in some of the authentication methods and
in the regular transmission of data once the client has successfully completed
the authentication process.
Figure 80: Some WiFi authentication and encryption examples
Wireless security basic options, Table 40 on page 111
describes an overview
of the security method and pointers to more detailed information for each
security option.
Network Authentication parameters (part 1), Table 41 on
Network Authentication parameters (part 2), Table 42 on page
provide a matrix showing the options for each type of authentication and
encryption.
Содержание zNID-GE-2402
Страница 12: ...About This Guide 12 zNID 24xx Series Configuration Guide ...
Страница 18: ...zNID 24xx Series 18 zNID 24xx Series Configuration Guide ...
Страница 44: ...Management 44 zNID 24xx Series Configuration Guide Figure 20 Saving the backup configuration file ...
Страница 83: ...Device info zNID 24xx Series Configuration Guide 83 Figure 55 Voice status logs Figure 56 View packet log ...
Страница 84: ...Management 84 zNID 24xx Series Configuration Guide Figure 57 View audit log ...
Страница 99: ...Configuration pages zNID 24xx Series Configuration Guide 99 Figure 71 Port forwarding remap rule ...
Страница 199: ...VLANS zNID 24xx Series Configuration Guide 199 Figure 157 Configuration of VLAN settings ...
Страница 208: ...Configuration 208 zNID 24xx Series Configuration Guide ...
Страница 220: ...Troubleshooting tests 220 zNID 24xx Series Configuration Guide ...
Страница 223: ...Voice zNID 24xx Series Configuration Guide 223 Voice Figure 175 ...
Страница 226: ...Index 226 zNID 24xx Series Configuration Guide ...