![ZyXEL Communications G-2000 Plus V2 Скачать руководство пользователя страница 411](http://html1.mh-extra.com/html/zyxel-communications/g-2000-plus-v2/g-2000-plus-v2_user-manual_945995411.webp)
ZyXEL G-2000 Plus v2 User’s Guide
411
By generating unique data encryption keys for every data packet and by creating an integrity
checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi
network than WEP and difficult for an intruder to break into the network.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only
difference between the two is that WPA(2)-PSK uses a simple common password, instead of
user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to
brute-force password-guessing attacks but it’s still an improvement over WEP as it employs a
consistent, single, alphanumeric password to derive a PMK which is used to generate unique
temporal encryption keys. This prevent all wireless devices sharing the same encryption keys.
(a weakness of WEP)
User Authentication
WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to
authenticate wireless stations using an external RADIUS database. WPA2 reduces the number
of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time
required to connect to a network. Other WPA2 authentication features that are different from
WPA include key caching and pre-authentication. These two features are optional and may not
be supported in all wireless devices.
Key caching allows a wireless client to store the PMK it derived through a successful
authentication with an AP. The wireless client uses the PMK when it tries to connect to the
same AP and does not need to go with the authentication process again.
Pre-authentication enables fast roaming by allowing the wireless client (already connecting to
an AP) to perform IEEE 802.1x authentication with another AP before connecting to it.
Wireless Client WPA Supplicants
A wireless client supplicant is the software that runs on an operating system instructing the
wireless client how to use WPA. At the time of writing, the most widely available supplicant is
the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data
Communications' AEGIS client.
The Windows XP patch is a free download that adds WPA capability to Windows XP's built-
in "Zero Configuration" wireless client. However, you must run Windows XP to use it.
The Funk Software's Odyssey client is bundled free (at the time of writing) with the client
wireless adaptor(s).
WPA with RADIUS Application Example
You need the IP address of the RADIUS server, its port number (default is 1812), and the
RADIUS shared secret. A WPA application example with an external RADIUS server looks
as follows. “A” is the RADIUS server. “DS” is the distribution system.
1
The AP passes the wireless client’s authentication request to the RADIUS server.
Содержание G-2000 Plus V2
Страница 1: ...ZyXEL G 2000 Plus v2 4 port Wireless Router User s Guide Version 3 60 Edition 1 2 2006...
Страница 2: ......
Страница 10: ...ZyXEL G 2000 Plus v2 User s Guide 10 Customer Support...
Страница 24: ...ZyXEL G 2000 Plus v2 User s Guide 24 Table of Contents...
Страница 50: ...ZyXEL G 2000 Plus v2 User s Guide 50 Chapter 2 Introducing the Web Configurator...
Страница 66: ...ZyXEL G 2000 Plus v2 User s Guide 66 Chapter 3 Wizard Setup...
Страница 100: ...ZyXEL G 2000 Plus v2 User s Guide 100 Chapter 6 Wireless LAN...
Страница 112: ...ZyXEL G 2000 Plus v2 User s Guide 112 Chapter 7 WAN...
Страница 153: ...ZyXEL G 2000 Plus v2 User s Guide Chapter 11 Firewall Screens 153 Figure 59 Creating Editing A Firewall Rule...
Страница 158: ...ZyXEL G 2000 Plus v2 User s Guide 158 Chapter 11 Firewall Screens Figure 64 My Service Rule Configuration...
Страница 162: ...ZyXEL G 2000 Plus v2 User s Guide 162 Chapter 11 Firewall Screens...
Страница 166: ...ZyXEL G 2000 Plus v2 User s Guide 166 Chapter 12 Content Filtering...
Страница 178: ...ZyXEL G 2000 Plus v2 User s Guide 178 Chapter 13 Remote Management Screens...
Страница 188: ...ZyXEL G 2000 Plus v2 User s Guide 188 Chapter 14 UPnP...
Страница 198: ...ZyXEL G 2000 Plus v2 User s Guide 198 Chapter 15 Internal RADIUS Server...
Страница 205: ...ZyXEL G 2000 Plus v2 User s Guide Chapter 16 Certificates 205 Figure 84 My Certificate Create...
Страница 219: ...ZyXEL G 2000 Plus v2 User s Guide Chapter 17 Log Screens 219 Figure 90 Log Settings...
Страница 234: ...ZyXEL G 2000 Plus v2 User s Guide 234 Chapter 18 Maintenance Figure 105 Restart Screen...
Страница 262: ...ZyXEL G 2000 Plus v2 User s Guide 262 Chapter 23 Internet Access...
Страница 272: ...ZyXEL G 2000 Plus v2 User s Guide 272 Chapter 24 Remote Node Configuration...
Страница 322: ...ZyXEL G 2000 Plus v2 User s Guide 322 Chapter 31 System Security...
Страница 334: ...ZyXEL G 2000 Plus v2 User s Guide 334 Chapter 32 System Information and Diagnosis...
Страница 346: ...ZyXEL G 2000 Plus v2 User s Guide 346 Chapter 33 Firmware and Configuration File Maintenance...
Страница 354: ...ZyXEL G 2000 Plus v2 User s Guide 354 Chapter 34 System Maintenance and Information...
Страница 368: ...ZyXEL G 2000 Plus v2 User s Guide 368...
Страница 380: ...ZyXEL G 2000 Plus v2 User s Guide 380...
Страница 384: ...ZyXEL G 2000 Plus v2 User s Guide 384...
Страница 392: ...ZyXEL G 2000 Plus v2 User s Guide 392...
Страница 394: ...ZyXEL G 2000 Plus v2 User s Guide 394...
Страница 415: ...ZyXEL G 2000 Plus v2 User s Guide 415 Figure 232 Sequences for PEAP MS CHAP V2 Authentication...
Страница 416: ...ZyXEL G 2000 Plus v2 User s Guide 416...
Страница 426: ...ZyXEL G 2000 Plus v2 User s Guide 426...