
Chapter 7 Wireless Security Screen
ZyXEL NWA-1100 User’s Guide
75
•
802.1x-Static64.
This provides 802.1x-Only authentication with a static
64bit WEP key and an authentication server.
•
802.1x-Static128
. This provides 802.1x-Only authentication with a static
128bit WEP key and an authentication server.
•
WPA.
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard.
•
WPA2.
WPA2 (IEEE 802.11i) is a wireless security standard that defines
stronger encryption, authentication and key management than WPA.
•
WPA2-MIX.
This commands the ZyXEL Device to use either WPA2 or WPA
depending on which security mode the wireless client uses.
•
WPA2-PSK
. This adds a pre-shared key on top of WPA2 standard.
•
WPA2-PSK-MIX
. This commands the ZyXEL Device to use either WPA-PSK
or WPA2-PSK depending on which security mode the wireless client uses.
Note: In
Bridge
and
AP
operating modes, the only available security modes
are
WEP
and
WPA2-PSK
.
Passphrase
A passphrase functions like a password. In WEP security mode, it is further
converted by the ZyXEL Device into a complicated string that is referred to as the
“key”. This key is requested from all devices wishing to connect to a wireless
network.
PSK
The Pre-Shared Key (PSK) is a password shared by a wireless access point and a
client during a previous secure connection. The key can then be used to establish
a connection between the two parties.
Encryption
Wireless networks can use encryption to protect the information that is sent in the
wireless network. Encryption is like a secret code. If you do not know the secret
code, you cannot understand the message. Encryption is the process of converting
data into unreadable text. This secures information in network communications.
The intended recipient of the data can “unlock” it with a pre-assigned key, making
the information readable only to him. The ZyXEL Device when used as a wireless
client employs Temporal Key Integrity Protocol (TKIP) data encryption.
EAP
Extensible Authentication Protocol (EAP) is a protocol used by a wireless client, an
access point and an authentication server to negotiate a connection.
The EAP methods employed by the ZyXEL Device when in Wireless Client
operating mode are Transport Layer Security (TLS), Protected Extensible
Содержание NWA-1100
Страница 2: ......
Страница 8: ...Safety Warnings ZyXEL NWA 1100 User s Guide 8 ...
Страница 10: ...Contents Overview ZyXEL NWA 1100 User s Guide 10 ...
Страница 16: ...Table of Contents ZyXEL NWA 1100 User s Guide 16 ...
Страница 18: ...18 ...
Страница 32: ...Chapter 2 Introducing the Web Configurator ZyXEL NWA 1100 User s Guide 32 ...
Страница 46: ...46 ...
Страница 54: ...Chapter 5 System Screens ZyXEL NWA 1100 User s Guide 54 ...
Страница 72: ...Chapter 6 Wireless Settings Screen ZyXEL NWA 1100 User s Guide 72 ...
Страница 92: ...Chapter 8 RADIUS Screen ZyXEL NWA 1100 User s Guide 92 ...
Страница 96: ...Chapter 9 MAC Filter Screen ZyXEL NWA 1100 User s Guide 96 ...
Страница 100: ...Chapter 10 IP Screen ZyXEL NWA 1100 User s Guide 100 ...
Страница 136: ...Chapter 15 Troubleshooting ZyXEL NWA 1100 User s Guide 136 ...
Страница 138: ...138 ...
Страница 142: ...Appendix B Power over Ethernet PoE Specifications ZyXEL NWA 1100 User s Guide 142 ...
Страница 144: ...Appendix C Power Adaptor Specifications ZyXEL NWA 1100 User s Guide 144 ...
Страница 198: ...Appendix H Text File Based Auto Configuration ZyXEL NWA 1100 User s Guide 198 ...
Страница 214: ...Appendix J Open Software Announcements ZyWALL USG 300 User s Guide 214 ...
Страница 225: ...Index ZyXEL NWA 1100 User s Guide 225 ...