![ZyXEL Communications ZyAIR G-3000H Скачать руководство пользователя страница 68](http://html1.mh-extra.com/html/zyxel-communications/zyair-g-3000h/zyair-g-3000h_user-manual_945513068.webp)
G-3000H User’s Guide
68
Chapter 6 Wireless Security Configuration
6.1.4 Hide ZyAIR Identity
If you hide the ESSID, then the ZyAIR cannot be seen when a wireless client scans for local
APs. The trade-off for the extra security of “hiding” the ZyAIR may be inconvenience for
some valid WLAN clients.
6.1.5 WEP Encryption
WEP encryption scrambles the data transmitted between the wireless stations and the access
points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key.
Your ZyAIR allows you to configure up to four 64-bit or 128-bit WEP keys but only one key
can be enabled at any one time.
6.2 Configuring WEP Encryption
In order to configure and enable WEP encryption; click the
WIRELESS
link under
ADVANCED
to display the
Wireless
screen.
Note:
The
WEP Encryption
,
Authentication Method
and the WEP key fields are not
visible when you enable Dynamic WEP Key, WPA or WPA-PSK in the
Security
screen.
6.3 802.1x Overview
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management. Authentication can be done using the local
user database internal to the ZyAIR (authenticate up to 32 users) or an external RADIUS
server for an unlimited number of users.
6.4 EAP Authentication Overview
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE802.1x transport mechanism in order to support multiple types of user authentication. By
using EAP to interact with an EAP-compatible RADIUS server, the access point helps a
wireless station and a RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server or the AP. The ZyAIR
supports EAP-TLS, EAP-TTLS, EAP-MD5 and PEAP with RADIUS. Refer to the Types of
EAP Authentication
appendix for descriptions on the common types.
Содержание ZyAIR G-3000H
Страница 1: ...G 3000H 802 11g Wireless Access Point User s Guide Version 3 50 1 2006 ...
Страница 22: ...G 3000H User s Guide 22 List of Figures ...
Страница 26: ...G 3000H User s Guide 26 List of Tables ...
Страница 114: ...G 3000H User s Guide 114 Chapter 9 VLAN ...
Страница 134: ...G 3000H User s Guide 134 Chapter 11 Certificates ...
Страница 164: ...G 3000H User s Guide 164 Chapter 15 Introducing the SMT ...
Страница 180: ...G 3000H User s Guide 180 Chapter 17 LAN Setup ...
Страница 218: ...G 3000H User s Guide 218 Chapter 24 System Maintenance and Information ...
Страница 224: ...G 3000H User s Guide 224 Appendix C Power over Ethernet PoE Specifications ...
Страница 226: ...G 3000H User s Guide 226 Appendix D Brute Force Password Guessing Protection ...
Страница 238: ...G 3000H User s Guide 238 Appendix E Setting up Your Computer s IP Address ...
Страница 242: ...G 3000H User s Guide 242 Appendix F IP Address Assignment Conflicts ...
Страница 254: ...G 3000H User s Guide 254 Appendix G Wireless LANs ...
Страница 262: ...G 3000H User s Guide 262 Appendix H IP Subnetting ...
Страница 264: ...G 3000H User s Guide 264 Appendix I Command Interpreter ...
Страница 268: ...G 3000H User s Guide 268 Appendix J Log Descriptions ...
Страница 272: ...G 3000H User s Guide 272 Appendix L Power Adaptor Specifications ...
Страница 280: ...G 3000H User s Guide 280 Appendix M Text File Based Auto Configuration ...
Страница 294: ...G 3000H User s Guide 294 Appendix N Wireless LAN Manager ...
Страница 299: ...G 3000H User s Guide Index 299 ZyNOS F W Version 196 zyxel prowireless mib 287 ...