
G-3000H User’s Guide
252
Appendix G Wireless LANs
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data
packets, altering them and resending them. The MIC provides a strong mathematical function
in which the receiver and the transmitter each compute and then compare the MIC. If they do
not match, it is assumed that the data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating an integrity
checking mechanism (MIC), TKIP makes it much more difficult to decode data on a Wi-Fi
network than WEP, making it difficult for an intruder to break into the network.
The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference
between the two is that WPA-PSK uses a simple common password, instead of user-specific
credentials. The common-password approach makes WPA-PSK susceptible to brute-force
password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-
use, consistent, single, alphanumeric password.
User Authentication
WPA or WPA2 applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to
authenticate wireless clients using an external RADIUS database.
If both an AP and the wireless clients support WPA2 and you have an external RADIUS
server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server,
you should use WPA2 -PSK (WPA2 -Pre-Shared Key) that only requires a single (identical)
password entered into each access point, wireless gateway and wireless client. As long as the
passwords match, a wireless client will be granted access to a WLAN.
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending
on whether you have an external RADIUS server or not.
Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is
less secure than WPA or WPA2.
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each
Authentication Method/ key management protocol type. MAC address filters are not
dependent on how you configure these security features.
Table 95
Wireless Security Relational Matrix
AUTHENTICATION
METHOD/ KEY
MANAGEMENT PROTOCOL
ENCRYPTION
METHOD
ENTER
MANUAL KEY
ENABLE IEEE 802.1X
Open None
No
No
Open
WEP
No
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
Содержание ZyAIR G-3000H
Страница 1: ...G 3000H 802 11g Wireless Access Point User s Guide Version 3 50 1 2006 ...
Страница 22: ...G 3000H User s Guide 22 List of Figures ...
Страница 26: ...G 3000H User s Guide 26 List of Tables ...
Страница 114: ...G 3000H User s Guide 114 Chapter 9 VLAN ...
Страница 134: ...G 3000H User s Guide 134 Chapter 11 Certificates ...
Страница 164: ...G 3000H User s Guide 164 Chapter 15 Introducing the SMT ...
Страница 180: ...G 3000H User s Guide 180 Chapter 17 LAN Setup ...
Страница 218: ...G 3000H User s Guide 218 Chapter 24 System Maintenance and Information ...
Страница 224: ...G 3000H User s Guide 224 Appendix C Power over Ethernet PoE Specifications ...
Страница 226: ...G 3000H User s Guide 226 Appendix D Brute Force Password Guessing Protection ...
Страница 238: ...G 3000H User s Guide 238 Appendix E Setting up Your Computer s IP Address ...
Страница 242: ...G 3000H User s Guide 242 Appendix F IP Address Assignment Conflicts ...
Страница 254: ...G 3000H User s Guide 254 Appendix G Wireless LANs ...
Страница 262: ...G 3000H User s Guide 262 Appendix H IP Subnetting ...
Страница 264: ...G 3000H User s Guide 264 Appendix I Command Interpreter ...
Страница 268: ...G 3000H User s Guide 268 Appendix J Log Descriptions ...
Страница 272: ...G 3000H User s Guide 272 Appendix L Power Adaptor Specifications ...
Страница 280: ...G 3000H User s Guide 280 Appendix M Text File Based Auto Configuration ...
Страница 294: ...G 3000H User s Guide 294 Appendix N Wireless LAN Manager ...
Страница 299: ...G 3000H User s Guide Index 299 ZyNOS F W Version 196 zyxel prowireless mib 287 ...