ZyXEL G-320H User Guide - Page 35

User Authentication and Encryption, Security, Setting, Configuration, Open System, Shared, Shared Key

Page 35 highlights

Chapter 3 Wireless LAN Network 3.2.3 User Authentication and Encryption You can make every user log in to the wireless network before they can use it. This is called user authentication. However, every wireless client in the wireless network has to support IEEE 802.1x to do this. Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. 3.2.3.1 WEP 3.2.3.1.1 Data Encryption WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the G-320H and the AP or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption. There are two ways to create WEP keys in your G-320H. • Automatic WEP key generation based on a "password phrase" called a passphrase. The passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the same WLAN. For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Setting or the Configuration screen of the ZyXEL utility and entering them manually as the WEP keys in the other WLAN adapter(s). • Enter the WEP keys manually. Your G-320H allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys and only one key is used as the default key at any one time. 3.2.3.1.2 Authentication Type The IEEE 802.11 b/g standard describes a simple authentication method between the wireless stations and AP. Three authentication types are defined: Auto, Open System and Shared Key. • Open System mode is implemented for ease-of-use and when security is not an issue. The wireless station and the AP or peer computer do not share a secret key. Thus the wireless stations can associate with any AP or peer computer and listen to any transmitted data that is not encrypted. • Shared Key mode involves a shared secret key to authenticate the wireless station to the AP or peer computer. This requires you to enable the wireless LAN security and use same settings on both the wireless station and the AP or peer computer. • Auto authentication mode allows the G-320H to switch between the open system and shared key modes automatically. Use the auto mode if you do not know the authentication mode of the other wireless stations. 3.2.3.2 IEEE 802.1x The IEEE 802.1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management. Authentication can be done using an external RADIUS server. G-320H User's Guide 35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120

Chapter 3 Wireless LAN Network
G-320H User’s Guide
35
3.2.3
User Authentication and Encryption
You can make every user log in to the wireless network before they can use it. This is called
user authentication. However, every wireless client in the wireless network has to support
IEEE 802.1x to do this.
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
3.2.3.1
WEP
3.2.3.1.1
Data Encryption
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between
the G-320H and the AP or other wireless stations to keep network communications private.
Both the wireless stations and the access points must use the same WEP key for data
encryption and decryption.
There are two ways to create WEP keys in your G-320H.
Automatic WEP key generation based on a “password phrase” called a passphrase. The
passphrase is case sensitive. You must use the same passphrase for all WLAN adapters
with this feature in the same WLAN.
For WLAN adapters without the passphrase feature, you can still take advantage of this
feature by writing down the four automatically generated WEP keys from the
Security
Setting
or the
Configuration
screen of the ZyXEL utility and entering them manually as
the WEP keys in the other WLAN adapter(s).
Enter the WEP keys manually.
Your G-320H allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys and
only one key is used as the default key at any one time.
3.2.3.1.2
Authentication Type
The IEEE 802.11 b/g standard describes a simple authentication method between the wireless
stations and AP. Three authentication types are defined:
Auto
,
Open System
and
Shared
Key
.
Open System
mode is implemented for ease-of-use and when security is not an issue.
The wireless station and the AP or peer computer do not share a secret key. Thus the
wireless stations can associate with any AP or peer computer and listen to any transmitted
data that is not encrypted.
Shared Key
mode involves a shared secret key to authenticate the wireless station to the
AP or peer computer. This requires you to enable the wireless LAN security and use same
settings on both the wireless station and the AP or peer computer.
Auto
authentication mode allows the G-320H to switch between the open system and
shared key modes automatically. Use the auto mode if you do not know the authentication
mode of the other wireless stations.
3.2.3.2
IEEE 802.1x
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management. Authentication can be done using an
external RADIUS server.