ZyXEL NWA1123-NI User Guide - Page 90

Security Mode Guideline

Page 90 highlights

Chapter 6 Wireless LAN 6.10.2.1 WMM QoS Priorities The following table describes the WMM QoS priority levels that the NWA uses. Table 25 WMM QoS Priorities Priority Level description voice (WMM_VOICE) Typically used for traffic that is especially sensitive to jitter. Use this priority to reduce latency for improved voice quality. video (WMM_VIDEO) Typically used for traffic which has some tolerance for jitter but needs to be prioritized over other data traffic. best effort (WMM_BESTEFFORT) Typically used for traffic from applications or devices that lack QoS capabilities. Use best effort priority for traffic that is less sensitive to latency, but is affected by long delays, such as Internet surfing. background (WMM_BACKGROUND) This is typically used for non-critical traffic such as bulk transfers and print jobs that are allowed but that should not affect other applications and users. Use background priority for applications that do not have strict latency and throughput requirements. 6.10.3 Security Mode Guideline The following is a general guideline in choosing the security mode for your NWA. • Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server. • Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server. WPA has user authentication and improved data encryption over WEP. • Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server. • If you don't have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher bit key offers better security. You can manually enter 64-bit or 128-bit WEP keys. More information on Wireless Security can be found in Appendix E on page 187. 90 NWA1120 Series User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212

Chapter 6 Wireless LAN
NWA1120 Series User’s Guide
90
6.10.2.1
WMM QoS Priorities
The following table describes the WMM QoS priority levels that the NWA uses.
6.10.3
Security Mode Guideline
The following is a general guideline in choosing the security mode for your NWA.
Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server. WPA has
user authentication and improved data encryption over WEP.
Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher bit key
offers better security. You can manually enter 64-bit or 128-bit WEP keys.
More information on Wireless Security can be found in
Appendix E on page 187
.
Table 25
WMM QoS Priorities
Priority Level
description
voice
(WMM_VOICE)
Typically used for traffic that is especially sensitive to jitter. Use this priority to
reduce latency for improved voice quality.
video
(WMM_VIDEO)
Typically used for traffic which has some tolerance for jitter but needs to be
prioritized over other data traffic.
best effort
(WMM_BESTEFFORT)
Typically used for traffic from applications or devices that lack QoS capabilities. Use
best effort priority for traffic that is less sensitive to latency, but is affected by long
delays, such as Internet surfing.
background
(WMM_BACKGROUND)
This is typically used for non-critical traffic such as bulk transfers and print jobs
that are allowed but that should not affect other applications and users. Use
background priority for applications that do not have strict latency and throughput
requirements.