ZyXEL G-270S User Guide - Page 78
Security Parameters Summary
View all ZyXEL G-270S manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 78 highlights
ZyXEL G-270S User's Guide Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 28 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD ENTER MANUAL KEY Open None No Open Shared WPA WPA-PSK WPA2 WPA2-PSK WEP No Yes Yes WEP No Yes Yes TKIP No TKIP Yes AES No AES Yes IEEE 802.1X Disable Enable without Dynamic WEP Key Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable Enable Enable Enable Enable 78 Appendix D Types of EAP Authentication