ZyXEL MWR102 User Guide - Page 38

Table 6, WPA-Personal/Enterprise - client setup

Page 38 highlights

Table 6 Types of Encryption for Each Type of Authentication NO AUTHENTICATION Weakest No Security Strongest WEP WPA-Personal (TKIP) WPA-Enterprise WPA2-Personal (AES) WPA2-Enterprise Usually, you should set up the strongest encryption that every wireless client in the wireless network supports. Suppose the wireless network has two wireless clients. Device A only supports WEP, and device B supports WEP and WPA-PSK. Therefore, you should set up WEP in the wireless network. Note: It is recommended that wireless networks use WPA-Personal/Enterprise or stronger encryption. IEEE 802.1x and WEP encryption are better than none at all, but it is still possible for unauthorized devices to figure out the original information pretty quickly. Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every wireless client in the wireless network must have the same key. 7.3.1.4 WPS Wi-Fi Protected Setup (WPS) is an industry standard specification, defined by the Wi-Fi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Depending on the devices in your network, you can either press a button (on the device itself or in its configuration utility) or enter a PIN (Personal Identification Number) in the devices. Then, they connect and set up a secure network by themselves. 38

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183

38
Table 6
Types of Encryption for
Each Type of Authentication
NO AUTHENTICATION
Weakest
No Security
WEP
WPA-Personal (TKIP)
WPA-Enterprise
Strongest
WPA2-Personal (AES)
WPA2-Enterprise
Usually, you should set up the strongest encryption that every wireless client in the wireless
network supports. Suppose the wireless network has two wireless clients. Device A only supports
WEP, and device B supports WEP and WPA-PSK. Therefore, you should set up
WEP
in the
wireless network.
Note: It is recommended that wireless networks use
WPA-Personal/Enterprise
or
stronger encryption. IEEE 802.1x and WEP encryption are better than none at all, but it
is still possible for unauthorized devices to figure out the original information pretty
quickly.
Many types of encryption use a key to protect the information in the wireless network. The longer
the key, the stronger the encryption. Every wireless client in the wireless network must have the
same key.
7.3.1.4
WPS
Wi-Fi Protected Setup (WPS) is an industry standard specification, defined by the Wi-Fi Alliance.
WPS allows you to quickly set up a wireless network with strong security, without having to
configure security settings manually. Depending on the devices in your network, you can either
press a button (on the device itself or in its configuration utility) or enter a PIN (Personal
Identification Number) in the devices. Then, they connect and set up a secure network by
themselves.