ZyXEL N220 User Guide - Page 50

Before You Begin, 4.2 ZyXEL Utility Screen Summary

Page 50 highlights

Chapter 4 Station Mode Message Integrity Check (MIC) and IEEE 802.1x. WPA uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. The WPA protocol affords users with vastly stronger security than the WEP protocol. It comes in two different varieties: WPA and WPA2. Always try to use WPA2 as it implements the full version of the security standard while WPA does not. Pre-Shared Key (PSK) A pre-shared key is a password shared between the server and the client that unlocks the algorithm used to encrypt the data traffic between them. Without the proper password, the client and the server cannot communicate. Extensible Authentication Protocol (EAP) An enhanced security framework designed to improve an existing security protocol, such as WPA-PSK or WPA2-PSK. 4.1.3 Before You Begin • Make sure the ZyXEL utility is already installed. See the Quick Start Guide for more. 4.2 ZyXEL Utility Screen Summary This section describes the ZyXEL utility screens. Figure 28 ZyXEL Utility Menu Summary The following table describes the menus. Table 4 ZyXEL Utility Menu Summary TAB DESCRIPTION Link Info Use this screen to see your current connection status, configuration and data rate statistics. Site Survey Use this screen to: • scan for a wireless network. • configure wireless security (if activated on the selected network). • connect to a wireless network. 50 N220 User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187

Chapter 4 Station Mode
N220 User’s Guide
50
Message Integrity Check (MIC) and IEEE 802.1x. WPA uses Advanced Encryption
Standard (AES) in the Counter mode with Cipher block chaining Message
authentication code Protocol (CCMP) to offer stronger encryption than TKIP. WPA
applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate
wireless clients using an external RADIUS database. The WPA protocol affords
users with vastly stronger security than the WEP protocol. It comes in two
different varieties: WPA and WPA2. Always try to use WPA2 as it implements the
full version of the security standard while WPA does not.
Pre-Shared Key (PSK)
A pre-shared key is a password shared between the server and the client that
unlocks the algorithm used to encrypt the data traffic between them. Without the
proper password, the client and the server cannot communicate.
Extensible Authentication Protocol (EAP)
An enhanced security framework designed to improve an existing security
protocol, such as WPA-PSK or WPA2-PSK.
4.1.3
Before You Begin
Make sure the ZyXEL utility is already installed. See the Quick Start Guide for
more.
4.2
ZyXEL Utility Screen Summary
This section describes the ZyXEL utility screens.
Figure 28
ZyXEL Utility Menu Summary
The following table describes the menus.
Table 4
ZyXEL Utility Menu Summary
TAB
DESCRIPTION
Link Info
Use this screen to see your current connection status, configuration and
data rate statistics.
Site Survey
Use this screen to:
scan for a wireless network.
configure wireless security (if activated on the selected network).
connect to a wireless network.