ZyXEL NBG6615 User Guide - Page 195
Security Parameters Summary, Antenna Overview, AUTHENTICATION METHOD, KEY MANAGEMENT
View all ZyXEL NBG6615 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 195 highlights
Appendix D Wireless LANs Figure 128 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 64 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD Open None Open WEP Shared WEP WPA WPA-PSK WPA2 WPA2-PSK TKIP/AES TKIP/AES TKIP/AES TKIP/AES ENTER MANUAL KEY No No Yes Yes No Yes Yes No Yes No Yes IEEE 802.1X Disable Enable without Dynamic WEP Key Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable Enable Disable Enable Disable Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. NBG6615's User's Guide 195