ZyXEL NWD2105 User Guide - Page 34

Wireless LAN Security, 3.3.1 User Authentication and Encryption

Page 34 highlights

Chapter 3 Wireless LANs 3.3 Wireless LAN Security Wireless LAN security is vital to your network to protect wireless communications. If you do not enable any wireless security on your NWD2105, the NWD2105's wireless communications are accessible to any wireless networking device that is in the coverage area. Note: You can use only WEP encryption if you set the NWD2105 to Ad-hoc mode. See the appendices for more detailed information about wireless security. 3.3.1 User Authentication and Encryption You can make every user log in to the wireless network before they can use it. This is called user authentication. However, every wireless client in the wireless network has to support IEEE 802.1x to do this. Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. 3.3.1.1 WEP 3.3.1.1.1 Data Encryption WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the NWD2105 and the AP or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption. There are two ways to create WEP keys in your NWD2105. • Automatic WEP key generation based on a "password phrase" called a passphrase. The passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the same WLAN. For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Settings screen of the ZyXEL utility and entering them manually as the WEP keys in the other WLAN adapter(s). • Enter the WEP keys manually. Your NWD2105 allows you to configure up to four 64-bit or 128-bit WEP keys. Only one key is used as the default key at any one time. 3.3.1.1.2 Authentication Type The IEEE 802.11b/g standard describes a simple authentication method between the wireless stations and AP. Three authentication types are defined: Auto, Open and Shared. • Open mode is implemented for ease-of-use and when security is not an issue. The wireless station and the AP or peer computer do not share a secret key. Thus the wireless stations can associate with any AP or peer computer and listen to any transmitted data that is not encrypted. 34 NWD2105 User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

Chapter 3 Wireless LANs
NWD2105 User’s Guide
34
3.3
Wireless LAN Security
Wireless LAN security is vital to your network to protect wireless communications.
If you do not enable any wireless security on your NWD2105, the NWD2105’s wireless
communications are accessible to any wireless networking device that is in the coverage area.
Note: You can use only WEP encryption if you set the NWD2105 to Ad-hoc mode.
See the appendices for more detailed information about wireless security.
3.3.1
User Authentication and Encryption
You can make every user log in to the wireless network before they can use it. This is called user
authentication. However, every wireless client in the wireless network has to support IEEE 802.1x
to do this.
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
3.3.1.1
WEP
3.3.1.1.1
Data Encryption
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the
NWD2105 and the AP or other wireless stations to keep network communications private. Both the
wireless stations and the access points must use the same WEP key for data encryption and
decryption.
There are two ways to create WEP keys in your NWD2105.
Automatic WEP key generation based on a “password phrase” called a passphrase. The
passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this
feature in the same WLAN.
For WLAN adapters without the passphrase feature, you can still take advantage of this feature
by writing down the four automatically generated WEP keys from the
Security Settings
screen
of the ZyXEL utility and entering them manually as the WEP keys in the other WLAN adapter(s).
Enter the WEP keys manually.
Your NWD2105 allows you to configure up to four 64-bit or 128-bit WEP keys. Only one key is
used as the default key at any one time.
3.3.1.1.2
Authentication Type
The IEEE 802.11b/g standard describes a simple authentication method between the wireless
stations and AP. Three authentication types are defined:
Auto
,
Open
and
Shared
.
Open
mode is implemented for ease-of-use and when security is not an issue. The wireless
station and the AP or peer computer do not share a secret key. Thus the wireless stations can
associate with any AP or peer computer and listen to any transmitted data that is not encrypted.