ZyXEL P-870H-53A v2 User Guide - Page 306
Security Parameters Summary
View all ZyXEL P-870H-53A v2 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 306 highlights
Appendix D Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 202 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 109 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL Open ENCRYPTIO N METHOD ENTER MANUAL KEY IEEE 802.1X None No Disable Enable without Dynamic WEP Key Open WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable Shared WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable WPA TKIP/AES No Enable WPA-PSK WPA2 TKIP/AES Yes TKIP/AES No Disable Enable WPA2-PSK TKIP/AES Yes Disable 306 P-870H/HW Series User's Guide