ZyXEL V630 User Guide - Page 118

Wireless Security Overview, 11.2.1 SSID, WPA2-PSK, Compatible

Page 118 highlights

Chapter 11 WLAN Profile • Every wireless client in the same wireless network must use security compatible with the AP. Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. 11.2 Wireless Security Overview The following table shows the relative strengths of common types of wireless security. Use the strongest security that every wireless client in the wireless network supports. Table 97 Wireless Security Types NO RADIUS SERVER RADIUS SERVER Weakest No Security Static WEP WPA-PSK WPA Strongest WPA2-PSK WPA2 If you have a RADIUS server, you can use WPA or WPA2 so users have to log into the wireless network before using it. This is called user authentication. RADIUS servers are more common in businesses (WPA and WPA2 are also called the enterprise version of WPA). If you do not have a RADIUS server, the strongest wireless security you can use is WPA2PSK (WPA2-PSK and WPA-PSK are also known as the personal version of WPA).  It is recommended that wireless networks use WPA-PSK, WPA, or stronger security. WEP is better than no security, but it is still possible for unauthorized devices to figure out the original information pretty quickly. When you select WPA2 or WPA2-PSK in your V630, you can also select an option (WPA Compatible) to support WPA as well. In this case, if some wireless clients support WPA and some support WPA2, you should set up WPA2-PSK or WPA2 (depending on the type of wireless network login) and select the WPA Compatible option in the V630. 11.2.1 SSID Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess. This type of security is fairly weak, however, because there are ways for unauthorized devices to get the SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network. 118 V630 User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220

Chapter 11 WLAN Profile
V630 User’s Guide
118
Every wireless client in the same wireless network must use security compatible with the
AP.
Security stops unauthorized devices from using the wireless network. It can also protect
the information that is sent in the wireless network.
11.2
Wireless Security Overview
The following table shows the relative strengths of common types of wireless security. Use the
strongest security that every wireless client in the wireless network supports.
If you have a RADIUS server, you can use WPA or WPA2 so users have to log into the
wireless network before using it. This is called user authentication. RADIUS servers are more
common in businesses (WPA and WPA2 are also called the enterprise version of WPA).
If you do not have a RADIUS server, the strongest wireless security you can use is WPA2-
PSK (WPA2-PSK and WPA-PSK are also known as the personal version of WPA).
It is recommended that wireless networks use WPA-PSK, WPA, or stronger
security. WEP is better than no security, but it is still possible for unauthorized
devices to figure out the original information pretty quickly.
When you select
WPA2
or
WPA2-PSK
in your V630, you can also select an option (
WPA
Compatible
) to support WPA as well. In this case, if some wireless clients support WPA and
some support WPA2, you should set up
WPA2-PSK
or
WPA2
(depending on the type of
wireless network login) and select the
WPA Compatible
option in the V630.
11.2.1
SSID
Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can
hide the SSID instead, in which case the AP does not broadcast the SSID. In addition, you
should change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized devices
to get the SSID. In addition, unauthorized devices can still see the information that is sent in
the wireless network.
Table 97
Wireless Security Types
NO RADIUS SERVER
RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2