ZyXEL WX3310-B0 User Guide - Page 66

WiFi Protected Setup (WPS)

Page 66 highlights

Chapter 10 Wireless LAN Use long preamble if you are unsure what preamble mode other wireless devices on the network support, and to provide more reliable communications in busy wireless networks. Use short preamble if you are sure all wireless devices on the network support it, and to provide more efficient communications. Use the dynamic setting to automatically use short preamble when all wireless devices on the network support it, otherwise the Zyxel Device uses long preamble. Note: The wireless devices MUST use the same preamble mode in order to communicate. 10.9.3 WiFi Protected Setup (WPS) Your Zyxel Device supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Each WPS connection works between two devices. Both devices must support WPS (check each device's documentation to make sure). Depending on the devices you have, you can either press a button (on the device itself, or in its configuration utility) or enter a PIN (a unique Personal Identification Number that allows one device to authenticate the other) in each of the two devices. When WPS is activated on a device, it has two minutes to find another device that also has WPS activated. Then, the two devices connect and set up a secure network by themselves. This section gives you an example of how to set up wireless networks using WPS when the WX3310 is in AP or Repeater mode. The following example uses the WX3310 as the AP and a WPS-enabled Android smartphone as the wireless client. The following WPS methods for creating a secure connection are described in the tutorial. • Push Button Configuration (PBC) - create a secure wireless network simply by pressing a button. See Section 10.9.3.2 on page 67.This is the easier method. • PIN Configuration - create a secure wireless network simply by entering a wireless client's PIN (Personal Identification Number) in the WX3310's interface. See Section 10.9.3.3 on page 68. This is the more secure method, since one device can authenticate the other. 10.9.3.1 Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 21 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD Open None Open WEP ENTER MANUAL KEY No No Yes Yes IEEE 802.1X Disable Enable without Dynamic WEP Key Enable with Dynamic WEP Key Enable without Dynamic WEP Key Disable WX3310-B0 User's Guide 66

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

Chapter 10 Wireless LAN
WX3310-B0 User’s Guide
66
Use long preamble if you are unsure what preamble mode other wireless devices on the network
support, and to provide more reliable communications in busy wireless networks.
Use short preamble if you are sure all wireless devices on the network support it, and to provide more
efficient communications.
Use the dynamic setting to automatically use short preamble when all wireless devices on the network
support it, otherwise the Zyxel Device uses long preamble.
Note: The wireless devices MUST use the same preamble mode in order to communicate.
10.9.3
WiFi Protected Setup (WPS)
Your Zyxel Device supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless
network. WPS is an industry standard specification, defined by the WiFi Alliance.
WPS allows you to quickly set up a wireless network with strong security, without having to configure
security settings manually. Each WPS connection works between two devices. Both devices must
support WPS (check each device’s documentation to make sure).
Depending on the devices you have, you can either press a button (on the device itself, or in its
configuration utility) or enter a PIN (a unique Personal Identification Number that allows one device to
authenticate the other) in each of the two devices. When WPS is activated on a device, it has two
minutes to find another device that also has WPS activated. Then, the two devices connect and set up
a secure network by themselves.
This section gives you an example of how to set up wireless networks using WPS when the WX3310 is in AP
or Repeater mode. The following example uses the WX3310 as the AP and a WPS-enabled Android
smartphone as the wireless client.
The following WPS methods for creating a secure connection are described in the tutorial.
Push Button Configuration (PBC)
- create a secure wireless network simply by pressing a button. See
Section 10.9.3.2 on page 67
.This is the easier method.
PIN Configuration
- create a secure wireless network simply by entering a wireless client's PIN (Personal
Identification Number) in the WX3310’s interface. See
Section 10.9.3.3 on page 68
. This is the more
secure method, since one device can authenticate the other.
10.9.3.1
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each authentication
method or key management protocol type. MAC address filters are not dependent on how you
configure these security features.
Table 21
Wireless Security Relational Matrix
AUTHENTICATION METHOD/
KEY MANAGEMENT
PROTOCOL
ENCRYPTION
METHOD
ENTER MANUAL
KEY
IEEE 802.1X
Open
None
No
Disable
Enable without Dynamic WEP Key
Open
WEP
No
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable