beautypg.com

2 wpa(2) with radius application example, Figure 95 wpa(2)-psk authentication, Table 62 wireless security relational matrix – ZyXEL Communications NBG-415N User Manual

Page 138: Security parameters summary

background image

ZyXEL NBG-415N User’s Guide

Appendix B Wireless LANs

138

Figure 95 WPA(2)-PSK Authentication

10.6.2 WPA(2) with RADIUS Application Example

You need the IP address of the RADIUS server, its port number (default is 1812), and the
RADIUS shared secret. A WPA(2) application example with an external RADIUS server
looks as follows. "A" is the RADIUS server. "DS" is the distribution system.

1 The AP passes the wireless client's authentication request to the RADIUS server.

2 The RADIUS server then checks the user's identification against its database and grants

or denies network access accordingly.

3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then

sets up a key hierarchy and management system, using the pair-wise key to dynamically
generate unique data encryption keys to encrypt every data packet that is wirelessly
communicated between the AP and the wireless clients.

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each
Authentication Method/ key management protocol type. MAC address filters are not
dependent on how you configure these security features.

Table 62 Wireless Security Relational Matrix

AUTHENTICATION
METHOD/ KEY
MANAGEMENT PROTOCOL

ENCRYPTION
METHOD

ENTER
MANUAL KEY

IEEE 802.1X

Open

None

No

Disable

Enable without Dynamic WEP Key

Open

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP Key

Yes

Disable