beautypg.com

Wireless lan, 2 wireless security overview, 1 encryption – ZyXEL Communications ADSL 2+ Gateway P-660HW-T1 User Manual

Page 70: 2 authentication, Chapter 5 wireless lan, 1 encryption 5.2.2 authentication

background image

P-660H/HW/W-T Series User’ Guide

Chapter 5 Wireless LAN

70

C

H A P T E R

5

Wireless LAN

This chapter discusses how to configure the Wireless LAN screens for P-660HW or P-660W.

5.1 Wireless LAN Introduction

A wireless LAN can be as simple as two computers with wireless LAN adapters
communicating in a peer-to-peer network or as complex as a number of computers with
wireless LAN adapters communicating through access points which bridge network traffic to
the wired LAN.

Refer to

Section 5.3 on page 71

to configure wireless LAN settings.

Note: See the WLAN appendix for more detailed information on WLANs.

5.2 Wireless Security Overview

Wireless security is vital to your network to protect wireless communication between wireless
stations, access points and the wired network.

Wireless security methods available on the Prestige are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the Prestige identity.

5.2.1 Encryption

• Use WPA security if you have WPA-aware wireless clients and a RADIUS server. WPA

has user authentication and improved data encryption over WEP.

• Use WPA-PSK if you have WPA-aware wireless clients but no RADIUS server.
• If you don’t have WPA-aware wireless clients, then use WEP key encrypting. A higher

bit key offers better security at a throughput trade-off. You can use Passphrase to
automatically generate 64-bit or 128-bit WEP keys or manually enter 64-bit, 128-bit or
256-bit WEP keys.

5.2.2 Authentication

WPA has user authentication and you can also configure IEEE 802.1x to use the built-in
database (Local User Database) or a RADIUS server to authenticate wireless clients before
joining your network.