beautypg.com

1 encryption, 2 authentication, 1 encryption 9.6.2 authentication – ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual

Page 179: Figure 76 zywall wireless security levels

background image

ZyWALL 5/35/70 Series User’s Guide

179

Chapter 9 Wireless LAN

Figure 76 ZyWALL Wireless Security Levels

If you do not enable any wireless security on your ZyWALL, your network is accessible to any
wireless networking device that is within range.

Use the ZyWALL web configurator to set up your wireless LAN security settings. Refer to the
chapter on using the ZyWALL web configurator to see how to access the web configurator.

9.6.1 Encryption

• Use WPA security if you have WPA-aware wireless clients and a RADIUS server. WPA

has user authentication and improved data encryption over WEP.

• Use WPA-PSK if you have WPA-aware wireless clients but no RADIUS server.
• If you don’t have WPA-aware wireless clients, then use WEP key encrypting. A higher

bit key offers better security at a throughput trade-off. You can use Passphrase to
automatically generate 64-bit or 128-bit WEP keys or manually enter 64-bit, 128-bit or
256-bit WEP keys.

9.6.2 Authentication

Use a RADIUS server with WPA or IEEE 802.1x key management protocol. You can also
configure IEEE 802.1x to use the built-in database (Local User Database) to authenticate
wireless clients before joining your network.

• Use RADIUS authentication if you have a RADIUS server. See the appendices for

information on protocols used when a client authenticates with a RADIUS server via the
ZyWALL.

• Use the Local User Database if you have less than 32 wireless clients in your network.

The ZyWALL uses MD5 encryption when a client authenticates with the Local User
Database