beautypg.com

Security parameters summary, Figure 220 wpa(2)-psk authentication, Table 176 wireless security relational matrix – ZyXEL Communications 802.11g Wireless ADSL2+ 4-port VoIP IAD P-2602HWNLI User Manual

Page 405

background image

P-2602HWNLI User’s Guide

Appendix F Wireless LANs

405

Figure 220 WPA(2)-PSK Authentication

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each
Authentication Method/ key management protocol type. MAC address filters are not
dependent on how you configure these security features.

Table 176 Wireless Security Relational Matrix

AUTHENTICATION
METHOD/ KEY
MANAGEMENT PROTOCOL

ENCRYPTION
METHOD

ENTER
MANUAL KEY

IEEE 802.1X

Open

None

No

Disable

Enable without Dynamic WEP Key

Open

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP Key

Yes

Disable

Shared

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP Key

Yes

Disable

WPA

TKIP/AES

No

Enable

WPA-PSK

TKIP/AES

Yes

Disable

WPA2

TKIP/AES

No

Enable

WPA2-PSK

TKIP/AES

Yes

Disable