ZyXEL Communications G-170S Benutzerhandbuch

Seite von 79
ZyXEL G-170S User’s Guide
40
Chapter 3 ZyXEL Utility Configuration
The following table describes the labels in this screen. 
3.2.2.4  IEEE 802.1x
Figure 18   Security Settings: 802.1x 
The following table describes the labels in this screen.  
Table 8   Security Settings: WPA-PSK/WPA2-PSK
LABEL
DESCRIPTION
Encryption Type
The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK are 
the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses 
a simple common password, instead of user-specific credentials.
Select the encryption type (TKIP or AES) for data encryption.
Refer to 
 for more information.
Pre-Shared Key
Type a pre-shared key (same as the AP or peer device) of between 8 and 63 case-
sensitive ASCII characters (including spaces and symbols).
Back
Click Back to go to the Site Survey screen to select and connect to other network.
Next
Click Next to confirm your selections and advance to the Confirm Save screen. 
Refer to 
Exit
Click Exit to return to the Site Survey screen without saving.
Table 9   Security Settings: 802.1x
LABEL
DESCRIPTION
Authentication 
Type
Select an authentication method from the drop down list. Options are TLS, TTLS 
and PEAP.
Login Name
Enter a user name. 
This is the user name that you or an administrator set up on a WPA/WPA2 server.
Password
This field is not available when you select TLS in the Authentication Type field. 
Enter the password associated with the user name above. 
Certificate
This field is only available when you select TLS in the Authentication Type field. 
Select a certificate used by the authentication server to authenticate the G-170S.
Note: You must first have a wired connection to a network and 
obtain the certificate(s) from a certificate authority (CA).