ZyXEL 336M 91-003-192BUN2 Benutzerhandbuch

Produktcode
91-003-192BUN2
Seite von 103
ZyXEL P-336M User’s Guide
37
Chapter 3 Basic
TKIP regularly changes and rotates the encryption keys so that the same encryption key is 
never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP 
that then sets up a key hierarchy and management system, using the pair-wise key to 
dynamically generate unique data encryption keys to encrypt every data packet that is 
wirelessly communicated between the AP and the wireless clients. This all happens in the 
background automatically.
AES (Advanced Encryption Standard) is a newer method of data encryption that also uses a 
secret key. This implementation of AES applies a 128-bit key to 128-bit blocks of data.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data 
packets, altering them and resending them. The MIC provides a strong mathematical function 
in which the receiver and the transmitter each compute and then compare the MIC. If they do 
not match, it is assumed that the data has been tampered with and the packet is dropped. 
By generating unique data encryption keys for every data packet and by creating an integrity 
checking mechanism (MIC), TKIP makes it much more difficult to decode data on a Wi-Fi 
network than WEP, making it difficult for an intruder to break into the network. 
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only 
difference between the two is that WPA(2)-PSK uses a simple common password, instead of 
user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to 
brute-force password-guessing attacks but it's still an improvement over WEP as it employs an 
easier-to-use, consistent, single, alphanumeric password.
3.8  WLAN Security Setup 
Configure wireless LAN security settings in the Wireless screen. Click Basic > Wireless to 
display the configuration screen. This screen varies depending on the option you select in the 
Security Mode field. 
Figure 12   Basic: Wireless: WLAN Security Setup 
3.8.1  WLAN Security Setup: WEP
To configure basic WEP key encryption, select WEP in the Security Mode field in the 
Wireless screen.