ZyXEL Communications G-470 User Manual

Page of 110
G-470 User’s Guide
32
Chapter 3 Wireless LAN Network
• Every device in the same wireless network must use security compatible with the AP or 
peer computer.
Security stops unauthorized devices from using the wireless network. It can also protect 
the information that is sent in the wireless network.
3.2  Wireless LAN Security 
Wireless LAN security is vital to your network to protect wireless communications.
If you do not enable any wireless security on your ZyXEL Device, the ZyXEL Device’s 
wireless communications are accessible to any wireless networking device that is in the 
coverage area. See 
 for more information on configuring wireless 
security for your device.
3.2.1  User Authentication and Encryption
User authentication is when every user must log in to the wireless network before they can use 
it. However, every wireless client in the wireless network has to support IEEE 802.1x to do 
this.
Wireless networks can use encryption to protect the information that is sent in the wireless 
network. Encryption is like a secret code. If you do not know the secret code, you cannot 
understand the message.
3.2.1.1  Certificates
Your ZyXEL Device can use certificates (also called digital IDs) for user authentication. 
Certificates are based on public-private key pairs. A certificate contains the certificate owner’s 
identity and public key. Certificates provide a way to exchange public keys for use in 
authentication. 
A Certification Authority (CA) issues certificates and guarantees the identity of each 
certificate owner. There are commercial certification authorities like CyberTrust or VeriSign 
and government certification authorities.
In public-key encryption and decryption, each host has two keys. One key is public and can be 
made openly available; the other key is private and must be kept secure. Public-key encryption 
in general works as follows. 
Tim wants to send a private message to Jenny. Tim generates a public key pair. What is 
encrypted with one key can only be decrypted using the other.
Tim keeps the private key and makes the public key openly available.
Tim uses his private key to encrypt the message and sends it to Jenny.
Jenny receives the message and uses Tim’s public key to decrypt it.