ZyXEL Communications G-570S User Manual

Page of 162
ZyXEL G-570S User’s Guide
Chapter 1 Getting to Know Your G-570S
23
WPA2
WPA 2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, 
authentication and key management than WPA.
SSL Passthrough
The G-570S allows SSL connections to go through the G-570S.  SSL (Secure Sockets Layer) 
uses a public key to encrypt data that's transmitted over an SSL connection. Both Netscape 
Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain 
confidential user information, such as credit card numbers. By convention, URLs that require 
an SSL connection start with "https" instead of "http". 
Wireless LAN MAC Address Filtering
Your G-570S checks the MAC address of the wireless station against a list of allowed or 
denied MAC addresses.
WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless 
network to help keep network communications private.
IEEE 802.1x Network Security
The G-570S supports the IEEE 802.1x standard to enhance user authentication. Use the built-
in user profile database to authenticate up to 32 users using MD5 encryption. Use an EAP-
compatible RADIUS (RFC2138, 2139 - Remote Authentication Dial In User Service) server 
to authenticate a limitless number of users using EAP (Extensible Authentication Protocol). 
EAP is an authentication protocol that supports multiple types of authentication.
Full Network Management 
The embedded web configurator is an all-platform web-based utility that allows you to easily 
access the G-570S's management settings. 
Logging and Tracing
Built-in message logging and packet tracing.
Wireless Association List 
With the wireless association list, you can see the list of the wireless stations that are currently 
using the G-570S to access your wired network. When the G-570S is in client mode, the 
wireless association list displays a list of wireless devices and networks in the area.