ZyXEL Communications NWA1100-N User Manual

Page of 250
 Chapter 8 Wireless Security Screen
NWA1100-N User’s Guide
87
• WPA2-PSK. This adds a pre-shared key on top of WPA2 standard.
• WPA2-PSK-MIX. This commands the NWA to use either WPA-PSK or WPA2-PSK depending on 
which security mode the wireless client uses.
Note: In Bridge/Repeater and AP+Bridge operating modes, the only available security 
modes are WEPWPA-PSK, and WPA2-PSK.
Note: To guarantee 802.11n wireless speed, please only use WPA2 or WPA2-PSK security 
mode. Other security modes may degrate the wireless speed performance to 
802.11g. 
Passphrase
A passphrase functions like a password. In WEP security mode, it is further converted by the NWA 
into a complicated string that is referred to as the “key”. This key is requested from all devices 
wishing to connect to a wireless network.
PSK
The Pre-Shared Key (PSK) is a password shared by a wireless access point and a client during a 
previous secure connection. The key can then be used to establish a connection between the two 
parties.
Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless 
network. Encryption is like a secret code. If you do not know the secret code, you cannot 
understand the message. Encryption is the process of converting data into unreadable text. This 
secures information in network communications. The intended recipient of the data can “unlock” it 
with a pre-assigned key, making the information readable only to him. The NWA when used as a 
wireless client employs Temporal Key Integrity Protocol (TKIP) data encryption.
EAP
Extensible Authentication Protocol (EAP) is a protocol used by a wireless client, an access point and 
an authentication server to negotiate a connection. 
The EAP methods employed by the NWA when in Wireless Client operating mode are Transport 
Layer Security (TLS), Protected Extensible Authentication Protocol (PEAP), Lightweight Extensible 
Authentication Protocol (LEAP) and Tunneled Transport Layer Security (TTLS). The authentication 
protocol may either be Microsoft Challenge Handshake Authentication Protocol Version 2 
(MSCHAPv2) or Generic Token Card (GTC).
Further information on these terms can be found in 
.    
8.4  The Security Screen
Use this screen to choose the security mode for your NWA.