ZyXEL Communications Corporation G570S Manual De Usuario

Descargar
Página de 82
ZyXEL G-570S User’s Guide
Chapter 6 Wireless Screens
81
6.13  Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each 
authentication method/ key management protocol type. You enter manual keys by first 
selecting 64-bit WEP128-bit WEP or 152-bit WEP from the WEP Encryption field and 
then typing the keys (in ASCII or hexadecimal format) in the key text boxes. MAC address 
filters are not dependent on how you configure these security features.
6.14  Wireless Client WPA Supplicants
A wireless client supplicant is the software that runs on an operating system instructing the 
wireless client how to use WPA. At the time of writing, the most widely available supplicants 
are the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data 
Communications' AEGIS client.  
The Windows XP patch is a free download that adds WPA capability to Windows XP's built-
in "Zero Configuration" wireless client. However, you must run Windows XP to use it.  
6.15  Configuring Wireless Security 
In order to configure and enable wireless security; click SETTINGS > WIRELESS > 
Security
 to display the Security screen. This screen varies according to the encryption method 
you select. 
Table 16   Wireless Security Relational Matrix
AUTHENTICATION
METHOD/ KEY 
MANAGEMENT
PROTOCOL
ENCRYPTION
METHOD
ENTER MANUAL 
KEY
IEEE 802.1X
Open 
None
No
Disable
Open
WEP
No          
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
Shared
WEP
No          
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
WPA 
TKIP
No
Enable
WPA-PSK 
TKIP
Yes
Enable
WPA2
AES
No
Enable
WPA2-PSK 
AES
Yes
Enable