ZyXEL Communications Corporation G120 Manuel D’Utilisation
ZyXEL G-120 User’s Guide
32
Chapter 3 Wireless LAN Network
• Every device in the same wireless network must use security compatible with the AP or
peer computer.
Security stops unauthorized devices from using the wireless network. It can also protect
the information that is sent in the wireless network.
the information that is sent in the wireless network.
3.2 Wireless LAN Security
Wireless LAN security is vital to your network to protect wireless communications.
Configure the wireless LAN security using the Profile Security Setting screen. If you do not
enable any wireless security on your G-120, the G-120’s wireless communications are
accessible to any wireless networking device that is in the coverage area.
enable any wireless security on your G-120, the G-120’s wireless communications are
accessible to any wireless networking device that is in the coverage area.
Note: You can only use WEP encryption if you set the G-120 to Ad-hoc mode.
See the appendices for more detailed information about wireless security.
This type of security does not protect the information that is sent in the wireless network.
Furthermore, there are ways for unauthorized wireless devices to get the MAC address of an
authorized device. Then, they can use that MAC address to use the wireless network.
Furthermore, there are ways for unauthorized wireless devices to get the MAC address of an
authorized device. Then, they can use that MAC address to use the wireless network.
3.2.1 User Authentication and Encryption
You can make every user log in to the wireless network before they can use it. This is called
user authentication. However, every wireless client in the wireless network has to support
IEEE 802.1x to do this.
user authentication. However, every wireless client in the wireless network has to support
IEEE 802.1x to do this.
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
3.2.1.1 WEP
3.2.1.1.1 Data Encryption
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between
the G-120 and the AP or other wireless stations to keep network communications private. Both
the wireless stations and the access points must use the same WEP key for data encryption and
decryption.
the G-120 and the AP or other wireless stations to keep network communications private. Both
the wireless stations and the access points must use the same WEP key for data encryption and
decryption.
There are two ways to create WEP keys in your G-120.
• Automatic WEP key generation based on a “password phrase” called a passphrase. The
passphrase is case sensitive. You must use the same passphrase for all WLAN adapters
with this feature in the same WLAN.
with this feature in the same WLAN.