ZyXEL Communications Corporation G210H Manuel D’Utilisation

Page de 79
ZyXEL G-210H User’s Guide
Chapter 3 Wireless LAN Network
31
Wireless networks can use encryption to protect the information that is sent in the wireless 
network. Encryption is like a secret code. If you do not know the secret code, you cannot 
understand the message.
3.2.3.1  WEP
3.2.3.1.1  
Data Encryption 
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between 
the G-210H and the AP or other wireless stations to keep network communications private. 
Both the wireless stations and the access points must use the same WEP key for data 
encryption and decryption.
There are two ways to create WEP keys in your G-210H.
• Automatic WEP key generation based on a “password phrase” called a passphrase. The 
passphrase is case sensitive. You must use the same passphrase for all WLAN adapters 
with this feature in the same WLAN.
For WLAN adapters without the passphrase feature, you can still take advantage of this 
feature by writing down the four automatically generated WEP keys from the Security 
Settings
 screen of the ZyXEL utility and entering them manually as the WEP keys in the 
other WLAN adapter(s).
• Enter the WEP keys manually.
Your G-210H allows you to configure up to four 64-bit, 128-bit WEP keys and only one 
key is used as the default key at any one time.
3.2.3.1.2  Authentication Type 
The IEEE 802.11b/g standard describes a simple authentication method between the wireless 
stations and AP. Two authentication types are defined: Open and Shared.
•  Open mode is implemented for ease-of-use and when security is not an issue. The 
wireless station and the AP or peer computer do not share a secret key. Thus the wireless 
stations can associate with any AP or peer computer and listen to any transmitted data 
that is not encrypted.
•  Shared mode involves a shared secret key to authenticate the wireless station to the AP or 
peer computer. This requires you to enable the wireless LAN security and use same 
settings on both the wireless station and the AP or peer computer.
3.2.3.2  IEEE 802.1x 
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of 
wireless stations and encryption key management. Authentication can be done using an 
external RADIUS server.