ZyXEL Communications ZyXEL G-560 사용자 설명서

다운로드
페이지 144
ZyXEL G-560 User’s Guide
Chapter 6 Wireless Screens
67
6.5.1  Encryption
• Use WPA(2) security if you have WP(2)A-aware wireless clients and a RADIUS server. 
WPA(2) has user authentication and improved data encryption over WEP.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A 
higher bit key offers better security at a throughput trade-off. You can use the passphrase 
feature to automatically generate WEP keys or manually enter WEP keys.
6.5.2  Authentication
Use a RADIUS server with WPA or IEEE 802.1x key management protocol. 
See the appendix for information on protocols used when a client authenticates with a 
RADIUS server via the G-560.
6.5.3  Restricted Access
The MAC Filter screen allows you to configure the AP to give exclusive access to devices 
(Allow Association) or exclude them from accessing the AP (Deny Association). 
6.5.4  Hide G-560 Identity
If you hide the ESSID, then the G-560 cannot be seen when a wireless client scans for local 
APs. The trade-off for the extra security of “hiding” the G-560 may be inconvenience for some 
valid WLAN clients. If you don’t hide the ESSID, at least you should change the default one.
6.6  WEP Overview
WEP (Wired Equivalent Privacy) as specified in the IEEE 802.11 standard provides methods 
for both data encryption and wireless station authentication. 
6.6.1  Data Encryption 
WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the 
wireless stations must use the same WEP key to encrypt and decrypt data. Your G-560 allows 
you to configure up to four 64-bit, 128-bit or 256-bit WEP keys, but only one key can be 
enabled at any one time. 
6.6.2  Authentication
Three different methods can be used to authenticate wireless stations to the network: Open 
System
Shared and Auto. The following figure illustrates the steps involved.