ZyXEL P-660HW-D1 Guia Do Utilizador

Página de 460
Prestige 660H/HW Series User’s Guide
Chapter 7 Wireless LAN (Prestige 660HW)
82
C
H A P T E R
 7
Wireless LAN (Prestige 660HW)
This chapter discusses how to configure Wireless LAN.
7.1  Introduction
A wireless LAN can be as simple as two computers with wireless LAN adapters 
communicating in a peer-to-peer network or as complex as a number of computers with 
wireless LAN adapters communicating through access points which bridge network traffic to 
the wired LAN. 
Note: See the WLAN appendix for more detailed information on WLANs.
7.2  Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless 
stations, access points and the wired network.
Wireless security methods available on the Prestige are data encryption, wireless client 
authentication, restricting access by device MAC address and hiding the Prestige identity.
7.2.1  Encryption
• Use WPA security if you have WPA-aware wireless clients and a RADIUS server. WPA 
has user authentication and improved data encryption over WEP.
• Use WPA-PSK if you have WPA-aware wireless clients but no RADIUS server.
• If you don’t have WPA-aware wireless clients, then use WEP key encrypting. A higher 
bit key offers better security at a throughput trade-off. You can use Passphrase to 
automatically generate 64-bit or 128-bit WEP keys or manually enter 64-bit, 128-bit or 
256-bit WEP keys.
7.2.2  Authentication
WPA has user authentication and you can also configure IEEE 802.1x to use the built-in 
database (Local User Database) or a RADIUS server to authenticate wireless clients before 
joining your network. 
• Use RADIUS authentication if you have a RADIUS server. See the appendices for 
information on protocols used when a client authenticates with a RADIUS server via the 
Prestige.