Инструкция для ZYXEL NWA1100-N

(скачивание инструкции бесплатно)
Формат файла: PDF
Доступность: Бесплатно как и все руководства на сайте. Без регистрации и SMS.
Дополнительно: Чтение инструкции онлайн
background image

Chapter 7 Wireless Security Screen

NWA1100-N User’s Guide

72

7.3  What You Need To Know 

User Authentication

Authentication is the process of verifying whether a wireless device is allowed to use the wireless 
network. You can make every user log in to the wireless network before they can use it. However, 
every device in the wireless network has to support IEEE 802.1x to do this.

For wireless networks, you can store the user names and passwords for each user in a RADIUS 
server. This is a server used in businesses more than in homes. If you do not have a RADIUS server, 
you cannot set up user names and passwords for your users.

Unauthorized wireless devices can still see the information that is sent in the wireless network, 
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized 
wireless users to get a valid user name and password. Then, they can use that user name and 
password to use the wireless network.

The following table shows the relative effectiveness of wireless security methods:.

The available security modes in your NWA are as follows:

None.

 No data encryption.

WEP. 

Wired Equivalent Privacy (WEP) encryption scrambles the data transmitted between the 

wireless stations and the access points to keep network communications private.

802.1x-Only.

 This is a standard that extends the features of IEEE 802.11 to support extended 

authentication. It provides additional accounting and control features. This option does not 
support data encryption.

802.1x-Static64.

 This provides 802.1x-Only authentication with a static 64bit WEP key and 

an authentication server.

802.1x-Static128

. This provides 802.1x-Only authentication with a static 128bit WEP key 

and an authentication server.

802.1x-Static152

. This provides 802.1x-Only authentication with a static 152bit WEP key 

and an authentication server.

WPA.

 Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. 

WPA2.

 WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, 

authentication and key management than WPA.

WPA2-MIX. 

This commands the NWA to use either WPA2 or WPA depending on which security 

mode the wireless client uses.

Table 12   

Wireless Security Levels

SECURITY 
LEVEL

SECURITY TYPE

Least       
Secure                                                                                  

Most Secure

Unique SSID (Default)

Unique SSID with Hide SSID Enabled

MAC Address Filtering

WEP Encryption

IEEE802.1x EAP with RADIUS Server Authentication

Wi-Fi Protected Access (WPA)

WPA2

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
Оглавление инструкции

Document Outline