ZyXEL
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features.
Table 32 Wireless Security Relational Matrix
AUTHENTICATION | ENCRYPTION | ENTER | IEEE 802.1X | |
METHOD/ KEY | ||||
METHOD | MANUAL KEY | |||
MANAGEMENT PROTOCOL |
| |||
|
|
|
| |
Open | None | No | Disable | |
|
|
|
| |
|
|
| Enable without Dynamic WEP Key | |
|
|
|
| |
Open | WEP | No | Enable with Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Enable without Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Disable | |
|
|
|
| |
Shared | WEP | No | Enable with Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Enable without Dynamic WEP Key | |
|
|
|
| |
|
| Yes | Disable | |
|
|
|
| |
WPA | TKIP/AES | No | Enable | |
|
|
|
| |
TKIP/AES | Yes | Disable | ||
|
|
|
| |
WPA2 | TKIP/AES | No | Enable | |
|
|
|
| |
TKIP/AES | Yes | Disable | ||
|
|
|
|
94 | Appendix E Types of EAP Authentication |