G-1000 User’s Guide

The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped.

By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism (MIC), TKIP makes it much more difficult to decode data on a Wi-Fi network than WEP, making it difficult for an intruder to break into the network.

The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials. The common-password approach makes WPA-PSK susceptible to brute-force password-guessing attacks but it's still an improvement over WEP as it employs an easier-to- use, consistent, single, alphanumeric password.

User Authentication

WPA or WPA2 applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database.

If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use WPA2 -PSK (WPA2 -Pre-Shared Key) that only requires a single (identical) password entered into each access point, wireless gateway and wireless client. As long as the passwords match, a wireless client will be granted access to a WLAN.

If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not.

Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2.

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features.

Table 69 Wireless Security Relational Matrix

AUTHENTICATION

ENCRYPTION

ENTER

ENABLE IEEE 802.1X

METHOD/ KEY

METHOD

MANUAL KEY

MANAGEMENT PROTOCOL

 

 

 

 

 

Open

None

No

No

 

 

 

 

Open

WEP

No

Enable with Dynamic WEP Key

 

 

 

 

 

 

Yes

Enable without Dynamic WEP Key

 

 

 

 

 

 

Yes

Disable

 

 

 

 

Wireless LANs

167

Page 167
Image 167
ZyXEL Communications G-1000 manual Security Parameters Summary, User Authentication, Wireless Security Relational Matrix

G-1000 specifications

ZyXEL Communications G-1000 is a versatile network device that has gained attention in the realm of home and small office networking solutions. This device is a powerful gateway that seamlessly integrates various communication technologies, making it a reliable choice for users looking for enhanced connectivity, speed, and network management features.

One of the main features of the ZyXEL G-1000 is its dual-band wireless capability, which supports both 2.4 GHz and 5 GHz frequency bands. This allows users to connect multiple devices simultaneously without experiencing bandwidth congestion. The dual-band functionality enables smoother streaming, faster downloads, and better online gaming experiences, as users can choose the best band based on their device capabilities and distance from the router.

The G-1000 also incorporates advanced Wi-Fi 6 (802.11ax) technology, which significantly improves wireless performance compared to previous generations. Wi-Fi 6 offers enhanced data rates, improved efficiency, increased capacity for handling multiple devices, and better performance in crowded areas. This makes the ZyXEL G-1000 an ideal choice for households with numerous smart devices, such as smartphones, tablets, smart TVs, and home automation systems.

In terms of security, the ZyXEL G-1000 is equipped with robust security features that protect users from various cyber threats. The device supports WPA3 encryption, which offers stronger protection against unauthorized access and enhances overall network security. Additionally, advanced firewall features and parental controls allow users to manage access to the internet and protect their networks further.

Another notable characteristic of the G-1000 is its intuitive web interface and mobile app, which simplify network management. Users can easily monitor connected devices, set up guest networks, and modify network settings, all from a user-friendly dashboard. This level of accessibility ensures that even those with limited technical knowledge can effectively manage their home networking environment.

The ZyXEL G-1000 also boasts multiple Ethernet ports, providing the flexibility to connect wired devices for stable and high-speed connections. This is particularly advantageous for devices that require consistent bandwidth, such as gaming consoles and desktop computers.

In conclusion, ZyXEL Communications G-1000 stands out as a feature-rich networking solution that combines the latest technologies, robust security measures, and user-friendly management. Its advanced capabilities make it suitable for various networking needs, whether for home use or in small office environments. With its commitment to quality and innovation, ZyXEL continues to provide reliable solutions that enhance connectivity and user experience.