ZyXEL G-170S User’s Guide

The following table describes the labels in this screen.

Table 8 Security Settings: WPA-PSK/WPA2-PSK

LABEL

DESCRIPTION

 

 

Encryption Type

The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK are

 

the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses

 

a simple common password, instead of user-specific credentials.

 

Select the encryption type (TKIP or AES) for data encryption.

 

Refer to Section 2.2.3 on page 29 for more information.

 

 

Pre-Shared Key

Type a pre-shared key (same as the AP or peer device) of between 8 and 63 case-

 

sensitive ASCII characters (including spaces and symbols).

Back

Click Back to go to the Site Survey screen to select and connect to other network.

 

 

Next

Click Next to confirm your selections and advance to the Confirm Save screen.

 

Refer to Section 3.2.3 on page 41.

Exit

Click Exit to return to the Site Survey screen without saving.

 

 

3.2.2.4 IEEE 802.1x

Figure 18 Security Settings: 802.1x

The following table describes the labels in this screen.

Table 9 Security Settings: 802.1x

LABEL

DESCRIPTION

 

 

Authentication

Select an authentication method from the drop down list. Options are TLS, TTLS

Type

and PEAP.

Login Name

Enter a user name.

 

This is the user name that you or an administrator set up on a WPA/WPA2 server.

 

 

Password

This field is not available when you select TLS in the Authentication Type field.

 

Enter the password associated with the user name above.

 

 

Certificate

This field is only available when you select TLS in the Authentication Type field.

 

Select a certificate used by the authentication server to authenticate the G-170S.

 

Note: You must first have a wired connection to a network and

 

obtain the certificate(s) from a certificate authority (CA).

40

Chapter 3 ZyXEL Utility Configuration