ZyXEL G-260 User’s Guide

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features.

Table 28 Wireless Security Relational Matrix

AUTHENTICATION

ENCRYPTION

ENTER

ENABLE IEEE 802.1X

METHOD/ KEY

METHOD

MANUAL KEY

MANAGEMENT PROTOCOL

 

 

 

 

 

Open

None

No

No

 

 

 

 

Open

WEP

No

Enable with Dynamic WEP Key

 

 

 

 

 

 

Yes

Enable without Dynamic WEP Key

 

 

 

 

 

 

Yes

Disable

 

 

 

 

Shared

WEP

No

Enable with Dynamic WEP Key

 

 

 

 

 

 

Yes

Enable without Dynamic WEP Key

 

 

 

 

 

 

Yes

Disable

 

 

 

 

WPA

WEP

No

Yes

 

 

 

 

WPA

TKIP

No

Yes

 

 

 

 

WPA-PSK

WEP

Yes

Yes

 

 

 

 

WPA-PSK

TKIP

Yes

Yes

 

 

 

 

79

Appendix D