Appendix D Wireless LANs

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features.

Table 135 Wireless Security Relational Matrix

AUTHENTICATION

ENCRYPTIO

ENTER

 

METHOD/ KEY

IEEE 802.1X

MANAGEMENT

N METHOD

MANUAL KEY

PROTOCOL

 

 

 

Open

None

No

Disable

 

 

 

 

 

 

 

Enable without Dynamic WEP

 

 

 

Key

 

 

 

 

Open

WEP

No

Enable with Dynamic WEP

 

 

 

Key

 

 

 

 

 

 

Yes

Enable without Dynamic WEP

 

 

 

Key

 

 

 

 

 

 

Yes

Disable

 

 

 

 

Shared

WEP

No

Enable with Dynamic WEP

 

 

 

Key

 

 

 

 

 

 

Yes

Enable without Dynamic WEP

 

 

 

Key

 

 

 

 

 

 

Yes

Disable

 

 

 

 

WPA

TKIP

No

Enable

 

 

 

 

WPA-PSK

TKIP

Yes

Enable

 

 

 

 

WPA2

AES

No

Enable

 

 

 

 

WPA2-PSK

AES

Yes

Enable

 

 

 

 

368

NBG-460N User’s Guide

Page 368
Image 368
ZyXEL Communications wireless n gigbit router zyxel Security Parameters Summary, 368, Wireless Security Relational Matrix