ZyWALL 5/35/70 Series User’s Guide

Figure 76 ZyWALL Wireless Security Levels

If you do not enable any wireless security on your ZyWALL, your network is accessible to any wireless networking device that is within range.

Use the ZyWALL web configurator to set up your wireless LAN security settings. Refer to the chapter on using the ZyWALL web configurator to see how to access the web configurator.

9.6.1Encryption

Use WPA security if you have WPA-aware wireless clients and a RADIUS server. WPA has user authentication and improved data encryption over WEP.

Use WPA-PSK if you have WPA-aware wireless clients but no RADIUS server.

If you don’t have WPA-aware wireless clients, then use WEP key encrypting. A higher bit key offers better security at a throughput trade-off. You can use Passphrase to automatically generate 64-bit or 128-bit WEP keys or manually enter 64-bit, 128-bit or 256-bit WEP keys.

9.6.2Authentication

Use a RADIUS server with WPA or IEEE 802.1x key management protocol. You can also configure IEEE 802.1x to use the built-in database (Local User Database) to authenticate wireless clients before joining your network.

Use RADIUS authentication if you have a RADIUS server. See the appendices for information on protocols used when a client authenticates with a RADIUS server via the ZyWALL.

Use the Local User Database if you have less than 32 wireless clients in your network. The ZyWALL uses MD5 encryption when a client authenticates with the Local User Database

179

Chapter 9 Wireless LAN