ZyXEL
This type of security does not protect the information that is sent in the wireless network. Furthermore, there are ways for unauthorized wireless devices to get the MAC address of an authorized device. Then, they can use that MAC address to use the wireless network.
3.2.3 User Authentication and EncryptionYou can make every user log in to the wireless network before they can use it. This is called user authentication. However, every wireless client in the wireless network has to support IEEE 802.1x to do this.
Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message.
3.2.3.1 WEP
3.2.3.1.1 Data Encryption
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the
There are two ways to create WEP keys in your
•Automatic WEP key generation based on a “password phrase” called a passphrase. The passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the same WLAN.
For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Setting or the Configuration screen of the ZyXEL utility and entering them manually as the WEP keys in the other WLAN adapter(s).
•Enter the WEP keys manually.
Your
3.2.3.1.2Authentication Type
The IEEE 802.11a/b/g standard describes a simple authentication method between the wireless stations and AP. Three authentication types are defined: Auto, Open System and Shared Key.
•Open System mode is implemented for
Chapter 3 Wireless LAN Network | 39 |