User's Manual
Table Of Contents
- User’s Guide
- Copyright
- Certifications
- ZyXEL Limited Warranty
- Safety Warnings
- Customer Support
- Table of Contents
- List of Figures
- List of Tables
- Preface
- Getting Started
- Tutorial
- Wireless LAN Network
- ZyXEL Utility Configuration
- Maintenance
- Troubleshooting
- Product Specifications
- Management with Wireless Zero Configuration
- Wireless Security
- Types of EAP Authentication
- EAP-MD5 (Message-Digest Algorithm 5)
- EAP-TLS (Transport Layer Security)
- EAP-TTLS (Tunneled Transport Layer Service)
- PEAP (Protected EAP)
- LEAP
- Dynamic WEP Key Exchange
- WPA and WPA2
- Encryption
- User Authentication
- WPA(2)-PSK Application Example
- WPA(2) with RADIUS Application Example
- Security Parameters Summary
- Setting up Your Computer’s IP Address
- Index
ZyXEL AG-120 User’s Guide
Chapter 4 ZyXEL Utility Configuration 53
Figure 28 Profile: Security Settings
4 The screen varies depending on the encryption method you select in the previous screen.
The settings must be exactly the same on the APs or other peer wireless computers as
they are on the AG-120. Refer to Section 4.2.1 on page 43 for detailed information on
wireless security configuration.
Figure 29 Profile: Security Settings
5 This read-only screen shows a summary of the new profile settings. Verify that the
settings are correct. Click Save to save and go to the next screen. Click Back to return to
the previous screen. Otherwise, click Exit to go back to the Profile screen without
saving.