User`s guide

G-3000H User’s Guide
Chapter 6 Wireless Security Configuration 73
CHAPTER 6
Wireless Security Configuration
This chapter describes how to use the Security, RADIUS and Local User Database screens
to configure wireless security on your ZyAIR.
6.1 Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless
stations, access points and the wired network.
Wireless security methods available on the ZyAIR are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the ZyAIR identity.
6.1.1 Encryption
Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server.
WPA has user authentication and improved data encryption over WEP.
Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A
higher bit key offers better security at a throughput trade-off. You can use manually enter
64-bit, or 128-bit WEP keys.
6.1.2 Authentication
WPA has user authentication and you can also configure IEEE 802.1x to use the built-in
database (Local User Database) or a RADIUS server to authenticate wireless clients before
joining your network.
Use RADIUS authentication if you have a RADIUS server. See the appendices for
information on protocols used when a client authenticates with a RADIUS server via the
ZyAIR.
Use the Local User Database if you have less than 32 wireless clients in your network.
The ZyAIR uses MD5 encryption when a client authenticates with the Local User
Database
6.1.3 Restricted Access
The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).