Table 106 wireless security relational matrix, 249 security parameters summary – ZyXEL Communications NBG334SH User Manual

Page 249

Advertising
background image

Appendix F Wireless LANs

ZyXEL NBG-334SH User’s Guide

249

Security Parameters Summary

Refer to this table to see what other security parameters you should configure for each
Authentication Method/ key management protocol type. MAC address filters are not
dependent on how you configure these security features.

Table 106 Wireless Security Relational Matrix

AUTHENTICATION

METHOD/ KEY

MANAGEMENT PROTOCOL

ENCRYPTIO

N METHOD

ENTER

MANUAL KEY

IEEE 802.1X

Open

None

No

Disable

Enable without Dynamic WEP

Key

Open

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP

Key

Yes

Disable

Shared

WEP

No

Enable with Dynamic WEP Key

Yes

Enable without Dynamic WEP

Key

Yes

Disable

WPA

TKIP

No

Enable

WPA-PSK

TKIP

Yes

Enable

WPA2

AES

No

Enable

WPA2-PSK

AES

Yes

Enable

Advertising